“…ππ’ . π) as an input and proceed as follow: Generate a random number π and calculates:ο· π = π π , π = (π’ π£ ) , π = (π’ π£ ) ο· ππ = π (π’ π£ ) , ππ = π (π’ π£ )The ciphertext passes through one time signature, OTS, algorithm as done by the authors in[6,8]. OTS algorithm incorporates three stages; creating key pair (ππ’ , π ππ ), message signing πππ(π ππ , π, π , π ) and signature verification πππ(π£π, π, π , π ).The sender sends the ciphertext ππ₯ = πππ(π π, π, π , π ), also broadcasts (ππ , ππ ).Decryption: after signature verification done; each user can extract the original message m by calculating: if πππ(π£π, π, π , π ) = 1 then π = π(if the equation ππ (π’ π£ ) = (π’ π£ ) = π holds then compute π = π π and for receiver 2: if the equation ππ (π’ π£ ) = (π’ π£ ) = π holds then compute π = start with R.H.S to reach the L.H.S m: start with R.H.S to reach the L.H.S m: L.H.S: The ciphertext of our variant proposed algorithm achieves the public verifiability by verifying the following equation respectively for each user: ο· User 1: ππ = π (π’ π£ ) i.e ππ (π’ π£ ) = π , ππ = π (π’ π£ ) ο· ππ (π’ π£ ) = π π π’ π£ (π’ π£ ) = π In addition, anyone can verify that π corresponds to π and π through πππ.…”