1. Proxy re-signatures: new definitions, algorithms, and applications;Ateniese,2005
2. Provable data possession at untrusted stores;Ateniese,2007
3. Scalable and efficient provable data possession;Ateniese,2008
4. Divertible protocols and atomic proxy cryptography;Blaze,1998
5. Proofs of retrievability: theory and implementation;Bowers,2009