Research Article
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
Table 3
Running time in microsecond.
| Schemes | Setup | UserKeyGen | CertGen | Encrypt | Decrypt | UpdateSK | Total |
| Scheme [3] | 28 | 33 | 27 | 50 | 5 | — | 143 | Scheme [6] | 23 | 10 | 25 | 27 | 18 | — | 105 | Scheme [8] | 104 | 3 | 34 | 11 | 42 | — | 195 | Our scheme | 15 | 14 | 29 | 23 | 9 | 3 | 96 |
|
|