Research Article

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT

Figure 2

The four steps of anonymous communication protocol: ① Encryption, ② Upload, ③ Download, ④ Decryption.