Kim S, Park S, Won D. Proxy signature, revisited. ICICS97, Lecture Notes in Computer Science, Springer,Berlin,1997, 1334: 223.232.[2]Zhang K. Threshold proxy signature scheme. 1997 Information Security Workshop, Tokyo, Japan, September, 1997: 191.197.[3]Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communication.1997, 22 (8):717.722.[4]Hwang M S, Lu J L, Lin L C. A practical (t, n) threshold proxysignature scheme based on the RSA cryptosystem[J].IEEE Trans. on Knowledge and Data Engineering.2003,15(6):1552-[5]Sun, H M Lee, N Y Hwang. T. Threshold proxy signatures[J].IEE Proc- Computers and Digital Techniques.1999, 146(5):259-[6]Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software. 2001, 58 (9): 119.124.[7]Lee N Y.[J].Hwang T, Wang C H. On Zhangs nonrepudiable proxy signatures. ACISP98, Lecture Notes in Computer Science, Springer, Berlin.1998,:-[8]Pedersen. Distributed provers with applications to undeniable signatures[J].Proc. Eurocrypt91, Lecture Notes in Computer Science, Sprinter, Berlin.1991, 547:221238-
|