Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Table 6

Comparison of different schemes.

SchemeOffline/online encryptionAnonymity

Literature [5] nono
Literature [6] nono
Literature [8] noyes
Literature [9] noyes
Proposed scheme yesyes