Research Article
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
Table 6
Comparison of different schemes.
| Scheme | Offline/online encryption | Anonymity |
| Literature [5] | no | no | Literature [6] | no | no | Literature [8] | no | yes | Literature [9] | no | yes | Proposed scheme | yes | yes |
|
|