Research Article

Multidivisible Online/Offline Cryptography and Its Application to Signcryptions

Figure 15

Description of adversary attacking -security of .