How to securely outsource cryptographic computations,” (2005)

by S Hohenberger, A Lysyanskaya
Venue:in Proceedings of Theory of Cryptography,