Research Article
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
Table 1
The notations of the symbols.
| Symbols | Meanings of the symbols |
| | The number of all users | | The number of authorized receivers, | | The computational cost of one bilinear pairing operation | | The cost of symmetric encryption or decryption one message | | The computational cost of one scalar multiplication in | | The computational cost of exponentiation computation in | | The computational cost of multiplication in | | The computational cost of multiplication in | | The computational cost of addition in | | The computational cost of addition in | | The computational cost of exponentiation computation in | | The computational cost of one general hash operation | | The computational cost of one hash-to-point operation | | The bit length of an element in . | | The length of hash value | | The bit length of a plaintext messages |
|
|