Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Table 4

The comparisons of computation cost in different decryption schemes.

SchemeThe cost of decryption

Literature [5]
Literature [6]
Literature [8]
Literature [9]
Proposed scheme