3R.Sakai, M.Kasahara. ID based Cryptosystems with Pa/ring on Elliptic Curve . In Proc. SCIS (Symposium on Cryptography and Information Security) 2003, Hamamatsu, Japan, 2003.
1M Mambo, Usuda K, Okamoto E. Proxy signature for delegating signing operation[C].Proc.3rd ACM Conference On Computer and Communication Security, 1993.
2Zhang K. Threshold proxy signature schemes[Z]. International Information Security Workshop.
3Johnson D, Menezes A. The elliptic curve digital signature algorithm (ECDSA) [Z].University of Waterloo, 1999.