1. Secret handshakes with dynamic and fuzzy matching;Ateniese,2007
2. Cryptographic protocol for trustable match making;Baldwin,1985
3. Balfanz D, Durfee G, Shankar N, Smetters DK, Staddon J, Wong H-C. secret handshakes from pairing-based key agreements. In IEEE symposium on security and privacy; 2003, pp. 180–196.
4. Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: ACM conference on computer and communications security; 1993.
5. Encrypted key exchange: password-based protocols secure against dictionary attacks;Bellovin,1992