1. Rivest, R.L., Shamir, A., Aldleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
2. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57, New Delhi (1966)
3. Chaum, D.: Blind signature for untraceable payments. In: Proceeding of CRTPTOi-82, pp. 199–203. Plenum Publishing (1982)
4. Lin, W.D., Jan, J.K.: A security personal learning tools using a proxy blind signature scheme. In: Proceedings of International Conference on Chinese Language Computing, pp. 273–277. IEEE Press Illinois, USA (2000)
5. Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures[J]. Proc. CRYPTO91 Lect. Note Comput. Sci. 576, 457–469 (1992)