| Algorithm 1: The algorithm of integrity verification | ||
| Let be an encrypted dataset that Sink receives from M. Sink verifies the integrity of QR as follows. Sink performs the following three steps to verify each contributed by si ψ. (1) If = Ø, it could not satisfy Definition 2. Thus the integrity of QR is violated. Quit the algorithm. (2) If ≠ Ø, Sink decrypts all factors in using ki,t only shared with si, and checks whether both of following two conditions are satisfied. If so, add all the data within [low, high] into QR, and then turn to Step (3). Otherwise, the integrity of QR is violated so quit the algorithm. 1) Each factor Fi,v in satisfies following condition:
2) Fi,k and Fi,v+1 satisfy the following formula, where Fi,v and Fi,v+1 are two adjacent factors in .
|