I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
7
,
No
.
2
,
A
p
r
il
201
7
,
p
p
.
9
50
~
9
60
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v7
i
2
.
p
p
9
5
0
-
9
6
0
950
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
JE
C
E
An I
m
pro
v
ed
In
t
eg
ra
ted
H
a
sh a
nd
At
t
ribut
ed
b
a
sed
Encry
ption
M
o
del on High
Di
m
ensio
na
l
Da
ta i
n
Clo
ud Env
iro
n
m
e
nt
Sa
t
heesh
K
S V
A
K
a
v
uri
1
,
G
a
ng
a
dh
a
ra
Ra
o
K
a
ncherla
2
,
B
a
s
a
v
es
w
a
ra
r
a
o
B
o
bb
a
3
1
Dh
a
n
e
k
u
la In
stit
u
te Of
En
g
in
e
e
rin
g
&
T
e
c
h
n
o
lo
g
y
,
De
p
a
rte
m
e
n
t
o
f
CS
E
,
In
d
ia
2,
3
De
p
a
rtem
e
n
t
o
f
CS
E
,
A
c
h
a
r
y
a
Na
g
a
rju
n
a
Un
iv
e
rsit
y
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
l
18
,
2
0
1
6
R
ev
i
s
ed
Feb
16
,
2
0
1
7
A
cc
ep
ted
Mar
4
,
2
0
1
7
C
lo
u
d
c
o
m
p
u
ti
n
g
is
a
d
istri
b
u
t
e
d
a
rc
h
it
e
c
tu
re
w
h
e
re
u
se
r
c
a
n
sto
re
th
e
ir
p
riv
a
te,
p
u
b
li
c
o
r
a
n
y
a
p
p
li
c
a
ti
o
n
so
f
tw
a
re
c
o
m
p
o
n
e
n
ts
o
n
it
.
M
a
n
y
c
lo
u
d
b
a
se
d
p
riv
a
c
y
p
ro
tec
ti
o
n
so
lu
ti
o
n
s
h
a
v
e
b
e
e
n
i
m
p
le
m
e
n
ted
,
h
o
w
e
v
e
r
m
o
st
o
f
th
e
m
o
n
ly
f
o
c
u
s
o
n
li
m
it
e
d
d
a
ta
re
so
u
rc
e
s
a
n
d
st
o
ra
g
e
f
o
rm
a
t.
Da
ta
c
o
n
f
id
e
n
ti
a
li
ty
a
n
d
in
e
ff
icie
n
t
d
a
ta
a
c
c
e
ss
m
e
th
o
d
s
a
re
th
e
m
a
jo
r
issu
e
s
w
h
ich
b
lo
c
k
th
e
c
lo
u
d
u
se
rs
to
sto
re
th
e
ir
h
ig
h
d
im
e
n
sio
n
a
l
d
a
ta.
W
it
h
m
o
re
a
n
d
m
o
re
c
lo
u
d
b
a
se
d
a
p
p
li
c
a
ti
o
n
s
a
re
b
e
in
g
a
v
a
il
a
b
le
a
n
d
sto
re
d
o
n
v
a
rio
u
s
c
lo
u
d
se
rv
e
rs,
a
n
o
v
e
l
m
u
lt
i
-
u
se
r
b
a
se
d
p
riv
a
c
y
p
ro
tec
ti
o
n
m
e
c
h
a
n
ism
n
e
e
d
to
d
e
sig
n
a
n
d
d
e
v
e
lo
p
t
o
im
p
ro
v
e
th
e
p
r
iv
a
c
y
p
ro
tec
ti
o
n
o
n
h
ig
h
d
i
m
e
n
sio
n
a
l
d
a
ta.
In
th
is
p
a
p
e
r,
a
n
o
v
e
l
in
teg
rit
y
a
lg
o
rit
h
m
w
it
h
a
tt
rib
u
te b
a
se
d
e
n
c
r
y
p
ti
o
n
m
o
d
e
l
wa
s
i
m
p
le
m
e
n
ted
to
e
n
su
r
e
c
o
n
f
id
e
n
ti
a
li
ty
f
o
r
h
ig
h
d
im
e
n
sio
n
a
l
d
a
ta
se
c
u
rit
y
o
n
c
lo
u
d
sto
ra
g
e
.
