1. Certificateless public key cryptography;Al-Riyami,2003
2. Secure proxy signature schemes for delegation of signing rights;Boldyreva;IACR Cryptology e-Print archieve,2003
3. Secure proxy signature schemes for delegation of signing rights;Boldyreva;J. Cryptol.,2012
4. Certicom, The certicome corporation, SEC 2:recommended elliptic curve domain parameters. http://www.secg.org/SEC2-Ver-1.0.pdf.
5. Blind signatures for untraceable payments;Chaum,1983