Boldyreva, A., Palacio, A., and Warinschi, B. (2003).
Secure proxy signature schemes for delegation of
signing rights. IACR Cryptology ePrint Archive,
2003:096.
Cao, F. and Cao, Z. (2009). A secure identity-based
proxy multi-signature scheme. Information Sciences,
179(3):292–302.
Cao, X., Kou, W., and Du, X. (2010). A pairing-free
identity-based authenticated key agreement protocol
with minimal message exchanges. Information Sci-
ences, 180(15):2895–2903.
Chor, B., Goldwasser, S., Micali, S., and Awerbuch, B.
(1985). Verifiable secret sharing and achieving simul-
taneity in the presence of faults (extended abstract). In
FOCS, pages 383–395.
Debiao, H., Jianhua, C., and Jin, H. (2011). An id-based
proxy signature schemes without bilinear pairings.
Ann. Telecommun., 66(11-12):657–662.
Du, H. and Wang, J. (2013). An anonymous but accountable
proxy multi-signature scheme. Journal of Software,
8(8):1867–1874.
Fuchsbauer, G. and Pointcheval, D. (2008). Anonymous
proxy signatures. In Security and Cryptography for
Networks, pages 201–217.
Gasser, M., Goldstein, A., Kaufman, C., and Lampson, B.
(1989). The digital distributed system security archi-
tecture. In NCSC’89, pages 305–319.
Lee, B., Kim, H., and Kim, K. (2001). Strong proxy signa-
ture and its applications. In Proc of SCIS, volume 1,
pages 603–608.
Lee, N.-Y. and Lee, M.-F. (2005). The security of a strong
proxy signature scheme with proxy signer privacy
protection. Applied mathematics and computation,
161(3):807–812.
Lee, Y.-H., Hong, S.-M., and Yoon, H. (2005). A se-
cure strong proxy signature scheme with proxy signer
privacy protection. In CCCT’05. (International Con-
ference on Computing, Communications and Control
Technologies).
Mambo, M., Usuda, K., and Okamoto, E. (1996). Proxy
signatures: Delegation of the power to sign messages.
IEICE transactions on fundamentals of electronics,
communications and computer sciences, 79(9):1338–
1354.
MIRACL. Multiprecision integer and ra-
tional arithmetic cryptographic library.
http://certivox.org/display/EXT/MIRACL.
Pedersen, T. P. (1991). Non-interactive and information-
theoretic secure verifiable secret sharing. In Advances
in Cryptology – CRYPTO’91, pages 129–140.
Sahu, R. A. and Padhye, S. (2012). Efficient id-based
proxy multi-signature scheme secure in random ora-
cle. Frontiers of Computer Science, 6(4):421–428.
Schuldt, J. C. N., Matsuura, K., and Paterson, K. G. (2008).
Proxy signatures secure against proxy key exposure.
In Public Key Cryptography, volume 4939 of LNCS,
pages 141–161.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22(11):612–613.
Shao, Z. (2009). Improvement of identity-based proxy
multi-signature scheme. Journal of Systems and Soft-
ware, 82(5):794–800.
Shum, K. and Wei, V. K. (2002). A strong proxy signa-
ture scheme with proxy signer privacy protection. In
Enabling Technologies: Infrastructure for Collabora-
tive Enterprises, 2002. WET ICE 2002. Proceedings.
Eleventh IEEE International Workshops on, pages 55–
56. IEEE.
Sun, H.-M. and Hsieh, B.-T. (2003). On the security of
some proxy signature schemes. IACR Cryptology
ePrint Archive, 2003:068.
Toluee, R., Asaar, M. R., and Salmasizadeh, M. (2012). An
anonymous proxy signature scheme without random
oracles. IACR Cryptology ePrint Archive, 2012:313.
Wu, K.-L., Zou, J., Wei, X.-H., and Liu, F.-Y. (2008). Proxy
group signature: A new anonymous proxy signature
scheme. In Machine Learning and Cybernetics, 2008
International Conference on, volume 3, pages 1369–
1373.
Xiong, H., Hu, J., Chen, Z., and Li, F. (2011). On
the security of an identity based multi-proxy signa-
ture scheme. Computers & Electrical Engineering,
37(2):129–135.
Yu, Y., Xu, C., Huang, X., and Mu, Y. (2009). An efficient
anonymous proxy signature scheme with provable se-
curity. Computer Standards & Interfaces, 31(2):348–
353.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
66