T
h
e
m
a
in
o
b
jec
ti
v
e
o
f
th
is
m
o
d
e
l
is
to
sto
re
,
tran
sm
it
a
n
d
re
tri
e
v
e
th
e
h
ig
h
d
ime
n
sio
n
a
l
c
lo
u
d
d
a
ta w
it
h
lo
w
c
o
m
p
u
tati
o
n
a
l
ti
m
e
a
n
d
h
ig
h
se
c
u
rit
y
.
Ex
p
e
rime
n
tal
re
su
lt
s
s
h
o
w
th
a
t
t
h
e
p
ro
p
o
se
d
m
o
d
e
l
h
a
s
h
ig
h
d
a
ta
sc
a
lab
il
it
y
,
les
s
c
o
m
p
u
tatio
n
a
l
t
im
e
a
n
d
lo
w
m
e
m
o
r
y
u
sa
g
e
c
o
m
p
a
re
d
to
trad
it
i
o
n
a
l
c
l
o
u
d
b
a
se
d
p
riv
a
c
y
p
ro
tec
ti
o
n
m
o
d
e
ls.
K
ey
w
o
r
d
:
C
lo
u
d
s
ec
u
r
it
y
CP
-
A
B
E
Har
d
w
ar
e
b
ased
en
cr
y
p
tio
n
I
n
teg
r
it
y
an
d
h
as
h
i
n
g
I
n
teg
r
it
y
v
er
i
f
icat
io
n
Co
p
y
rig
h
t
©
2
0
1
7
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Sath
ee
s
h
K
S V
A
Kav
u
r
i
,
Dep
ar
te
m
en
t o
f
C
o
m
p
u
ter
Sci
en
ce
an
d
E
n
g
i
n
ee
r
in
g
,
Dh
a
n
ek
u
la
I
n
s
tit
u
te
O
f
E
n
g
i
n
e
er
in
g
&
T
ec
h
n
o
lo
g
y
,
Vij
ay
a
w
ad
a
-
5
2
1
1
3
9
,
Kr
is
h
n
a
(
Dt.
)
,
A
P
.
I
n
d
ia.
E
m
ail:
k
n
s
9
@
l
iv
e.
co
m
1.
I
NT
RO
D
UCT
I
O
N
C
lo
u
d
r
ef
er
s
to
s
to
r
in
g
a
n
d
a
cc
ess
i
n
g
th
e
u
s
er
’
s
p
r
iv
ate
o
r
p
u
b
lic
d
ata
in
a
r
e
m
o
te
s
er
v
er
s
p
ac
e
in
s
tead
o
f
s
to
r
in
g
it
i
n
t
h
e
l
o
ca
l
d
atab
ase
o
f
t
h
eir
p
er
s
o
n
al
co
m
p
u
ter
.
C
lo
u
d
co
m
p
u
ti
n
g
is
a
d
is
tr
ib
u
ted
ar
ch
itect
u
r
e
th
at
p
r
o
v
id
es
o
n
-
d
e
m
a
n
d
,
co
n
v
e
n
ie
n
t
n
e
t
w
o
r
k
ac
ce
s
s
to
s
to
r
e
h
i
g
h
d
i
m
en
s
io
n
al
d
ata
w
it
h
co
n
f
i
g
u
r
an
le
co
m
p
u
ti
n
g
r
eso
u
r
ce
s
s
u
ch
a
s
s
er
v
er
s
,
s
to
r
ag
e
an
d
ap
p
licatio
n
s
.
C
lo
u
d
s
er
v
er
s
s
h
ar
e
th
eir
co
m
p
u
ti
n
g
r
eso
u
r
ce
s
as
a
s
er
v
ice
i
n
a
d
i
s
tr
ib
u
ted
m
an
n
er
to
th
e
co
n
n
ec
ted
cl
ien
t
s
b
y
m
ea
n
s
o
f
n
e
t
w
o
r
k
co
n
n
ec
tio
n
.
