Skip to main content

Table 2 Algorithm of encryption

From: Feasibility study on security deduplication of medical cloud privacy data

Algorithm 2: Convergent encryption algorithm

1. Enter the convergence key K and the text to be encrypted M

2. Computational ciphertext based on cryptographic algorithms C: CE.Enc(K, M)= > C

3. Output ciphertext C