“…Usually the leakage bound is also related to the secret key size, so that a relatively large fraction of the secret key can be leaked. Leakage-resilient schemes in this model include storage schemes [25,30], public-key and identity-based encryption [59,2,56,1,13,27,12,18,47], signature schemes [50,2,13,27,11,57,37,60,61,21], and more (see, e.g., [40,10,63,62]). …”