The following publications are possibly variants of this publication:
- Continuous leakage-resilient certificate-based encryptionJiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang, Futai Zhang. isci, 355-356:1-14, 2016. [doi]
- Certificate-Based Encryption Resilient to Key LeakageQihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang. iacr, 2015:314, 2015. [doi]
- Certificate-based encryption resilient to key leakageQihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang. jss, 116:101-112, 2016. [doi]
- Certificate-Based Encryption Resilient to Continual Leakage in the Standard ModelYuyan Guo, Jiguo Li, Mingming Jiang, Lei Yu, Shimin Wei. scn, 2020, 2020. [doi]
- Leakage-resilient identity-based encryption schemeSujuan Li, Futai Zhang. ijguc, 4(2/3):187-196, 2013. [doi]
- Leakage-resilient Attribute-based Encryption with CCA2 SecurityLeyou Zhang, Yujie Shang. ijnsec, 21(5):819-827, 2019. [doi]
- Leakage-Resilient Attribute-Based Encryption with Attribute-HidingYijian Zhang, Yunhao Ling, Jie Chen, LuPing Wang. icisc 2024: 113-132 [doi]
- Leakage-Resilient Attribute-Based Encryption with Attribute-HidingYijian Zhang, Yunhao Ling, Jie Chen, LuPing Wang. iacr, 2024:388, 2024. [doi]
- Identity-Based Encryption Resilient to Continual Auxiliary LeakageTsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu. eurocrypt 2012: 117-134 [doi]