Research Article
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Algorithm 2
Filter coefficient prediction.
Input: Message Field , integer , Hash function | Output: TPA response | () = allocate bits to zero | () for each in | () calculate hash value | () for each | () Compute () | () if | () response from TPA = FALSE | () else | () response from TPA = TRUE |
|