The following publications are possibly variants of this publication:
- Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order GroupsXiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong. closer 2017: 281-292
- Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseZhen Liu, Duncan S. Wong. cj, 59(7):983-1004, 2016. [doi]
- Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large UniverseZhen Liu, Duncan S. Wong. iacr, 2014:616, 2014. [doi]
- Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseZhen Liu, Duncan S. Wong. acns 2015: 127-146 [doi]
- An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order GroupsRu Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo. provsec 2017: 39-56 [doi]