Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Figure 2

Computational cost of different scheme in encryption.