The following publications are possibly variants of this publication:
- Anonymous attribute-based proxy re-encryption for access control in cloud computingYinghui Zhang, Jin Li 0002, Xiaofeng Chen 0001, Hui Li. scn, 9(14):2397-2411, 2016. [doi]
- Anonymous Conditional Proxy Re-encryption without Random OracleLiming Fang, Willy Susilo, Jiandong Wang. provsec 2009: 47-60 [doi]
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchLiming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. TCS, 462:39-58, 2012. [doi]
- Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryptionWeidong Zhong, Xu an Wang, Ziqing Wang, Yi Ding. ifip8-3 2011: 969-973 [doi]
- Conditional Attribute-Based Proxy Re-Encryption and Its InstantiationLisha Yao, Jian Weng 0001, Bimei Wang. iacr, 2022:637, 2022. [doi]
- Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWEXiaojian Liang, Jian Weng 0001, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu. iacr, 2021:613, 2021. [doi]
- Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWEXiaojian Liang, Jian Weng 0001, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu. esorics 2021: 147-168 [doi]
- Certificate-Based Conditional Proxy Re-EncryptionJiguo Li, Xuexia Zhao, Yichen Zhang. NSS 2014: 299-310 [doi]