Research Article

Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System

Algorithm 2

Fully homomorphic tag generation algorithm.
(1) Function .
(2) do
(3) .
(4) whileis not prime done
(5) return.
(6) Function
(7) forto
(8) .
(9) .
(10) .
(11) if is prime then return done
(12) return.
(13) esle
(14) return 0.
(15) end.