4Chaum D.Blind signatures for untraceable payments[C]//Proceedings of Advances in Cryptology-Crypto'82.New York: Plenum Press, 1983 : 199-203.
5Mambo M, Usuda K, Okamoto E.Proxy signatures for dele-gating signing operation[C]//Advances in the 3rd ACM Conference on Computer and Communications Security.New York: ACM Press, 1996 : 48-57.
6Mambo M, Usuda K, Okamoto E.Proxy signatures: delega- tion of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,79(9) : 1338-1354.
7Anderson R.Two remarks on public key cryptology[C]//The Fourth ACM Computer and Communication Security.New York: ACM Press, 1997 : 151-160.
8Lin W D, Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of Interna- tional Conference on Chinese Language Computing.USA: Chinese Language Computer Society Knowledge Systems Institute, 2000: 273-277.
9Al-Riyami S S, Paterson K G.Certificateless public key cryp- tography[C]//Advances in Cryptology-ASIACRYPT 2003.Ber- lin: Springer-Verlag, 2003 : 452-473.
10Lamport L.Password authentication with insecure communication[J].Communications of the ACM, 1981,24 ( 11 ) : 770-772.