This book contributes to the variants of proxy signature scheme based on ECDLP without pairing. Significance of the scheme in chapters is not only to provide a secure and improved signature protocol but to enhance the efficiency of the scheme in the sense of computational operation-time with compare to the other available ID-based proxy signature schemes from pairings. These schemes do not use pairings still provid signatures in ID based settings. I believe that these signature schemes with formal security model without bilinear pairings will be helpful to bring a breakthrough towards the improvement of efficiency and security proofs of such schemes. I also believe that this work will be helpful for new researchers to enhance their interest in this field and to extend the related research in future with a vast list of references.