Research Article
Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT
Input: A user’s identity , the public parameters , and the master key . | Output: The user’s private key . | The PKG performs the followings: | randomly chooses ; | computes the private key ; | sends the private key to the corresponding users at specific time ; |
|