1. Achieving privacy in verifiable computation with multiple servers–without FHE and without pre-processing;Ananth,2014
2. From secrecy to soundness: efficient verification via secure computation;Applebaum,2010
3. Trading group theory for randomness;Babai,1985
4. Delegatable homomorphic encryption with applications to secure outsourcing of computation;Barbosa,2012
5. Secure schemes for secret sharing and key distribution;Beimel,1996