Research Article

IOV Privacy Protection System Based on Double-Layered Chains

Algorithm 4

Identity revocation.
INPUT:  
OUTPUT:  true or false
1: function
2:
3:if   is valid  then
4:
5:return
6:else
7:return
8:end if
9: end function