Research Article
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
Table 3
Running time in microsecond.
| | Schemes | Setup | UserKeyGen | CertGen | Encrypt | Decrypt | UpdateSK | Total |
| | Scheme [3] | 28 | 33 | 27 | 50 | 5 | — | 143 | | Scheme [6] | 23 | 10 | 25 | 27 | 18 | — | 105 | | Scheme [8] | 104 | 3 | 34 | 11 | 42 | — | 195 | | Our scheme | 15 | 14 | 29 | 23 | 9 | 3 | 96 |
|
|