DWORK C,NAOR M,SAHAI A.Concurrent zero-knowledge[J].Journal of the ACM,2004,51(6):851-898.
[2]
SHAO Z H.Efficient deniable authentication protocol based on generalized EIGamal signature scheme[J].ComputerStandards&Interfaces,2004,26(3):449-454.
[3]
LU R X,CAO Z F.A new deniable authentication protocol from bilinear pairings[J].Applied Mathematics and Computation,2005,168(2):954-961.
[4]
LU R X,CAO Z F.Non-interactive deniable authentication protocol based on factoring[J].Computer Standards&Interfaces,2005,27(4):401-405.
[5]
CAO T J,LIN D D,XUE R.An efficient ID-based deniable authentication protocol from pairings[C]∥The19th InternationalConference on Advanced Information Networking and Applications,Parimala Thulasiraman,March 28-30,2005:388-391.
[6]
LIAO I E,LEE C C,HWANG M S.Identity-based deniable authentication protocol from pairings[C]∥Proc of Internet andMultimedia Systems and Applications.UK:[s.n.],2006:112-114.
[7]
LIM M,LEE S,LEE H.Cryptanalysis on an enhanced identity-based deniable authentication protocol[C]∥The IEEEInternational Conference on Industrial Informatics(INDIN 2008).Korea:[s.n.],2008:581-585.
[8]
CHOU J S,CHEN Y L,HUANG J C.A ID-based deniable authentication protocol on pairings[R/OL].Cryptology ePrintArchive:335[2006-08-23].http:∥eprint.iacr.org/2006/335.pdf.
[9]
AUMANN Y,RABIN M.Efficient deniable authentication of long messages[C]∥Conf on Theoretical Computer Science inhonor of Professor Manuel Blum's 60th birthday,April 20-24,1998:20-24.
[10]
DENG X,LE C H,ZHU H.Deniable authentication protocols[J].IEE Proc-Comput Digit Tech,2001,148(2):101-104.
[11]
FAN L,XU C X,LI J H.Deniable authentication protocol based on Diffie-Hellman[J].Algorithm Electronics Letters,2002,38(4):705-706.
[12]
OKAMOTO T,TSO R,OKAMOTO E.One-way and two-party authenticated ID-based key agreement protocols using pairing[C]∥2nd International Conference-MDAI’05.Berlin:Springer-Verlag,2005:122-133.