Let di,1, di,2, …, di,N be N data items collected by si during time slot t. For simplicity, we assume dmin ≤ di,1 ≤ … ≤ di,N ≤ dmax. Let Di = {dmin, di,1, …, di,N, dmax}. Then si performs the following steps. (1) Compute the 0-1 code of each data item. (2) Build the encrypted constraint chain Cτ,i of Di with τ and ki,t. Assuming Cτ,i = Fi,1⋈Fi,2⋈...Fi,δ, we can compute δ and Fi,j as follows.
(3) Compute the comparator of UB(Fi,j), where 1 ≤ j ≤ δ − 1. It means computing HNE0(UB(Fi,j)) and HNE1(UB(Fi,j)). Then, add the comparator set which contains the fewest elements into Ωi. Thus we have,
where min(X, Y) denotes the set containing the fewest elements. (4) Send the following message to M, where id(si) denotes the ID of si in networks.
|