“…Since an adversary can choose its leakage function after seeing the public key(s), in effect we consider functions that leak on the public and secret keys together. This framework has been previously considered for non-homomorphic public key and identity based encryption schemes based on bilinear groups, lattices, and quadratic residuosity [16,26,29]. Additionally, both RPKE and "dual Regev", schemes based on DLWE, can be made leakage resilient; Akavia, Goldwasser, and Vaikunatanathan achieve adaptive leakageresilient RPKE [15], and Dodis, Goldwasser, Kalai, Peikert, and Vaikuntanathan construct leakage-resilient "dual Regev" [19].…”