Research Article
Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience
Table 2
The comparisons of leakage performance and security performance of several schemes and ours.
| Schemes | Difficult hypothesis | Relative leakage rate | Leakage model | Security model |
| [29]-1 | UOWHF | 1 | BLM | STD M | [29]-2 | UOWHF | 1/4 | BLM | STD M | [29]-3 | HCRHF | 1/2 | BLM | STD M | [31] | GBG | 1/2 | BLM | GGM | [19] | K-linear | 1/(kā+ā1) | CLM | STD M | [32] | GBG | Log (logP) | CLM | GGM | Ours | A1, A2, A3 | 1/3 | CLM | STD M |
|
|