Research Article
Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing
Algorithm 2
Security analysis experiment.
| Input: the key of challenger, the plaintext , random value | | Output: Security judgment of the algorithm | (1) | Challenger setup a instance of , runs , gets key , and sends to adversary | (2) | sends to | (3) | outputs a pair of locations , , sends them to | (4) | computes , and sends to as Plaintext | (5) | chooses a uniform bit b, and sends to | (6) | generates a interact script, outputs | (7) | If , the experiment outputs 1, which means the adversary success, and 0 otherwise |
|