3BELLER M J, CHENG L F,YACOBI Y. Privacy and authentication on a portable communication system[J[. IEEE Journal on Selected Areas in Communication, 1993, 11(6): 821-829.
4JI J, ZHAO R J. Digital multisignature schemes based on the Schnorr scheme[A[. Advance in Cryptography-CHINACRYPT'96[C]. 1996.170-176.
5LEE B, KIM H, KIM K. Strong proxy signature and its application[A].The 2001 Symposium on Cryptography and Information Security[C].2001. 603-608.
6Beller M J,Cheng L F,Yacobi Y.Privacy and authentication on a portable communication system[J].IEEE Journal on Selected Areas in Communications,1993,11(6):821-829.