Research Article
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
Table 5
The comparisons of ciphertext length in different schemes.
| Scheme | The length of ciphertext |
| Literature [5] | | Literature [6] | | Literature [8] | | Literature [9] | | Proposed scheme | |
|
|