4 papers:
STOC-2014-SahaiW #encryption #how #obfuscation- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
ECIR-2011-ArampatzisED- Enhancing Deniability against Query-Logs (AA, PSE, GD), pp. 117–128.
OCSC-2007-MaAL #authentication #protocol- Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
ICALP-v2-2006-FurukawaKI #compilation #performance- An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge (JF, KK, HI), pp. 46–57.