The following publications are possibly variants of this publication:
- Certificateless encryption scheme with provable security in the standard model suitable for mobile devicesLunzhi Deng, Shuai Feng, Zhiwei Chen. isci, 613:228-238, 2022. [doi]
- Certificateless Provable Data Possession Scheme Suitable for Smart Grid Management SystemsLunzhi Deng, Zhiwei Chen, Yu Ruan, Han Zhou, Siwei Li. sj, 17(3):4245-4256, September 2023. [doi]
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloudDebiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo. amc, 314:31-43, 2017. [doi]
- A Certificateless Provable Data Possession Scheme for Cloud-Based EHRsJiayan Shen, Peng Zeng 0002, Kim-Kwang Raymond Choo, Chengju Li. tifs, 18:1156-1168, 2023. [doi]
- Certificateless Anonymous Signcryption Scheme With Provable Security in the Standard Model Suitable for Healthcare Wireless Sensor NetworksLunzhi Deng, Bo Wang, Yan Gao 0008, Zhiwei Chen, Siwei Li. iotj, 10(18):15953-15965, September 2023. [doi]
- Provable Data Possession Schemes from Standard Lattices for Cloud ComputingFucai Luo, Saif Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen. cj, 65(12):3223-3239, 2022. [doi]
- Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud StorageYongjun Ren, Jian Shen, Jin Wang, Liming Fang. iih-msp 2014: 795-798 [doi]
- Improved Secure Provable Data Possession Scheme for Cloud StorageXu an Wang, Ruifeng Li. ithings 2022: 456-460 [doi]