1. Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 80(1), 54–63 (1997)
2. Lecture Notes in Computer Science;M. Blaze,1998
3. Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: Proceedings of the Network and Distributed System Security Symposium. The Internet Society (2003)
4. Lecture Notes in Computer Science;M. Jakobsson,1999
5. Lecture Notes in Computer Science;M. Green,2007