Skip to main content
. Author manuscript; available in PMC: 2017 Sep 14.
Published in final edited form as: IEEE Trans Dependable Secure Comput. 2015 Oct 1;14(5):463–477. doi: 10.1109/TDSC.2015.2484326

Algorithm 1.

Data aggregation and recovery of the EFT scheme, which is run by an untrusted party.

1: sum ← 0
2: Faulted ← ∅
3: for all jN do
4: sumsum+ GET_ENCRYPTED_VALUE_FROM(j, timeout)
5: if timeout happened or no connection with j then
6:   FaultedFaulted ∪ {j}
7: if Faulted = ∅ then
8: return sum
9: // Recovery subprotocol.
10: for all jN do
11: sumsum + GET_RECOVERY_KEY_FROM(j, Faulted)
12: return sum