[1]CANETTI R, DWORK C, NAOR M, et al. Deniable encryption [C]// Advances in Cryptology—CRYPTO '97, LNCS 1294. Berlin: Springer-Verlag, 1997:165-179.
[2]DWORK C, NAOR M, SAHAI A. Concurrent zero-knowledge [C]// STOC '98: Proceedings of the 30th Annual ACM Symposium on Theory of Computing. New York: ACM, 1998: 409-418.
[3]AUMANN Y, RABIN M. Efficient deniable authentication of long messages [EB/OL]. [2011-04-05]. http://www.cs.cityu.edu.hk/dept/video.html.
[4]DENG X, LEE C H, ZHU H. Deniable authentication protocols [J]. IEE Proceedings: Part E: Computers and Digital Techniques, 2001, 148(2): 101-104.
[5]FAN LEI, XU CHANGXIANG, LI JIANHUA. Deniable authentication protocol based on Diffie-Hellman algorithm [J]. IEE Electronics Letters, 2002, 38(4): 705-706.
[6]SHAO ZUHUA. Efficient deniable authentication protocol based on generalized ElGamal signature scheme [J]. Computer Standards and Interfaces, 2004, 26(1): 449-454.
[7]LU RONGXING, CAO ZHENFU. A new deniable authentication protocol from bilinear pairings [J]. Applied Mathematics and Computation, 2005, 168(2): 954-961.
[8]LU RONGXING, CAO ZHENFU. Non-interactive deniable authentication protocol based on factoring [J].Computer Standards and Interfaces,2005,27(4): 401-405.
[9]LEE W-B, WU C-C, WOEI J-T. A novel deniable authentication protocol using generalized ElGamal signature scheme [J]. Information Sciences, 2007, 177(1): 1376-1381.
[10]武涛,郑雪峰,姚宣霞,等.一种新的高效的可否认源认证协议[J].小型微型计算机系统, 2008, 29(10):1786-1788.