Research Article
Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval
Input:(i) ⊳ The ciphertext related to the file | (ii) ⊳ The user’s public key given by PIR protocol | (iii) ⊳ The user’s secret key | (iv) ⊳ The user’s set of attributes | Let: ⊳ The set of attributes involved in | (2) Choose a set of constants , | (3) for to do | (4) ifthen⊳ are valid shares of the secret according to | the data | (5) Reconstruct the encryption exponent: | (6) end if | (7) end for | (8) Let are random constants | (9) ifthen⊳ The user’s attributes satisfies | | | | (10) else⊳ cannot successfully computed | (11) ⊳ will get a random Hexadecimal value | (12) end if | Output:The Decryption Token |
|