Research Article
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
Table 3
The comparisons of computation cost in different encryption schemes.
| Scheme | The cost of encryption |
| Literature [5] | | Literature [6] | | Literature [8] | | Literature [9] | | Proposed scheme | |
|
|