Research Article

Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience

Figure 5

The main operations of our leakage-resilient scheme.