Research Article

Query Privacy Preserving for Data Aggregation in Wireless Sensor Networks

Algorithm 2

The key generation.
Input: security parameter, ; query types, .
Output: key sets ().
(1)Begin
(2) Generate a tuple
(3) Find random -bit primes
(4) Let
(5) Find a set of elliptic curve points
(6) Generate a tuple ()
(7)For node
(8)  Choose points from
(9)  
(10)  For query ()
(11)   , ,
(12)   
(13)   
(14)  End For
(15)End For
(16)Return ().
(17)End