The following publications are possibly variants of this publication:
- Multi-authority Attribute Based Encryption with Attribute RevocationZhenpeng Liu, Xianchao Zhu, Shouhua Zhang. cse 2014: 1872-1876 [doi]
- Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with RevocationHua Ma, Enting Dong, Zhenhua Liu, Linchao Zhang. bwcca 2018: 811-820 [doi]
- LWE-based multi-authority attribute-based encryption scheme with hidden policiesQiuting Tian, Dezhi Han, XingAo Liu, Xueshan Yu. ijcse, 19(2):233-241, 2019. [doi]
- A revocable and outsourced multi-authority attribute-based encryption scheme in fog computingShanshan Tu, Muhammad Waqas 0001, Fengming Huang, Ghulam Abbas 0002, Ziaul Haq Abbas. cn, 195:108196, 2021. [doi]
- Multi-Authority Attribute-Based Encryption Scheme from LatticesGuoyan Zhang, Jing Qin, Shams Qazi. jucs, 21(3):483-5001, 2015. [doi]