Finding Key Leakage in Hierarchical Distribution of Encrypted Data | IEEE Conference Publication | IEEE Xplore