1. Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Transactions Information Forensics Secur 8(12):1947–1960
2. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 506–522
3. Alornyo S, Zhao Y, Zhu G, Xiong H (2020) Identity based key-insulated encryption with outsourced equality test. IJ Netw Secur 22(2):257–264
4. Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 65–82
5. Hanaoka G, Hanaoka Y, Imai H (2006) Parallel key-insulated public key encryption. International workshop on public key cryptography. Springer, Berlin, pp 105–122