Skip to main content

Table 3 Algorithm of decryption

From: Feasibility study on security deduplication of medical cloud privacy data

Algorithm 3: Decryption algorithm

1. Input convergence key and ciphertext C

2. Execution algorithm: CE.Dec(K, C)= > M

3. Output: Clear text M