The document discusses a verifiable computation scheme that utilizes multiple cryptographic keys to enhance the security of outsourced data in dynamic environments. It introduces a novel homomorphic verifiable tag technique, enabling efficient and publicly verifiable computations, including inner products and group queries, while minimizing communication costs. The findings suggest that the proposed methods outperform existing techniques, addressing the pressing need for improved data security mechanisms as user numbers and network congestion increase.