T
h
ese
s
h
ar
ed
r
eso
u
r
ce
s
ar
e
o
f
f
er
ed
o
n
d
e
m
a
n
d
o
r
cu
s
to
m
er
s
p
a
y
f
o
r
th
eir
u
s
a
g
e
lev
el
[
1
]
.
I
n
f
o
r
m
a
tio
n
s
ec
u
r
it
y
i
n
d
is
tr
ib
u
ted
clo
u
d
co
m
p
u
tin
g
d
ea
l
s
w
it
h
d
ata
p
r
o
tectio
n
u
s
in
g
d
if
f
er
e
n
t
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
m
o
d
el
s
.
Data
s
ec
u
r
it
y
i
n
v
o
lv
es
s
ec
u
r
i
n
g
d
ata
f
r
o
m
b
ein
g
d
estro
y
ed
,
lo
s
t
o
r
m
o
d
i
f
ied
o
r
co
r
r
u
p
ted
.
So
,
av
ailab
ilit
y
a
n
d
co
r
r
ec
tn
es
s
o
f
clo
u
d
d
ata
m
u
s
t
b
e
as
s
u
r
ed
u
s
i
n
g
v
ar
io
u
s
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
m
o
d
els.
A
l
s
o
,
d
ata
en
cr
y
p
tio
n
w
i
th
in
teg
r
it
y
v
er
if
icat
io
n
m
ec
h
an
is
m
ar
e
f
a
m
il
iar
m
o
d
el
s
to
s
o
l
v
e
s
ec
u
r
it
y
is
s
u
e
[
2
]
.
Var
io
u
s
s
ec
u
r
it
y
f
r
a
m
e
w
o
r
k
s
w
it
h
p
r
o
tectin
g
d
ata
b
o
th
f
r
o
m
clo
u
d
s
id
e
an
d
clien
t
s
id
e
ar
e
i
m
p
le
m
e
n
ted
in
t
h
e
liter
at
u
r
e
f
o
r
d
ata
s
ec
u
r
it
y
.
B
u
t
co
m
p
u
tatio
n
a
l
r
eq
u
ir
e
m
e
n
ts
a
n
d
p
r
o
ce
s
s
in
g
s
p
ee
d
p
la
y
a
v
it
al
r
o
le
in
d
ep
lo
y
m
en
t
o
f
t
h
ese
cl
o
u
d
s
ec
u
r
it
y
m
o
d
el
s
i
n
clo
u
d
co
m
p
u
ti
n
g
en
v
ir
o
n
m
e
n
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
n
I
mp
r
o
ve
d
I
n
teg
r
a
ted
H
a
s
h
a
n
d
A
ttr
ib
u
ted
B
a
s
ed
E
n
cryp
ti
o
n
Mo
d
el
.
.
.
.
(
S
a
th
ee
s
h
K
S
V
A
K
a
vu
r
i)
951
E
n
cr
y
p
tio
n
-
b
ased
ac
ce
s
s
co
n
t
r
o
l
h
as
s
ev
er
al
ad
v
a
n
ta
g
es
o
v
er
class
ical
clo
u
d
ac
ce
s
s
co
n
tr
o
l.
I
n
a
class
ical
s
et
u
p
,
as
d
ep
icted
i
n
F
ig
u
r
e
1
,
d
ata
is
s
to
r
ed
u
n
en
cr
y
p
ted
o
n
t
h
e
s
er
v
er
a
n
d
th
e
u
s
er
n
ee
d
s
to
a
u
th
e
n
tica
te
ea
ch
ti
m
e
s
h
e
w
a
n
ts
to
r
etr
iev
e
d
ata
f
r
o
m
t
h
e
s
e
r
v
er
.
T
h
e
s
er
v
er
is
r
eq
u
ir
ed
to
au
th
o
r
ize
t
h
e
u
s
er
's
r
eq
u
est b
e
f
o
r
e
it
s
en
d
s
t
h
e
p
lai
n
tex
t d
ata
to
th
e
u
s
er
.
