Research Article

Tree-Based Public Key Encryption with Conjunctive Keyword Search

Figure 3

An example of search process.