Research Article

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT

Figure 3

Computational consumption.