Research Article

Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience

Table 2

The comparisons of leakage performance and security performance of several schemes and ours.

SchemesDifficult hypothesisRelative leakage rateLeakage modelSecurity model

[29]-1UOWHF1BLMSTD M
[29]-2UOWHF1/4BLMSTD M
[29]-3HCRHF1/2BLMSTD M
[31]GBG1/2BLMGGM
[19]K-linear1/(k + 1)CLMSTD M
[32]GBGLog (logP)CLMGGM
OursA1, A2, A31/3CLMSTD M