1. Provable data possession at untrusted stores;Ateniese,2007
2. GQ and schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks;Bellare,2002
3. Aggregate and variafiable encrypted signatures from bolinear maps;Boneh,2003
4. Efficient provenance storage;Champman,2008
5. Enabling personalized search over encrypted outsourced data with efficiency improvement;Fu;IEEE Trans. Parallel Distrib. Syst.,2015