Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme

Limin Sha. Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme. In 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014. pages 1-4, IEEE, 2014. [doi]

@inproceedings{Sha14-0,
  title = {Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme},
  author = {Limin Sha},
  year = {2014},
  doi = {10.1109/SNPD.2014.6888700},
  url = {http://dx.doi.org/10.1109/SNPD.2014.6888700},
  researchr = {https://researchr.org/publication/Sha14-0},
  cites = {0},
  citedby = {0},
  pages = {1-4},
  booktitle = {15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014},
  publisher = {IEEE},
}