正在加载图片...
Page 11 Client Company Alice Bob /Gen(p, a) Encryption: Enc(m, pk) Input: p, q EP C=m' mod n Output: (pk, sk) (c c2)mod n=m, m2 C2=m2 modn Publickey- pk=(e, n) rekey: sk= Computation Cloud provider performs request: CxC2 calculations on encrypted data Ct C2Page . 11
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有