1. Asaar, M.R., Salmasizadeh, M., Susilo, W.: Security pitfalls of a provably secure identity-based multi-proxy signature scheme. IACR Cryptology ePrint Archive, 2014:496 (2014)
2. Bakker, A., Van Steen, M., Tanenbaum, A.S.: A law-abiding peer-to-peer network for free-software distribution. In Proceedings of IEEE International Symposium on Network Computing and Applications, pp. 60–67 (2002)
3. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptol. 25(1), 57–115 (2012)
4. Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)
5. Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)