Research Article

Multidivisible Online/Offline Cryptography and Its Application to Signcryptions

Figure 9

Description of adversary (or ) attacking (or ) security of (or ).