1. Provable data possession at untrusted stores;Ateniese,2007
2. Proxy re-signatures: new definitions, algorithms, and applications;Ateniese,2005
3. Key-insulated public key cryptosystems;Dodis,2002
4. Proofs of retrievability via hardness amplification;Dodis,2009
5. Public integrity auditing for shared dynamic cloud data with group user revocation;Jiang;IEEE Trans. Comput.,2016