4ShamirA.Identity-basedCryptosystemsandSignature Schemes[C]//Proceedings of CRYPTO'84.Berlin,Germany:Springer-Verlag,1984:47-53.
5Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1996:48-57.
6Zhang Fangguo,Kim K.Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Proceedings of the 8th Australasian Conference on Information Security and Privacy.Berlin,Germany:Springer-Verlag,2003:312-323.
7Bellare M,Rogaway P.Random Oracles Are Practical:A Paradigm for Designing Efficient Protocols[C]//Proceedings of the 1st ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1993:62-73.
8Xu Jing,Zhang Zhenfeng,Feng Dengguo.ID-based Proxy Signature Using Bilinear Pairings[C]//Proceedings of the 3rd International Symposium on Parallel and Distributed Processing and Applications.Berlin,Germany:Springer-Verlag,2005:359-367.
9Wu Wei,Mu Yi,Susilo W,et al.Identity-based Proxy Signature From Pairings[C]//Proceedings of the 4th International Conference on Autonomic and Trusted Computing.Berlin,Germany:Springer-Verlag,2007:22-31.
10Canetti R,Goldreich O,Halevi S.The Random Oracle Methodology[C]//Proceedings of the 30th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,1998:209-218.