Research Article
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
Table 4
The comparisons of computation cost in different decryption schemes.
| Scheme | The cost of decryption |
| Literature [5] | | Literature [6] | | Literature [8] | | Literature [9] | | Proposed scheme | |
|
|