The following publications are possibly variants of this publication:
- Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakageHong-xia Hou, Bo Yang 0003, Mingrui Zhang, Yanwei Zhou, Meijuan Huang. istr, 53:102521, 2020. [doi]
- Efficient chosen ciphertext secure identity-based encryption against key leakage attacksShifeng Sun, Dawu Gu, Shengli Liu. scn, 9(11):1417-1434, 2016. [doi]
- Public key cryptosystems secure against memory leakage attacksShifeng Sun, Shuai Han, Dawu Gu, Shengli Liu. iet-ifs, 10(6):403-412, 2016. [doi]