M. Bellare, D. Micciancio, and B. Warinschi, Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions Foundations of group signatures: The case of dynamic groups, EUROCRYPT '03 CT-RSA 2005, pp.614-629, 2003.

M. Blum, A. De-santis, S. Micali, and G. Persiano, Noninteractive Zero-Knowledge, SIAM Journal on Computing, vol.20, issue.6, pp.1084-1118, 1991.
DOI : 10.1137/0220068

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.207.8702

A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive Boyen and B. Waters. Full-domain subgroup hiding and constant-size group signatures, PKC '07, pp.1-15, 2003.

D. Chaum and E. Van-heyst, Group Signatures, EUROCRYPT '91, pp.257-265, 1991.
DOI : 10.1007/3-540-46416-6_22

D. Dolev, C. Dwork, and M. Naor, Nonmalleable Cryptography, FP08] G. Fuchsbauer, D. Pointcheval. Anonymous proxy signatures. SCN '08, pp.391-437, 2000.
DOI : 10.1137/S0097539795291562

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.8267

S. Goldwasser, S. Micali, and R. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, Gro07] J. Groth. Fully anonymous group signatures without random oracles. ASIACRYPT '07, pp.281-308, 1988.
DOI : 10.1137/0217017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, EUROCRYPT '08, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures for delegating signing operation, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, 1996.
DOI : 10.1145/238168.238185

C. Rackoff and D. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, CRYPTO '91, pp.433-444, 1992.
DOI : 10.1007/3-540-46766-1_35

R. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, Proceedings of Asiacrypt 2001, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

J. Rompelsah99 and ]. Sahai, One-way functions are necessary and sufficient for secure signatures Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security, 22nd Annual Symposium on Theory of Computing 40th Symposium on Foundations of Computer Science, pp.387-394, 1990.

K. Shum and V. K. Wei, A strong proxy signature scheme with proxy signer privacy protection, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.55-56, 2002.
DOI : 10.1109/ENABL.2002.1029988

URL : http://library.cuhk.edu.hk/record=b5891247

Z. Tan and Z. Liu, Provably secure delegation-by-certification proxy signature schemes. IACR ePrint Archive, Wikström. Hierarchical group signatures. Automata, Languages and Programming, 32nd International Colloquium (ICALP'05), pp.446-458, 2004.
DOI : 10.1145/1046290.1046299

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.4973