The following publications are possibly variants of this publication:
- Leakage-Resilient Attribute-Based Encryption with Attribute-HidingYijian Zhang, Yunhao Ling, Jie Chen, LuPing Wang. icisc 2024: 113-132 [doi]
- Leakage-resilient Attribute-based Encryption with CCA2 SecurityLeyou Zhang, Yujie Shang. ijnsec, 21(5):819-827, 2019. [doi]
- Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof SystemLeyou Zhang, Jingxia Zhang, Yi Mu. cj, 60(4):541-554, 2017. [doi]
- Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and ConstructionsMingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu. ispec 2013: 75-90 [doi]
- Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and ConstructionMingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu. iacr, 2013:247, 2013. [doi]
- Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct RevocationXiaoxu Gao, Leyou Zhang, Gongcheng Hu. fcs2 2019: 21-35 [doi]
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodingsJie Zhang 0040, Jie Chen, Junqing Gong, Aijun Ge, Chuangui Ma. dcc, 86(6):1339-1366, 2018. [doi]