1. D. Beaver: “Foundations of Secure Interactive Computing”, Proc. of CRYPTO’91, pp.9-1–9-7 (1991).
2. T. Chikazawa and T. Inoue: “A new key sharing system for global telecommunications”, Proc. of GLOBCOM’90, pp.1069–1072 (1990).
3. W. Fumy and M. Munzert: “A modular approach to key distribution”, Proc. of CRYPTO’90, pp.274–283 (1990).
4. A. Fiat and A. Shamir: “How to prove yourself: Practical solutions to identification and signature problems”, Proc. of CRYPTO’86, pp.186–194 (1986).
5. U. Feige, A. Fiat and A. Shamir: “Zero knowledge proofs of identity”, Proc. of STOC, pp.210–217 (1987).