Due to the rising of on-line computer and communication applications, users require an anonymous channel to transfer sensitive or confidential data on the networks. How to construct a safe communication environment to guarantee the mutual anonymity during