4 papers:
- STOC-2014-SahaiW #encryption #how #obfuscation
- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
- ECIR-2011-ArampatzisED
- Enhancing Deniability against Query-Logs (AA, PSE, GD), pp. 117–128.
- OCSC-2007-MaAL #authentication #protocol
- Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
- ICALP-v2-2006-FurukawaKI #compilation #performance
- An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge (JF, KK, HI), pp. 46–57.