From: An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case
 | \(q^m\) | n | k | t | Ciphertext size (KB) | Public key size (KB) | Security level | Semantic security |
---|---|---|---|---|---|---|---|---|
Loidreau’s scheme | \(2^{128}\) | 90 | 24 | 11 | 1.44 | 21.50 | 140 | IND-CCA2 |
\(2^{128}\) | 120 | 80 | 4 | 1.92 | 51.00 | 141 | ||
Wang’s scheme | \(2^9\) | 1020 | 660 | 180 | 1.15 | 980 | 128 | Not Given |
\(2^{10}\) | 1560 | 954 | 203 | 1.95 | 2460 | 192 | ||
Our PKE scheme | \(2^{75}\) | 73 | 21 | 13 | 1.37 | 15.06 | 141 | IND-CCA2 |
\(2^{85}\) | 83 | 18 | 16 | 1.76 | 16.76 | 154 | ||
\(2^{71}\) | 69 | 19 | 13 | 1.22 | 12.25 | 133 | ||
\(2^{101}\) | 99 | 22 | 17 | 2.5 | 28.75 | 196 |