1. Security in cloud computing: Opportunities and challenges;Ali;Inf. Sci.,2015
2. Provable data possession at untrusted stores;Ateniese,2007
3. Proofs of storage from homomorphic identification protocols;Ateniese,2009
4. Short group signatures;Boneh,2004
5. Random oracles are practical: A paradigm for designing efficient protocols;Bellare,1993