| Algorithm 1: Encryption protocol performed by |
|
Input: Pseudonym of and message M. 1: Verify , and compute 2: Choose randomly. 3: Compute 4: Compute cipher text as 5: Transmit C to . |
| Algorithm 1: Encryption protocol performed by |
|
Input: Pseudonym of and message M. 1: Verify , and compute 2: Choose randomly. 3: Compute 4: Compute cipher text as 5: Transmit C to . |