**5. Proposed Scheme**

In this section, we present a privacy preserving data aggregation scheme that employs the Chinese remainder theorem, one-way hash chain, and properties of modulo *n*<sup>2</sup> to aggregate the data [68,80,81].
