Research Article

On the Anonymity of Identity-Based Encryption

Table 1

Comparison.

System Security Anonymity degree Anonymity type Security model

Boneh and Franklin [2]IND-ID-CPA
ANON-ID-CPA
Strong1Random oracle
Boyen and Waters [8]IND-sID-CPA
ANON-sID-CPA
Strong2Standard
Gentry [9] ANON-IND-ID-CPA Strong 1 Standard
Ducas [23]IND-sID-CPA
ANON-sID-CPA
Strong2Standard
Lewko [26]IND-ID-CPA
ANON-ID-CPA
Strong2Standard
Chen et al. [24] ANON-IND-ID-CPA Strong 2 Standard