Research Article

Tree-Based Public Key Encryption with Conjunctive Keyword Search

Figure 2

An example of building an index tree.