1. Van Dijk, M., Juels, A.: On the impossibility of cryptography alone for privacy-preserving cloud computing. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec’10), pp. 1–8. USENIX Association (2010)
2. Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) Computer Security ESORICS 2012, volume 7459 of Lecture Notes in Computer Science, pp. 541–556. Springer, Berlin (2012)
3. Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science, pp. 264–282. Springer, Berlin (2005)
4. Kuppusamy, P.G.L., Rangasamy, J.: On secure outsourcing of cryptographic computations to cloud. In: ACM Symposium on Information Computer and Communications Security (ASIACCS). ACM (2014)
5. Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S.M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Kutyowski, M., Vaidya, J. (eds.) Computer Security—ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pp. 326–343. Springer, Berlin (2014)