M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Proc. 1996 IACR Int'l Conf. Advances in Cryptology
DOI : 10.1007/3-540-68697-5_1

URL : http://uncensored.citadel.org/pub/unix/bck2.pdf

M. Bellare and P. Rogaway, The Exact Security of Digital Signatures-How to Sign with RSA and Rabin, Proc. 1996 Int'l Conf. Advances in Cryptology
DOI : 10.1007/3-540-68339-9_34

J. Benaloh and M. De-mare, One-Way Accumulators: A Decentralized Alternative to Digital Signatures, Proc. 1993 IACR Int'l Conf. Advances in Cryptology
DOI : 10.1007/3-540-48285-7_24

URL : http://www.akira.ruc.dk/~keld/teaching/algoritmedesign_f08/artikler/10/benaloh94.pdf

N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer, From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on, ITCS '12
DOI : 10.1145/2090236.2090263

URL : http://www.tau.ac.il/%7Etromer/papers/snark-20110817.pdf

M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor, Checking the correctness of memories, Algorithmica, vol.12, issue.2-3, 1994.

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Advances in cryptology, 2003.
DOI : 10.1007/3-540-39200-9_26

URL : http://eprint.iacr.org/2002/175.ps.gz

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairing, Proc. 2001 IACR Int'l Conf. Advances in Cryptology
DOI : 10.1007/s00145-004-0314-9

URL : http://www.iacr.org/archive/asiacrypt2001/22480516.pdf

R. Canetti, O. Paneth, D. Papadopoulos, and N. Triandopoulos, Verifiable Set Operations over Outsourced Databases, Proc. 2014 IACR Int'l Conf. Public-Key Cryptography
DOI : 10.1007/978-3-642-54631-0_7

S. A. Crosby and D. S. Wallach, Authenticated Dictionaries, ACM Transactions on Information and System Security, vol.14, issue.2, p.17, 2011.
DOI : 10.1145/2019599.2019602

L. Ferretti, M. Colajanni, and M. Marchetti, Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, p.2014
DOI : 10.1109/TPDS.2013.154

M. J. Freedman, K. Nissim, and B. Pinkas, Efficient Private Matching and Set Intersection, Proc. 2004 IACR Int'l Conf. Advances in Cryptology
DOI : 10.1007/978-3-540-24676-3_1

URL : http://www.cs.bgu.ac.il/~kobbi/papers/FNP04-pm.ps

H. Hacigümü¸hacigümü¸s, B. Iyer, C. Li, and S. Mehrotra, Executing sql over encrypted data in the database-service-provider model, Proc. 2002 ACM SIGMOD Int. Conf. Management of Data, 2002.

J. Hong, T. Wen, Q. Gu, and G. Sheng, Query integrity verification based-on mac chain in cloud storage, Proc. 13th IEEE/ACIS Int. Conf. Computer and Information Science, 2014.
DOI : 10.2991/ijndc.2014.2.4.5

A. E. Kosba, D. Papadopoulos, C. Papamanthou, M. F. Sayed, E. Shi et al., Trueset: Faster verifiable set computations, Proc. 23rd USENIX Int'l Conf. Security Symposium, 2014.

A. Miller, M. Hicks, J. Katz, and E. Shi, Authenticated data structures, generically, Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '14, p.2014
DOI : 10.1145/2535838.2535851

URL : http://www.cs.umd.edu/~mwh/papers/gpads.pdf

E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, ACM Transactions on Storage, vol.2, issue.2, 2006.
DOI : 10.1145/1149976.1149977

URL : http://snekker.ics.uci.edu/publications/./papers/mnt_ndss_2004.pdf

M. Narasimha and G. Tsudik, DSAC, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, 2005.
DOI : 10.1145/1099554.1099604

L. Nguyen, Accumulators from Bilinear Pairings and Applications, Proc. 2005
DOI : 10.1007/978-3-540-30574-3_19

. Int and . Conf, Topics in Cryptology, 2005.

. Nist, The digital signature standard, Communications of the ACM, vol.35, issue.7, 2013.
DOI : 10.1145/129902.129904

R. A. Popa, J. R. Lorch, D. Molnar, H. J. Wang, and L. Zhuang, Enabling security in cloud storage slas with cloudproof, Proc. USENIX Annual Technical Conf, 2011.

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011.
DOI : 10.1145/2043556.2043566

F. P. Preparata and D. V. Sarwate, Computational complexity of Fourier transforms over finite fields, Mathematics of Computation, vol.31, issue.139, p.31, 1977.
DOI : 10.1090/S0025-5718-1977-0436662-8

P. Samarati and S. D. Di-vimercati, Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
DOI : 10.1145/1755688.1755690

R. Tamassia, Authenticated Data Structures, 2003.
DOI : 10.1007/978-3-540-39658-1_2

M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data, Proc. 33rd Int. Conf. Very Large Data Bases. VLDB Endowment, 2007.