Research Article
Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
Algorithm 2
Fully homomorphic tag generation algorithm.
(1) Function . | (2) do | (3) . | (4) whileis not prime done | (5) return. | (6) Function | (7) forto | (8) . | (9) . | (10) . | (11) if is prime then return done | (12) return. | (13) esle | (14) return 0. | (15) end. |
|