1. Generating hard instances of lattice problems;Ajtai,1996
2. A public-key cryptosystem with worst-case/avarage-case equivalence;Ajtai,1997
3. Outsourcing proofs of retrievability;Armknecht;IEEE Trans. Cloud Comput.,2018
4. Provable data possession at untrusted stores;Ateniese,2007
5. Scalable and efficient provable data possession;Ateniese,2008