“…Since the digital signature can provide the authenticity, integrity and non-repudiation, hence, along with practical applications' requirements, the special digital signatures have been widely proposed. These mainly include: proxy signatures [38,39] , blind signatures [40][41][42] , encryption verifiable signatures [43] , undeniable signatures [44,45] , forward secure signatures [46,47] , key isolation signatures [48] , online/offline signature [49] , threshold signatures [41,[50][51][52] , aggregation signatures [53] , ring signatures [53,54] , designated verifier signatures [55,56] , confirmed signatures [57] , and their variants [58] .…”