Two prover protocols
The Security of the Cipher Block Chaining Message Authentication Code
Multi-prover interactive proofs: how to remove intractability
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC ’94
Journal of Computer and System Sciences
Proceedings of the twentieth annual ACM symposium on Theory of computing - STOC ’88
Phillip Rogaway
Shafi Goldwasser
Avi Widgerson
Uri Feige
Michael Ben-Or
Mihir Bellare
Towards Developing a Trust-based Security Solution