Research Article

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT

Algorithm 2

Anonymous communication protocol.
Encryption. If the sender just wants to disclose the message anonymously rather than anyone knows where is message
from even the recipient, he computes the ciphertext ; If the sender wants the
recipient to know about its identity, the signature should be attached with the message , compute the ciphertext
. The Encryption operation should done in specific time .
Upload. All the users uploads their ciphertexts to the bulletin board at the specific time . Each user’s ciphertexts are
stored in the bulletin board after this operation.
Download. Each involved users are required to download all the ciphertexts which stored in the bulletin board, each
user does the Download operation at the specific time .
Decryption. The user decrypts the ciphertexts which obtained from the bulletin board in Download operation, one by
one through the private key in specific time . The plaintext is computed as . If there is a
signature attached with the message , then the user can get .