L
etti
n
g
th
e
s
er
v
er
a
u
t
h
o
r
ize
t
h
e
u
s
er
'
s
r
eq
u
ests
allo
w
s
f
o
r
ex
ib
le
a
n
d
f
in
e
-
g
r
ain
ed
ac
c
ess
co
n
tr
o
l.
Ho
w
e
v
er
,
th
e
s
er
v
er
n
ee
d
s
to
b
e
tr
u
s
ted
a
n
d
w
ell
-
p
r
o
tecte
d
.
I
n
s
tead
o
f
s
to
r
in
g
t
h
e
d
ata
i
n
p
lai
n
tex
t
f
o
r
m
at
o
n
th
e
s
er
v
er
,
o
n
e
co
u
ld
en
cr
y
p
t
t
h
e
d
ata
a
n
d
s
to
r
e
t
h
i
s
o
n
t
h
e
s
er
v
er
.
T
h
is
h
as
th
e
ad
v
a
n
tag
e
t
h
at
t
h
e
s
er
v
er
i
s
n
o
t
b
u
r
d
en
ed
w
i
th
th
e
a
u
t
h
o
r
izatio
n
an
d
a
u
t
h
e
n
ticatio
n
o
f
u
s
er
s
.
Mo
r
eo
v
er
,
th
e
d
ata
ca
n
b
e
s
to
r
ed
o
n
m
a
n
y
|
e
v
e
n
u
n
tr
u
s
ted
|
s
er
v
er
s
,
as it i
s
en
cr
y
p
ted
an
y
w
a
y
[
3
]
.
Fig
u
r
e
1
.
C
lass
ical
clo
u
d
ac
ce
s
s
co
n
tr
o
l
1
.
1
.
AB
E
B
a
s
ic
Ste
ps
Setu
p
T
h
is
alg
o
r
ith
m
is
r
u
n
b
ef
o
r
e
all
o
th
er
alg
o
r
ith
m
s
an
d
d
eter
m
i
n
es
t
h
e
p
u
b
lic
p
ar
am
eter
s
(
P
K)
an
d
a
m
aster
k
e
y
(
MK
)
f
o
r
t
h
e
KG
A
.
T
h
e
P
K
d
eter
m
i
n
es
t
h
e
s
et
o
f
al
l
p
o
s
s
ib
le
at
tr
ib
u
te
s
an
d
al
l
u
s
er
k
e
y
s
w
il
l b
e
d
er
iv
ed
f
r
o
m
th
e
MK
[
1
]
.
K
ey
G
ener
a
t
io
n:
T
h
e
KG
A
c
an
cr
ea
te
n
e
w
d
ec
r
y
p
tio
n
k
e
y
s
f
o
r
u
s
er
s
u
s
i
n
g
its
MK
.
A
u
s
e
r
'
s
p
r
i
v
ate
k
e
y
(
SK)
is
d
er
iv
ed
f
r
o
m
t
h
e
MK
b
y
r
an
d
o
m
izin
g
t
h
e
MK
in
s
u
c
h
a
w
a
y
t
h
at
th
e
u
s
er
ca
n
n
o
t
co
n
v
er
t
th
e
S
K
b
ac
k
to
th
e
MK
.
T
o
d
ec
i
d
e
w
h
ich
co
n
s
tr
u
ctio
n
is
p
r
ef
er
r
ed
,
w
e
n
ee
d
to
esti
m
ate
h
o
w
m
a
n
y
at
tr
ib
u
tes
w
ill
b
e
u
s
ed
b
y
a
k
e
y
g
en
er
atio
n
au
t
h
o
r
it
y
(
KG
A
)
.
I
f
ea
ch
KG
A
u
s
e
s
a
s
m
all
s
e
t
o
f
attr
ib
u
tes,
th
e
s
m
a
ll
u
n
iv
er
s
e
s
ee
m
s
m
o
r
e
d
esira
b
le,
as
it
is
in
g
en
er
al
less
co
m
p
u
tatio
n
a
ll
y
i
n
te
n
s
i
v
e.
