The following publications are possibly variants of this publication:
- A Multi-users Searchable Encryption Scheme with Proxy Re-encryptionYa-ling Zhang, Kai Liu, Shang-ping Wang, Qin-dong Sun. ifip8-3 2014: 563-567 [doi]
- Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing SchemeGuangxia Xu, Yuling Huang, Chuang Ma. cloudnet 2023: 372-380 [doi]
- Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from latticeXiaoling Yu, Chungen Xu, Lei Xu 0019, Lin Mei. soco, 26(21):11139-11151, 2022. [doi]
- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search SchemesXuanang Yu, Yang Lu 0001, Jinmei Tian, Fen Wang. icccsec 2021: 253-264 [doi]