Research Article

Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model

Table 1

The notations.

The cost of a scalar operation in
The cost of a scalar operation in
The cost of a pairing operation
The cost of a Map-To-Point function
bitsThe length of a symmetric key/symmetric ciphertext
bitsThe length of the output of a hash function
bitsThe length of an element in
bitsThe length of an element in
bitsThe length of an element in
bitsThe length of an identity
ROM/STDThe random oracle model/the standard model
Ful/SelThe full-ID model/The selective-ID model
OursThe proposed AMRIBE