How to securely outsource cryptographic computations (0)

by S Hohenberger, A Lysyanskaya
Venue:in Proc. of TCC, 2005