The following publications are possibly variants of this publication:
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchLiming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. TCS, 462:39-58, 2012. [doi]
- Anonymous Attribute-Based Conditional Proxy Re-encryptionXianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai. NSS 2018: 95-110 [doi]
- Further observation on proxy re-encryption with keyword searchXu an Wang, Xinyi Huang, Xiaoyuan Yang 0002, Longfei Liu, Xuguang Wu. jss, 85(3):643-654, 2012. [doi]
- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search SchemesXuanang Yu, Yang Lu 0001, Jinmei Tian, Fen Wang. icccsec 2021: 253-264 [doi]
- Anonymous Conditional Proxy Re-encryption without Random OracleLiming Fang, Willy Susilo, Jiandong Wang. provsec 2009: 47-60 [doi]
- Hierarchical conditional proxy re-encryptionLiming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. csi, 34(4):380-389, 2012. [doi]
- Fuzzy conditional proxy re-encryptionLiming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren. chinaf, 56(5):1-13, 2013. [doi]