T
h
e
cip
h
er
te
x
t
c
o
n
s
is
ts
o
f
m
u
lt
ip
le
p
ar
ts
.
On
e
o
f
t
h
ese
p
ar
ts
is
a
r
an
d
o
m
l
y
c
h
o
s
e
n
s
ec
r
et
n
u
m
b
er
o
p
er
atin
g
o
n
t
h
e
p
lain
tex
t.
T
h
e
o
th
er
p
ar
ts
ar
e
n
ee
d
ed
to
r
ec
o
n
s
tr
u
ct
th
is
s
ec
r
et
n
u
m
b
er
.
Usi
n
g
a
s
ec
r
et
s
h
ar
in
g
s
ch
e
m
e
t
h
at
s
p
lit
s
th
e
s
ec
r
et
n
u
m
b
er
in
to
v
ar
io
u
s
p
ar
ts
,
th
e
ac
ce
s
s
s
tr
u
c
tu
r
e
is
en
f
o
r
ce
d
b
y
u
s
in
g
th
e
s
e
in
p
ar
ts
o
f
th
e
cip
h
er
tex
t
[
4
]
.
T
o
p
r
ev
en
t
u
s
er
co
llu
s
io
n
,
ea
ch
SK
is
r
a
n
d
o
m
ized
b
y
a
u
n
iq
u
e,
u
s
er
-
s
p
ec
i_
c
n
u
m
b
er
,
o
r
,
th
e
k
e
y
is
b
o
u
n
d
to
a
f
i
x
ed
g
lo
b
al
id
en
ti
f
ier
(
GI
D)
o
f
th
e
u
s
er
.
A
cc
e
s
s
s
tr
u
ct
u
r
es
ar
e
u
s
ed
to
d
ef
in
e
w
h
ic
h
u
s
er
s
h
a
v
e
ac
c
ess
to
w
h
ic
h
r
eso
u
r
ce
s
.
I
n
th
e
ca
s
e
o
f
attr
ib
u
te
-
b
a
s
ed
au
t
h
en
ticatio
n
,
attr
ib
u
tes d
eter
m
i
n
e
th
e
au
t
h
o
r
izatio
n
lev
e
l o
f
t
h
e
u
s
er
.
An
a
cc
ess
s
tr
u
ct
u
r
e
ca
n
b
e
r
eg
ar
d
ed
as
a
co
llectio
n
o
f
s
ets
o
f
attr
ib
u
te
s
.
E
ac
h
s
i
n
g
l
e
s
et
d
escr
ib
es
w
h
ich
attr
ib
u
t
es
ar
e
n
ee
d
ed
to
b
e
g
r
an
ted
ac
ce
s
s
.
As
lo
n
g
a
s
th
e
u
s
er
'
s
attr
ib
u
te
s
s
ati
s
f
y
at
le
ast
o
n
e
s
et
in
t
h
e
co
llectio
n
,
t
h
e
u
s
er
i
s
g
r
an
ted
ac
ce
s
s
.
T
h
er
e
ar
e
t
w
o
k
i
n
d
s
o
f
ac
ce
s
s
s
tr
u
ct
u
r
es:
m
o
n
o
to
n
ic
an
d
n
o
n
-
m
o
n
o
to
n
ic.
Mo
n
o
t
o
n
i
c
ac
ce
s
s
s
tr
u
ct
u
r
e
s
en
s
u
r
e
t
h
at
w
h
en
e
v
er
a
u
s
er
w
o
u
ld
b
e
g
r
a
n
ted
ac
ce
s
s
b
ase
d
o
n
a
s
u
b
s
et
o
f
h
is
at
tr
ib
u
tes
,
h
e
w
il
l
b
e
g
r
a
n
ted
ac
ce
s
s
b
ased
o
n
all
h
i
s
at
tr
ib
u
tes.
T
h
i
s
m
ea
n
s
t
h
at
n
o
n
e
g
atio
n
s
o
f
at
tr
ib
u
tes
ar
e
p
o
s
s
i
b
le.
