Research Article
Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
Table 1
The comparisons between our scheme and the schemes.
| Schemes | Online encryption | Offline encryption | Decryption | The length of ciphertext | Hierarchy | LR |
| [21] | | | | | No | Yes | [22] | | | | | Yes | No | Ours | | | | | Yes | Yes |
|
|