S Zeng, Y Chen, S Tan, M He - Peer-to-Peer Networking and Applications, 2017 - Springer
Deniable ring authentication can be used to facilitate privacy-preserving communication
since the receiver accepts authentication while cannot convince a third party that the fact of …