Research Article
On the Anonymity of Identity-Based Encryption
| System | Security | Anonymity degree | Anonymity type | Security model |
| Boneh and Franklin [2] | IND-ID-CPA ANON-ID-CPA | Strong | 1 | Random oracle | Boyen and Waters [8] | IND-sID-CPA ANON-sID-CPA | Strong | 2 | Standard | Gentry [9] | ANON-IND-ID-CPA | Strong | 1 | Standard | Ducas [23] | IND-sID-CPA ANON-sID-CPA | Strong | 2 | Standard | Lewko [26] | IND-ID-CPA ANON-ID-CPA | Strong | 2 | Standard | Chen et al. [24] | ANON-IND-ID-CPA | Strong | 2 | Standard |
|
|