From: Feasibility study on security deduplication of medical cloud privacy data
Algorithm 2: Convergent encryption algorithm | |
---|---|
1. Enter the convergence key K and the text to be encrypted M | |
2. Computational ciphertext based on cryptographic algorithms C: CE.Enc(K, M)= > C | |
3. Output ciphertext C |