Figure 1. Configuration of a system that exploits an MA-based scheme

From

A Scheme for Delegating Program Executions without Disclosing Secret Values

Shinsuke Tamura, Shuji Taniguchi

Information Security and Computer Fraud. 2014, 2(2), 21-27 doi:10.12691/iscf-2-2-1