Research Article

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT

Figure 1

Scheduling of n rounds of communication.