The following publications are possibly variants of this publication:
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegationShengmin Xu, Guomin Yang, Yi Mu 0001. isci, 479:116-134, 2019. [doi]
- Efficient public key encryption with revocable keyword searchYong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, Willy Susilo. scn, 7(2):466-472, 2014. [doi]