Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Figure 3

Computational cost of different scheme in decryption.