1. Chiesa A, Ma F, Spooner N, Zhandry M (2021) Post-quantum succinct arguments. IACR Cryptol ePrint Arch 2021:334
2. Dominique Unruh. Quantum proofs of knowledge. In Pointcheval D and Johansson T, (eds), Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, Apr 15–19, 2012. Proceedings, vol. 7237 of Lecture Notes in Computer Science, pp. 135–152. Springer, 2012.
3. He D, Kumar N, Lee J-H, Sherratt RS (2014) Enhanced three factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37
4. Cheng H, Rong C, Tan Z, Zeng Q (2012) Identity based encryption and biometric authentication scheme for secure data access in cloud computing. Chin J Electron 21(2):254–259
5. Hafizul Islam SK et al (2017) An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud Univ-Comput Inform Sci 29(3):311–324