论文部分内容阅读
Analysing some typical identity-based.Encryption schemes,we get that most of them are not
anonymous.In this paper,we present a method to add the anonymity property to those schemes that are not anonymous.