Research Article
An Intelligent Blockchain and Software-Defined Networking-Based Evidence Collection Architecture for Cloud Environment
Algorithm 3
CB‐ EL GAMAL (Pseudocode).
Input: Public key and input data | Outputs: Ciphertext | (1) | Initialize public key (Pu(SK)) and Input data (d) | (2) | If (d = Confidential) | (3) | Split data d ⟶ d1 and d2 | (4) | For data d1 | (5) | Calculate ciphertext 1(c1) as, | (6) | c1 = d1 φd2 | (7) | End for | (8) | For data d2 | (9) | Initiate Pu(SK), d2 at input layer | (10) | Calculate ciphertext 2 (c2) in hidden layer, | (11) | ca = k × P//k is a random number | (12) | cb = d2 + k × Pu(SK) | (13) | c2 = (ca, cb) | (14) | End for | (15) | Get ciphertext (c) as, | (16) | c = (c1, c2) | (17) | Else | (18) | For d | (19) | Repeat step number (8 to 13) | (20) | End for | (21) | End if | (21) | End |
|