“…Moreover, we can implement it with smaller parameters and do not need to compensate for the security loss. As a result, tightly secure schemes drew a lot of attention in the last few years, from basic primitives, such as PKE [14,15,22] and signature [1,16] schemes, to more advanced ones, such as (non-interactive) key exchange [18,23,11], zero-knowledge proof [3,2], IBE [10,6,21,24] and functional encryption [40] schemes. Currently, research is carried out to reduce the cost for tight security.…”