1. Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., shelat, a., Waters, B.: Computing on authenticated data. Cryptology ePrint Archive, Report 2011/096 (2011). https://eprint.iacr.org/2011/096
2. Lecture Notes in Computer Science;M Bellare,2003
3. Lecture Notes in Computer Science;D Boneh,2004
4. Lecture Notes in Computer Science;D Boneh,2009
5. Lecture Notes in Computer Science;D Boneh,1995