3Chaum D.Blind signatures for untraceable payment[C]//Advances in Cryptology-Crypto'83 Proceedings.London:[a.n.],1983:199-203.
4Mambo M,Usuda K,Okamoto E.Proxy signatures:Delegation of the power to sign mesaages[J].IEICE Transactions on Fundamentals,1996,79(9):1338-1354.
5Lin W D,Jan J K.A security personal learning tools using a proxy blind aignature acheme[C]//Proceedings of International Conference on Chinese Language Computing.Illinois,USA:[s.n.],2000:173-177.
6Wang Shao-bin,Hong Fan,Cui Guo-hua.Secure efficient proxy blind signature schemes based DLP[C]//Proceedings of the Seventh IEEE International Conferenceon E-Commerce Technology CEC'05.[S.1]:IEEE,2005:452-455.
7Hwang S,Shi C.A simple multi-proxy signature scheme[C]//Pro-ceeding of the Tenth International Conference on Information Se-curity,2000:134-138.