1. Mambo M, Usuda K, Okamoto E (1996) Proxy signature for delegating signature operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp 48–57
2. Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign messages. In: IEICE Transactions on fundamentals of electronic communications and computer, science E79-A(9), pp 1338–1354
3. Kim S, Park S, Won D (1997) Proxy signatures, revisited. In: Proceedings of ICICS’97, Springer, New York, pp 223–232
4. Zhang K (1997) Threshold proxy signature schemes. In: Proceedings of 1997 Information Security Workshop. Springer, New York, pp 191–197
5. Lee NY, Hwang T, Wang CH (1998) On Zhang’s nonrepudiable proxy signature schemes. In: ACISP’98. Springer, New York, pp 415–422