Generating a Proxy Signature on a Confidential Message | IEEE Conference Publication | IEEE Xplore