1Zhang K.Threshold proxy signature schemes. Proceedings ofthe 1st International Workshop on Information Security . 1997
2Dent A. W.Hybrid signcryption schemes with outsider security. The8th International Conference,ISC2005 . 2005
3Lin W D,Jan J K.A security personal learning tools using a proxy blind signature scheme[].Proceedings of International Conference on Chinese Language Computing.2000