3Huang X, Susilo W, Mu Y, et al. Proxy signature without random oracles [ C] //Proceedings of International Conferenee on Mobile Ad Hoe and Sensor Networks. Berlin/ Heidelberg: Springer-Verlag ,2006:473-484.
4Waters B. Efficient identity-based encryption without random oracles [ C ]//Proceedings of Eurocrypt. Berlin/ Heidelberg: Springer-Verlag,2005 : 114-127.
5Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model [ C ]//Proceedings of the 11 th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg:Springer-Verlag, 2006:207-222.
6Shamir A. Identity-based cryptosystems and signature schemes [ C ] //Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag, 1984:47-53.
7Boneh D, Franklin M. Identity-based encryption from the Weil pairing [ C ]//Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag,2001:213-229.
8Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York : ACM, 1996:48-57.
9Kim S, Park S, Won D. Proxy signatures, revisited [ C ]// Proceedings of International Conference on Information and Communications Security. Berlin/Heidelberg: Springer-Verlag, 1997 : 223- 232.
10Zhang F, Kim K. Efficient ID-based blind signature and proxy signature from bilinear pairings [ C ]//Proceedings of the 8th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg: Springer-Verlag, 2003: 312-323.