On verifiable implicit asking protocols for RSA computation