The following publications are possibly variants of this publication:
- Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseZhen Liu, Duncan S. Wong. cj, 59(7):983-1004, 2016. [doi]
- Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large UniverseZhen Liu, Duncan S. Wong. iacr, 2014:616, 2014. [doi]
- Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order GroupsXiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong. closer 2017: 281-292
- Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order GroupsXiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong. iacr, 2016:1140, 2016. [doi]
- Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceabilityKai Zhang, Hui Li, Jianfeng Ma, Ximeng Liu. chinaf, 61(3):32102, 2018. [doi]
- Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updatingZechao Liu, Zoe L. Jiang, Xuan Wang 0002, Siu-Ming Yiu. jnca, 108:112-123, 2018. [doi]