Could you include details/links about the insecurity of the protocol you are talking about?
Maybe you will find this interesting: Multiparty Interactive Verification
Could you include details/links about the insecurity of the protocol you are talking about?
Maybe you will find this interesting: Multiparty Interactive Verification