共 15 条
[1]
Dwork C., Nair M., Sahai A., Concurrent zeroknowledge, in Proc. of the 30th Annual ACM Symposium on Theory of Computing, pp. 409-418, (1998)
[2]
Aumann Y., Rabin M., Efficient deniable authentication of long message, (1998)
[3]
Shao Z., Efficient deniable authentication protocol based on generalized elgamal signature scheme, Computer Standards & Interfaces, 26, 5, pp. 449-454, (2004)
[4]
Lu R., Cao Z., A new deniable authentication protocol from bilinear pairings, Applied Mathematics and Computation, 168, 2, pp. 954-961, (2005)
[5]
Rahman N.N.A., Ariffin M.R.K., The development of deniable authentication protocol based on the bivariate function hard problem, Intl. Journal of Network Security, 18, 1, pp. 151-157, (2016)
[6]
Lee W.-B., Wu C.-C., Tsaur W.-J., A novel deniable authentication protocol using generalized elgamal signature scheme, Information Sciences, 177, 6, pp. 1376-1381, (2007)
[7]
Zhang Y., Xu Q., Liu Z., A new non-interactive deniable authentication protocol based on generalized Elgamal signature scheme, in Proc. of the 6th. IEEE Joint Intl. Information Technology and Artificial Intelligence Conf, pp. 193-197, (2011)
[8]
Liu C.-Y., Lee C.-C., Lin T.-C., Cryptanalysis of an efficient deniable authentication protocol based on generalized elgamal signature scheme, Intl. Journal of Network Security, 12, 1, pp. 58-60, (2011)
[9]
Kar J., ID-based deniable authentication protocol based on diffie-hellman problem on elliptic curve, Intl. Journal of Network Security, 15, 5, pp. 357-364, (2013)
[10]
Yoon E.-J., Security analysis of Kar's ID-based deniable authentication protocol, Contemporary Engineering Sciences, 8, 17, pp. 765-771, (2015)