1.
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology (EUROCRYPT’98). Lecture notes in computer science, vol 1403. Springer, Berlin, pp 127–144
2.
Boneh D, Franklin M (2001) Identity based encryption from Weil pairing. In: Advances in cryptography (CRYPTO 2001), Santa Barbara, CA, August 2001
3.
Boldyreva A, Palacio A, Warinschi B Secure proxy signature schemes for delegation of signing rights. Preprint, available at http://eprint.iacr.org/2003/096/
4.
Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM conference on computer and communications security. Lecture notes in computer science. Springer, Berlin
5.
Herranz J, Saez G Revisiting fully distributed proxy signature schemes. Preprint, available at http://eprint.iacr.org/2003/197/
6.
Kim S, Park S, Won D (1997) Proxy signatures, revisited. In: ICICS’97. Lecture notes in computer science, vol 1334. Springer, Berlin, pp 223–232
7.
Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications. In: Proceedings of SCIS
8.
Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169(1):437–450
9.
Liu J, Huang S (2010) Identity-based threshold proxy signature from bilinear pairing. Informatica 21(1):41–56
10.
Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign message. IEICE Trans Fundam Electron Commun Comput Sci 79-A(9):1338–1353
11.
Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegation signing operation. In: Proc third ACM conf on computer and communications security, pp 48–57
12.
Neuman BC (1993) Proxy-based authorization and accounting for distributed systems. In: Proc 13th international conference on distributed systems, pp 283–291
13.
Umaparasada Rao B, Vasudeva Reddy P (2011) ID-based directed multi-proxy signature scheme from bilinear pairings. Int J Comput Sci Netw Secur 5(1):107–117
14.
Sun X, Li J, Chen G, Yung S (2008) Identity-based directed signature scheme from bilinear pairings. Cryptology e-print archive, report 2008/305. http://eprint.iacr.org
15.
Varadharajan V, Allen P, Black S (1991) An analysis of the proxy problem in distributed systems. In: Proc 1991 IEEE computer society symposium on research in security and privacy, pp 255–275
16.
Wu W, Mu Y, Seberry W, Huang X (2007) Identity-based proxy signature from pairings. In: The 4th international conference on autonomic and trusted computing, pp 22–31
17.
Xu J, Zhang Z, Feng D (2005) Id-based proxy signature using bilinear pairings. In: Parrallel and distributed processing and applications, pp 359–367