The following publications are possibly variants of this publication:
- Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud serverAnmin Fu, Yiming Zhu, Guomin Yang, Shui Yu, Yan Yu. cluster, 21(4):1933-1947, 2018. [doi]
- CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted serverShuai Li, Longxia Huang, Anmin Fu, John Yearwood. dcan, 3(4):236-241, 2017. [doi]
- Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud serverAnmin Fu, Shuai Li, Shui Yu, Yuqing Zhang, Yinxia Sun. jnca, 118:102-112, 2018. [doi]
- Securely Outsource Modular Exponentiations With Single Untrusted Cloud ServerDezhi An, Yan Li, Shengcai Zhang, Jun Lu. access, 8:200764-200773, 2020. [doi]
- A New Efficient Algorithm for Secure Outsourcing of Modular ExponentiationsShaojing Fu, Yunpeng Yu, Ming Xu 0002. ieicet, 103-A(1):221-224, 2020. [doi]
- New Algorithms for Secure Outsourcing of Modular ExponentiationsXiaofeng Chen 0001, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou. esorics 2012: 541-556 [doi]