[1] ATENIESE G, HOHENBERGER S. Proxy re-signatures: new definitions, algorithms and applications [C]//CCS 2005: Proceedings of the 12th ACM Conference on Computer and Communications Security. New York: ACM, 2005: 310-319. [2] YANG P, CAO Z, DONG X. Threshold proxy re-signature [J]. Journal of Systems Science and Complexity, 2011, 24(4): 816-824. [3] YANG X, WANG C. Efficient on-line/off-line proxy re-signature schemes [J]. Journal of Electronics and Information Technology, 2011, 33(12): 2916-2921. [4] YANG X, WANG C, LAN C, et al.Flexible threshold proxy re-signature schemes [J]. Chinese Journal of Electronics, 2011, 20(4E): 691-696. [5] DENG Y, DU M, YOU Z, et al.A blind proxy re-signatures scheme based on standard model [J]. Journal of Electronics and Information Technology, 2010, 32(5): 1119-1223. [6] TAHAT N, MUSTAFA Z, ALOMARI A K. New ID-based digital signature scheme on factoring and discrete logarithms [J]. Applied Mathematical Sciences, 2012, 28(6): 1363-1369. [7] SHAO J, CCA Z, WANG L, et al.Proxy re-signature schemes without random oracles [C]//INDOCRYPT 2007: Proceedings of the 2007 8th International Conference on Progress in Cryptology, LNCS 4859. Berlin: Springer, 2007: 197-209. [8] HU X, ZHANG Z, YANG Y. Identity based proxy re-signature schemes without random oracle [C]//CIS 2009:Proceedings of the 2009 International Conference on Computational Intelligence and Security. Washington, DC: IEEE Computer Society, 2009: 256-259. [9] LIBERT B, VERGNAUD D. Multi-use unidirectional proxy re-signatures [C]//CCS 2008: Proceedings of Computer and Communications Security 2008. New York, ACM, 2008: 511-520. [10] SHAO J, WEI G Y, LING Y, et al. Unidirectional identity-based proxy re-signature [C]//ICC 2011: Proceedings of the 2011 IEEE International Conference on Communications. Piscataway: IEEE, 2011: 5-9. [11] FENG J, LAN C, JIA B. ID-based proxy re-signature scheme with strong unforgeability [J]. Journal of Computer Applications, 2014. 34(11):3291- 3294.(冯婕, 蓝才会, 郏伯荣. 基于身份的强不可伪造代理重签名方案[J]. 计算机应用, 2014, 34(11):3291-3294.) [12] WANG S, LIU W, XIE Q. Certificateless signature scheme without bilinear pairings [J]. Journal on Communications, 2012, 33(4): 93-98. (王圣宝, 刘文浩, 谢琪.无双线性配对的无证书签名方案[J].通信学报, 2012, 33(4):93-98.) [13] HAO S, LI Z, GHULAM M. A union authentication protocol of cross-domain based on bilinear pairing [J]. Journal of Software, 2013, 8(5): 1094-1100. [14] LIU J, BAEK J, ZHOU J, et al. Efficient online/offline identity-based signature for wireless sensor network [J]. International Journal of Information Security, 2010, 9(4): 287-296. [15] WATERS B. Efficient identity-based encryption without random oracles [C]//TACT 2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin: Springer, 2005: 114-127. |