Research Article

An Anonymous Multireceiver with Online/Offline Identity-Based Encryption

Table 5

The comparisons of ciphertext length in different schemes.

SchemeThe length of ciphertext

Literature [5]
Literature [6]
Literature [8]
Literature [9]
Proposed scheme