[1] Shamir A.Identity-based cryptosystems and signature schemes [C]//Proceedings of CRYPTO’84 on Advances in Cryptology. Berlin:Springer-Verlag, 1985:48-53.
[2] Mambo M, Usuda K, Okamoto E.Proxy signature:delegation of the power to sign messages [J].IEICE Trans Foundations, 1996, E79-A(9):1338-1353.
[3] Zhang F, Kim K.Efficient ID-based blind signature and proxy signature from bilinear pairings [C]//ACISP 2003. Berlin:Springer-Verlag, 2003:312-323.
[4] Qian H, Cao Z.A novel ID-based partial delegation with warrant proxy signature scheme [C]//ISPA Workshops 2005. Berlin:Springer-Verlag, 2005:323-331.
[5] Xu J, Zhang Z, Feng D.ID-based proxy signature using bilinear pairings [C]//ISPA Workshops 2005. Berlin:Springer-Verlag, 2005:359-367.
[6] Cha Jae Choon, Cheon Jung Hee.An identity-based signature from gap Diffie-Hellman groups [C]//Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography:Public Key Cryptography. Springer-Verlag, 2003:18-30.
[7] Boneh D, Lynn B, Shacham H.Short signatures from the Weil pairing [C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology. Springer-Verlag, 2001:514-532.