1. M.Abadi, J.Feigenbaum, and J.Kilian, ”On hiding information from an oracle,” JCSS 39, pp.21–50 (1989).
2. R.Anderson and R.Needham, ”Robustness principles for public key protocols,” Advances in Cryptology-CRYPTO '95, LNCS 963, pp.236–247 (1995).
3. D. Chaum, J Boyar, I.Damgaard, and T.Pedersen, ”Undeniable signatures: applications and theory,” Technical Report (1991).
4. D. Chaum, ”Blind Signatures for untraceable payments,” Advances in Cryptology Proceedings of Crypto '82, pp. 199–203 (1983).
5. D. Chaum and T. Pedersen, ”Wallet Databeses with Observers,” Advances in Cryptology, CRYPTO'92, pp. 89–105 (1993).