Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Table 1

The notations of the symbols.

Symbols Meanings of the symbols

The number of all users
The number of authorized receivers,
The computational cost of one bilinear pairing operation
The cost of symmetric encryption or decryption one message
The computational cost of one scalar multiplication in
The computational cost of exponentiation computation in
The computational cost of multiplication in
The computational cost of multiplication in
The computational cost of addition in
The computational cost of addition in
The computational cost of exponentiation computation in
The computational cost of one general hash operation
The computational cost of one hash-to-point operation
The bit length of an element in .
The length of hash value
The bit length of a plaintext messages