Research Article

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT

Algorithm 1

Private key protocol.
Input: A user’s identity , the public parameters , and the master key .
Output: The user’s private key .
 The PKG performs the followings:
 randomly chooses ;
 computes the private key ;
 sends the private key to the corresponding users at specific time ;