Skip to main content
. 2019 May 11;19(9):2187. doi: 10.3390/s19092187
Algorithm 1: Encryption protocol performed by Vb
Input: Pseudonym PN(a,i)j of Vb and message M.
1: Verify SIG(τ(a,i)j,t(a,i),SRi), and compute λ(a,i)j=e(τ(a,i)j,σajP)
2: Choose k{0,1}n randomly.
3: Compute ρ=H2(k,M)
4: Compute cipher text as
C=H(ρP)(λ(a,i)j)k,e(P,σaj|P)k,MH1(e(σajP,H(ρP)P))
5: Transmit C to Va.