Research Article

Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience

Table 1

The comparisons between our scheme and the schemes.

SchemesOnline encryptionOffline encryptionDecryptionThe length of ciphertextHierarchyLR

[21]NoYes
[22]YesNo
OursYesYes