Research Article

Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model

Figure 3

Relation between decryption times and message sizes.