Skip to main content
. 2019 May 11;19(9):2187. doi: 10.3390/s19092187
Algorithm 2: Decryption protocol performed by Va
Input: C=U,V,W,S(a,i)j
1: Compute Γ(a,i)j=UVS(a,i)j
2: Retrieve M=WH1(e(σajP,Γ(a,i)jP))