Skip to main content
. 2019 Aug 1;21(8):753. doi: 10.3390/e21080753
Algorithm 2 Inter_Eval()
Input:si+1, K, L(X)0,1,,i, F0,1,,i
Output: True or False, L(X)0,1,,i+1, F0,1,,i+1.
  • 1:

    retrieve cert Cei+1

  • 2:

    update the flows F0,1,,i+1 based F0,1,,i and Cei+1

  • 3:

    for each XHInj,j<i+1 do

  • 4:

    for each YLOuti+1 do

  • 5:

      for each WHIni+1 do

  • 6:

       if (XW)(WY)F0,1,,i+1 then

  • 7:

        get the leakage FLIni+1(WY) from the certificate Cei+1

  • 8:

        L(X)i+1 = L(X)i+1 + FLIni+1(WY)

  • 9:

       end if

  • 10:

      end for

  • 11:

    end for

  • 12:

    L(X)0,1,,i+1 = L(X)0,1,,i + L(X)i+1

  • 13:

    if L(X)0,1,,i+1K then

  • 14:

      return False

  • 15:

    end if

  • 16:

    end for

  • 17:

    return True