Research Article

LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices

Algorithm 6

Reception of parcel.
Input: ciphertext
Output: delivery result
1: courier executes:
2:
3:
4: send to receiver
5: send to administrator
6: receiver executes:
7:
8:
9: if    then
10:
11:  send to courier
12:  courier executes:
13:
14: if    then
15:  receiver executes:
16:
17:  send to administrator
18:  administrator executes:
19:
20:
21:
22: if    then
23:  delivery result Success
24:  end if
25: else
26:  delivery result Receiver Wrong
27:  end if
28: else
29:  delivery result Parcel Wrong
30: end if
31: return delivery result