[1]SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Proceedings of CRYPTO 84, LNCS 196.Berlin:Springer-Verlag,1985:7-53.[2]AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of Asiacrypt 2003, LNCS 2894. Berlin: Spring-Verlag, 2003:452-473.[3]MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delegation of power to sign messages [J]. IEICE Transactions on Fundamentals, 1996, E79-A(9):1338-1353.[4]CHAUM D. Blind signature for untraceable payments[C]// Adavances in Cryptology: Crypto82. Berlin: Springer-Verlag, 1982: 199-203.[5]夏满民, 谷利泽. 一个新型的代理盲签名方案[J]. 北京邮电大学学报, 2006, 29(3): 48-52.[6]张学军, 王育民. 高效的基于身份的代理盲签名[J]. 计算机应用, 2006, 26(11): 2586-2588.[7]LI J G, WANG S H. New efficient proxy blind signature scheme using verifiable self-certified public key[J]. International Journal of Network Security, 2007,4(2):193-200.[8]王天银, 蔡晓秋, 张建中. 一种安全有效的代理盲签名方案[J]. 计算机工程, 2007, 33(2): 148-149.[9]陈逢林, 胡万宝. 基于超椭圆曲线的代理盲签名方案[J]. 计算机应用, 2010, 30(5):1224-1226.[10]魏春艳,蔡晓秋.新的无证书代理盲签名方案[J].计算机应用, 2010,30(12):3341-3342.