|
Algorithm 9: Log unsigncryption. |
Input: . Output: .
-
1:
Restores from with appropriate attributes: .
-
2:
Use and to compute decryption key: .
-
3:
Compute .
-
4:
Use , , and to .
-
5:
if above check holds, then continue with step 7.
-
6:
otherwise, terminate the session.
-
7:
Use to decrypt and obtain .
|