Introduction to Secure Outsourcing Computation