“…Indeed, the threat model for DB is in constant evolution [23], and new attacks appear regularly: [4,11] present more than 40 protocols, most of which are vulnerable to at least one attack. In particular, the notion of terrorist fraud and how to provably resist it lead to numerous publications, e.g., [5,21,24,39].…”