Research Article

Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing

Algorithm 2

Security analysis experiment.
Input: the key of challenger, the plaintext , random value
Output: Security judgment of the algorithm
(1) Challenger setup a instance of , runs , gets key , and sends to adversary
(2) sends to
(3) outputs a pair of locations , , sends them to
(4) computes , and sends to as Plaintext
(5) chooses a uniform bit b, and sends to
(6) generates a interact script, outputs
(7) If , the experiment outputs 1, which means the adversary success, and 0 otherwise