M. Bellare, D. Micciancio, and B. Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, EUROCRYPT '03, pp.614-629, 2003.
DOI : 10.1007/3-540-39200-9_38

M. Bellare, H. Shi, and C. Zhang, Foundations of Group Signatures: The Case of Dynamic Groups, CT-RSA 2005, pp.136-153, 2005.
DOI : 10.1007/978-3-540-30574-3_11

M. Blum, A. De-santis, S. Micali, and G. Persiano, Noninteractive Zero-Knowledge, SIAM Journal on Computing, vol.20, issue.6, pp.1084-1118, 1991.
DOI : 10.1137/0220068

A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive Boyen and B. Waters. Full-domain subgroup hiding and constant-size group signatures, PKC '07, pp.1-15, 2003.

D. Chaum and E. Van-heyst, Group Signatures, EUROCRYPT '91, pp.257-265, 1991.
DOI : 10.1007/3-540-46416-6_22

D. Dolev, C. Dwork, and M. Naor, Nonmalleable Cryptography, FP08] G. Fuchsbauer, D. Pointcheval. Anonymous Proxy Signatures, pp.391-437, 2000.
DOI : 10.1137/S0097539795291562

S. Goldwasser, S. Micali, R. J. Rivest-[-gs08-], A. Groth, and . Sahai, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, EUROCRYPT '08, pp.281-308, 1988.
DOI : 10.1137/0217017

M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures for delegating signing operation Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS CRYPTO '91, pp.433-444, 1992.

R. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, Proceedings of Asiacrypt 2001, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

Z. Tan and Z. Liu, Provably secure delegation-by-certification proxy signature schemes. IACR ePrint Archive, Wikström. Hierarchical group signatures. Automata, Languages and Programming, 32nd International Colloquium (ICALP'05), pp.446-458, 2004.