Research Article
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
Table 2
Comparison of the required communication cost.
| Schemes | Public key length | Secret key length | Certificate length | Cipher text length |
| Scheme [3] | | | | | Scheme [6] | | | | | Scheme [8] | | | | | Our scheme | | | | |
|
|