1. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), New Delhi, India, pp. 48–57 (1996)
2. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures delegation of the power to sign message. IEICE Transaction Functional E79-A(9), 1338–1354 (1996)
3. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights,
http://venona.antioffline.com/2003/096.pdf
4. Kim, H., Baek, J., Lee, B., Kim, K.: Secret Computation with secrets for mobile agent using one-time proxy signature. In: The 2001 Symposium on Cryptography and Information Security, Oiso, Japan (2001)
5. Lecture Notes in Computer Science;H.X. Wang,2003