1. Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Proceedings of the advances in cryptology-Eurocrypt’98 LNCS (Vol. 1921, pp. 127–144).
2. Ateniese, G., & Hohenberger, S. (2005). Proxy re-signatures: New definitions, algorithms, and applications. In ACM CCS (pp. 310–319).
3. Hong, X., Gao, J., Pan, J., & Zhang, B. (2017). Universally composable secure proxy re-signature scheme with effective calculation. Cluster Computing, 78(20), 1–10.
4. Hu, X., Zhang, Z., & Yang, Y. (2009). Identity based proxy re-signature schemes without random oracle. In 2009 International conference on computational intelligence and security (pp. 256–260). IEEE.
5. Yang, X., Gao, G., Li, Y., Li, Y., & Wang, C. (2015). On-line/off-line threshold proxy re-signature scheme through the simulation approach. Applied Mathematics and Information Sciences, 9(6), 3251–3261.