Skip to main content
. 2020 Nov 12;20(22):6471. doi: 10.3390/s20226471
Algorithm 9: Log unsigncryption.
Input: CT,SKIDi,PP.
Output: M.
  • 1:

    Restores wi from me with appropriate attributes: [100]=mewj.

  • 2:

    Use C,C,Dj and SKIDi to compute decryption key: Ys=e(g,g)sα=e(C,Ki)Πjx(e(Cj,Li)e(DjKji))wj.

  • 3:

    Compute h=H(C).

  • 4:

    Use g, Y, C and C to Verify: e(h,Y. xC)e(σCT,g).

  • 5:

       if above check holds, then continue with step 7.

  • 6:

       otherwise, terminate the session.

  • 7:

    Use Ys to decrypt C and obtain M=C.Ys1.