Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Figure 1

The process of our encryption scheme.