Research Article

Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model

Table 2

Comparison of the required communication cost.

SchemesPublic key lengthSecret key lengthCertificate lengthCipher text length

Scheme [3]
Scheme [6]
Scheme [8]
Our scheme