Research Article
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
Algorithm 2
Integrity verification algorithm.
Input: Root node , corresponding tag , integrity authentication path , | represents numbers of corresponding nodes in | Output: correct, | Let ; | for all do | if then | ; | else | . | ; | if then | ; | else | if then | ; | if and then | Output correct, , ; | else | Output . |
|