Skip to main content


Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Table 2 Algorithm of encryption

From: Feasibility study on security deduplication of medical cloud privacy data

Algorithm 2: Convergent encryption algorithm
1. Enter the convergence key K and the text to be encrypted M
2. Computational ciphertext based on cryptographic algorithms C: CE.Enc(K, M)= > C
3. Output ciphertext C