1. Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., Waters, B.: Computing on authenticated data. Cryptology ePrint Archive, Report 2011/096 (2011),
http://eprint.iacr.org/
2. Lecture Notes in Computer Science;G. Ateniese,2005
3. Lecture Notes in Computer Science;N. Attrapadung,2011
4. Lecture Notes in Computer Science;M. Bellare,1994
5. Lecture Notes in Computer Science;M. Bellare,2003