The following publications are possibly variants of this publication:
- Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor networkXiujie Zhang, Xingbing Fu, Lu Hong, Yu Liu, Liangliang Wang. ijdsn, 16(6), 2020. [doi]
- A Provably Secure Ring Signature Scheme with Bounded Leakage ResilienceHuaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer. ispec 2014: 388-402 [doi]
- Provably Secure Certificate-based Conditional Proxy Re-encryptionJiguo Li, Xuexia Zhao, Yichen Zhang, Wei Yao. jise, 32(4):813-830, 2016. [doi]
- Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakageJiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. scn, 9(10):1016-1024, 2016. [doi]
- Hierarchical attribute based encryption with continuous leakage-resilienceJiguo Li, Qihong Yu, Yichen Zhang. isci, 484:113-134, 2019. [doi]
- Identity-based broadcast encryption with continuous leakage resilienceJiguo Li, Qihong Yu, Yichen Zhang. isci, 429:177-193, 2018. [doi]
- Anonymous Identity-Based Encryption with Bounded Leakage ResiliencePengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang. aina 2015: 287-292 [doi]
- Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-ResilienceLinru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu. indocrypt 2020: 666-690 [doi]
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilienceLinru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu. iacr, 2020:1353, 2020. [doi]
- Leakage-resilient certificate-based encryptionQihong Yu, Jiguo Li, Yichen Zhang. scn, 8(18):3346-3355, 2015. [doi]