1. Rivest, R.L., and Shamir, A. How to leak a secret. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security.
2. Komano, Y., Ohta, K., Shimbo, A., and Kawamura, S.I. Toward the fair anonymous signatures: Deniable ring signatures. Proceedings of the Cryptographers’ Track at the RSA Conference.
3. Lattice-based deniable ring signatures;Gao;Int. J. Inf. Secur.,2019
4. Zhang, F., and Kim, K. Efficient id-based blind signature and proxy signature from bilinear pairings. Proceedings of the Australasian Conference on Information Security and Privacy.
5. Herranz, J., and Sáez, G. New identity-based ring signature schemes. Proceedings of the International Conference on Information and Communications Security.