Research Article
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
Generate n = q p where p and q are both random | large prime; | Generate g as a random number of | | Public key (n,g), Private key (p,q) | #encryption: | randomly select r < n | mod | return | #decryption: | | mod | return | #addition: | | return |
|