Research Article

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

Algorithm 2

Integrity verification algorithm.
Input: Root node , corresponding tag , integrity authentication path ,
represents numbers of corresponding nodes in
Output: correct,  
 Let ;
for  all    do
if    then
  ;
else
  .
  ;
if    then
  ;
else
if    then
  ;
if   and   then
Output correct, , ;
else
Output .