References
- Abdalla , M. , Bellare , M. and Rogaway , P. 2001 . The oracle Diffie-Hellman assumptions and an analysis of DHIES . Topics in Cryptology - CT-RSA 2001 , 2020 : 143 – 158 . LNCS
- Aumann , Y. and Rabin , M. 1998 . Authentication, enhanced security and error correcting codes . Advances in Cryptology-Crypto'98 , 1462 : 299 – 303 . LNCS
- Bellar , M. and Rogaway , P. 1993 . Random oracles are practical: a paradigm for designing efficient protocols . Proceedings of the 1st CSS , : 62 – 73 .
- Boneh , D. and Franklin , M. 2003 . Identity-based encryption from the Weil pairing . SIAM. J. Comput , 32 : 586 – 615 .
- Boneh , D. , Lynn , B. and Shacham , H. 2001 . Short signatures from the Weil pairing . Advances in Cryptology - Asiacrypt’01 , 2248 : 514 – 532 . LNCS
- Deng , X. , Lee , C. H. and Zhu , H. 2001 . Deniable authentication protocols . IEE Proc. Comput. Digi. Tech , 148 : 101 – 104 .
- Diffie , W. and Hellman , M. E. 1976 . New directions in cryptography . IEEE Trans. Info. Theory , 22 : 644 – 654 .
- Dwork , C. , Naor , M. and Sahai , A. 1998 . Concurrent zero-knowledge . Proceedings of 30th ACM STOC’98 , : 409 – 418 .
- Fan , L. , Xu , C. X. and Li , J. H. 2002 . Deniable authentication protocol based on Diffie-Hellman algorithm . Electron. Lett , 38 : 705 – 706 .
- Lu , R. and Cao , Z. 2005 . Non-interactive deniable authentication protocol based on factoring . Comp. Stand. Interfaces , 27 : 401 – 405 .
- Lu , R. and Cao , Z. 2005 . A new deniable authentication protocol from bilinear pairings . Appl. Math. Comput , 168 : 954 – 961 .
- Lu , R. and Cao , Z. 2007 . Erratum to ‘Non-interactive deniable authentication protocol based on factoring’ . Comput. Stand. Interfaces , 29 : 275
- Lu , R. , Cao , Z. , Wang , S. and Bao , H. 2007 . A new id-based deniable authentication protocol . Informatica , 18 : 67 – 78 .
- Shao , Z. 2004 . Efficient deniable authentication protocol based on generalized ElGamal signature scheme . Comp. Stand. Interfaces , 26 : 449 – 454 .
- Shi , Y. and Li , J. 2005 . Identity-based deniable authentication protocol . Electron. Lett , 41 : 241 – 242 .
- Shoup , V. 2004 . Sequences of games: a tool for taming complexity in security proofs . Cryptology ePrint Archive: Report 2004/332 , Available at: http://eprint.iacr.org/2004/332