Research Article

Multidivisible Online/Offline Cryptography and Its Application to Signcryptions

Figure 11

Description of adversary attacking security of .