1. Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. Proceedings Advances in Cryptology-CRYPTO 1997. Lectute Notes in Computer Science. Springer-Verlag. Berlin, Heidelberg, New York, (1997), vol. 1294, 90–104
2. Meng, B.: A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext. Journal of Networks. (2009), vol. 4, no. 5, 370–377
3. Ishai, Y., Kushilevits, E., Ostrovsky, R.: Efficient Non-interactive Secure Computation. Advances in Cryptology - EUROCRYPT 2011. Lecture Notes in Computer Science. Springer-Verlag. Berlin, Heidelberg, New York. (2011), vol. 6632, 406–425
4. Wang C., Wang, J.A.: Shared-key and Receiver-deniable Encryption Scheme over Lattice. Journal of Computational Information Systems. (2012), vol. 8, no. 2, 747–753
5. Moldovyan, N.A., Moldovyan, A.A., Shcherbacov, A.V.: Deniable-encryption protocol using commutative transformation. Workshop on Foundations of Informatics. (2016) 285–298