Skip to main content

Table 2 Algorithm of encryption

From: Feasibility study on security deduplication of medical cloud privacy data

Algorithm 2: Convergent encryption algorithm
1. Enter the convergence key K and the text to be encrypted M
2. Computational ciphertext based on cryptographic algorithms C: CE.Enc(K, M)= > C
3. Output ciphertext C