[1] M. Mambo, K. Usuda, E. Okamoto, "Proxy signature: Delegation of the power to sign messages", IEICE Transactions
on Fundamentals, E79-A 9 (1996), pp. 1338–1353.
[2] J. Y. Lee, J.H. Cheon, S. Kim, "An analysis of proxy signatures: Is a secure channel necessary? ", in: CT-RSA 2003,
in: LNCS, vol. 2612, Springer-Verlag, Berlin, 2003, pp. 68–79.
[3] B. Lee, H. Kim, K. Kim, "Secure mobile agent using strong nondesignated proxy signature", in: ACISP01, in: LNCS, vol. 2119, Springer-Verlag, Berlin, 2001, pp. 474–486.
[4] S. J. Kim, S. J. Park, D. H. Won, "Proxy Signatures, revisited." ICICS’97, LNCS 1334, Springer-Verlag, 1997,
pp. 223-232.
[5] K. Zhang, "Threshold proxy signature schemes," Information Security Workshop, Japan, 1997, pp. 191-197.
[6] J. Hu & J. Zhang, "Cryptanalysis & improvement of a threshold proxy signature scheme", Computer Standards &
Interfaces, 2009, pp.169–173.
[7] Z. Tan, "Improvement on C.-L Hsu et al's threshold proxy signature scheme with known signers", international Conference on ConvergenceInformation Technology, 2007, pp. 1463–1467.
[8] F. kong, J. Yu, B. Qin, M. Li, D. Li, "Security Analysis and Improvement of a (t,n) Threshold Proxy Signature Scheme" 8th ACIS International Conference on Engineering, Artificial Intelligent, Networking and Parallel\ Distributed Computing, 2007, pp. 923–926.
[9] S. H. Seo, K. A. Shim, S. H. Lee. "A mediated proxy signature scheme with fast revocation for electronic transactions".
Proceedings of the 2nd International Conference on Trust, Privacy and Security in Digital Business, Aug 22-26, 2005, Copenhagen, Denmark. LNCS 3592.Berlin, German: Springer-Verlag, 2005,pp. 216–225.
[10] M. Bellare, P. Rogaway, Random Oracles are Practical: "A Paradigm for Designing Efficient Protocols", Proceeding of the First ACM Conference on Computer and Communications Security, 1993, pp. 62–73.
[11] Boldyreva, A. Palacio and B. Warinschi, "SecureProxy Signature Schemes for Delegation of Signing Rights", http://eprint.iacr.org/2003/096.
[12] Gu, Y. Zhu, "Provable Security of ID-Based Proxy Signature Schemes", ICCNMC 2005, LNCS 3619, Springer- Verlag Heidelberg, 2005, pp. 1277–1286.
[13] H. Ji, W. Han, L. Zhao and Y. Wang, "AnIdentity-Based Proxy Signature from Bilinear Pairings", WASE International
Conference on Information Engineering, 2009, pp. 14–17.
[14] D. Boneh, X. Boyen, "Efficient selective-id secure identity based encryption without random oracles", In Proceeding
of the International Conference on Advances in Cryptology (EUROCRYPT'04), Lecture Notes in Computer Science. Springer-Verlag, 2004.
[15] B. Waters. "Efficient identity based encryption without random oracles". Proceedings of Advances in Cryptology-
Eurocrypt 2005, May 22–26, 2005, Aarhus, Denmark. LNCS 3494. Berlin, German: Springer-Verlag, 2005, pp. 114–127.
[16] X. Huang, W. Susilo, Y. Mu and W.Wu, "Proxy Signature without Random Oracles", in: MSN 2006, in: LNCS, vol.
4325, Springer-Verlag, Berlin, 2006, pp. 473–484.
[17] Y. Yu, C. Xu, X. Zhang, Y. Liao, "Designated verifier proxy signature scheme without random oracles", computers
and Mathematics with Applications 57 (2009), pp.1352 –136.