The following publications are possibly variants of this publication:
- Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakageHong-xia Hou, Bo Yang 0003, Mingrui Zhang, Yanwei Zhou, Meijuan Huang. istr, 53:102521, 2020. [doi]
- Key-policy attribute-based encryption against continual auxiliary input leakageJiguo Li, Qihong Yu, Yichen Zhang, Jian Shen 0001. isci, 470:175-188, 2019. [doi]
- Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakageJiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. scn, 9(10):1016-1024, 2016. [doi]
- Leakage-resilient identity-based encryption schemeSujuan Li, Futai Zhang. ijguc, 4(2/3):187-196, 2013. [doi]
- LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set DelegationBo Yang 0003, Mingwu Zhang. provsec 2012: 125-142 [doi]
- Practical leakage-resilient identity-based encryption from simple assumptionsSherman S. M. Chow, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters. ccs 2010: 152-161 [doi]