Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Table 3

The comparisons of computation cost in different encryption schemes.

SchemeThe cost of encryption

Literature [5]
Literature [6]
Literature [8]
Literature [9]
Proposed scheme