From: Feasibility study on security deduplication of medical cloud privacy data
Algorithm 3: Decryption algorithm
1. Input convergence key and ciphertext C
2. Execution algorithm: CE.Dec(K, C)= > M
3. Output: Clear text M