Research Article

Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model

Figure 2

Relation between encryption times and message sizes.