[1]
Chaum D.Blind Signature for Untraceable Payment's in Advances in Cryptology[C]/proc. of CRYPro'82. NewYork, USA: [s. n. ], 1983: 199-203.
Google Scholar
[2]
Fan Chun-I, Lei Chin-Laung. Low-computation partially blind signatures for electronic cash[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, May 1998 E81 A (n5): 818-824.
Google Scholar
[3]
Gallegos_Garcia Gina, G6mez-Cardenas Roberto, Dueh6NSdnchez Gonzalo I. Identity based threshold cryptography and blind signatures for electronic voting[J]. WSEAS Transactions on Computers, January, 2010, 9(n1): 62-71.
Google Scholar
[4]
Wang Lu, Kang Baoyuan, Analysis and Improvement of two proxy blind multi-signature schemes, Computer & Digital Engineering, 2012, 40(10) : 102.
Google Scholar
[5]
Manbo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[J]. Proc 3rd ACM Conference on Computer and Communications Security. ACM Press. 1996: 48-57.
DOI: 10.1145/238168.238185
Google Scholar
[6]
Yi Lijiang, Research and Application in Proxy multi-signature scheme. Doctorial Thesis, 2000. 10 (In Chinese).
Google Scholar
[7]
Rongxing Lu, Zhenfu Cao, Yuan Zhou. Proxy blind multi-signature scheme without a secure channel[J]. Applied Mathematics and Computation, May 2005, 164(1): 179-187.
DOI: 10.1016/j.amc.2004.04.063
Google Scholar
[8]
Hu,Z., Qian,H., Li,Z. Efficient Proxy Blind Multi-signature Scheme. [J]Computer Engineering. 2008, 34(13): 130-132.
Google Scholar
[9]
Pointcheval D, Stem J. Security Arguments for Digital Signatures and Blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.
DOI: 10.1007/s001450010003
Google Scholar