1. Improved delegation of computation using fully homomorphic encryption;Chung,2010
2. Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing;Dong,2017
3. Wallet databases with observers;Chaum,1992
4. How to securely outsource cryptographic computations;Hohenberger,2005
5. Non-interactive verifiable computing: Outsourcing computation to untrusted workers;Gennaro,2010