1. Y. Aumann, M.O. Rabin, Authentication, enhanced security and error correcting codes, in: Proceedings of CRYPTO’98, LNCS, vol. 1462, 1998, pp. 299–303.
2. M. Bellare, C. Namprempre, G. Neven, Security proofs for identity-based identification and signature schemes, in: Proceedings of EUROCRYPT’04, LNCS, vol. 3027, 2004, pp. 268–286.
3. Deniable authentication protocols;Deng;In IEE Proceedings Computers and Digital Techniques,2001
4. C. Dwork, M. Naor, A. Sahai, Concurrent zero-knowledge, in: Proceedings of 30th ACM STOC’98, 1998, pp. 409–418.
5. Zero knowledge proofs of identity;Feige;Journal of Cryptology,1988