No
n
m
o
n
o
to
n
ic
ac
ce
s
s
s
tr
u
ct
u
r
es
d
o
allo
w
s
u
ch
n
e
g
atio
n
o
f
attr
ib
u
te
s
.
Her
e,
th
e
p
o
s
s
ess
io
n
o
f
a
n
ex
tr
a
attr
ib
u
te
m
a
y
d
en
y
y
o
u
ac
ce
s
s
.
F
u
zz
y
I
d
en
ti
t
y
b
a
s
ed
en
cr
y
p
tio
n
s
c
h
e
m
e
i
n
w
h
ich
a
d
escr
ip
ti
v
e
attr
ib
u
tes
s
e
t
ar
e
co
n
s
id
er
ed
as
id
en
tit
y
f
o
r
en
cr
y
p
t
io
n
a
n
d
d
e
cr
y
p
tio
n
p
r
o
ce
s
s
.
Fo
r
th
e
p
r
iv
ac
y
o
r
s
ec
r
et
k
e
y
AS
k
co
r
r
esp
o
n
d
s
to
th
e
attr
ib
u
te
s
et
S.
W
e
ca
n
d
ec
r
y
p
t
th
e
d
ata
u
s
i
n
g
'
AS
k
co
r
r
esp
o
n
d
s
to
th
e
attr
ib
u
te
s
et
'
s
an
d
s
atis
f
ies
t
h
e
co
n
d
itio
n
'
||
S
S
d
,
w
h
er
e
d
is
th
e
m
in
i
m
u
m
n
u
m
b
er
o
f
attr
ib
u
tes.
2.
L
I
T
E
R
AT
U
RE
SU
RVE
Y
I
n
teg
r
it
y
a
n
d
au
t
h
en
ticatio
n
o
f
d
ata
in
clo
u
d
en
v
ir
o
n
m
e
n
t
ar
e
ess
en
tial
is
s
u
e
s
to
en
s
u
r
e
th
at
d
ata
co
n
f
id
e
n
tialit
y
a
n
d
p
r
iv
ac
y
p
r
eser
v
in
g
to
th
e
c
u
s
to
m
er
’
s
d
ata
o
r
q
u
er
ies.
P
r
o
b
lem
o
f
d
ea
lin
g
w
it
h
u
s
er
’
s
q
u
er
ies
an
d
en
cr
y
p
ted
d
ata
o
v
er
clo
u
d
en
v
ir
o
n
m
e
n
t
w
er
e
d
i
s
cu
s
s
ed
w
id
el
y
i
n
r
esear
c
h
lit
er
atu
r
e
[
2
-
5
]
tr
y
to
m
e
m
o
r
y
i
n
te
g
r
it
y
c
h
ec
k
in
g
t
o
ad
d
r
ess
in
teg
r
it
y
is
s
u
e
s
b
y
ap
p
ly
i
n
g
Has
h
tr
ee
o
v
er
m
e
m
o
r
y
co
n
te
n
t.
An
in
te
g
r
it
y
v
er
i
f
icatio
n
ap
p
r
o
ac
h
[
7
]
in
h
y
b
r
id
clo
u
d
s
is
ap
p
l
ied
to
s
u
p
p
o
r
t
th
e
d
ata
m
i
g
r
a
tio
n
an
d
s
ca
lab
il
it
y
s
er
v
ice
is
i
m
p
le
m
e
n
ted
o
n
li
m
ited
d
ata.
T
ab
le
1
s
h
o
w
s
th
e
v
ar
io
u
s
A
ttrib
u
te
B
ased
E
n
cr
y
p
tio
n
Sch
e
m
s
C
lo
u
d
User
C
lo
u
d
Ser
v
er
(
P
lain
T
ex
t)
Au
t
h
o
r
ized
C
o
n
ten
t
A
cc
ess
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
2
,
A
p
r
il 2
0
1
7
:
9
50
–
9
6
0
952
T
ab
le
1
.
Var
io
u
s
A
ttrib
u
te
B
a
s
ed
E
n
cr
y
p
tio
n
Sc
h
e
m
s
S
l
.
N
o
M
e
t
h
o
d
P
a
r
a
me
t
e
r
D
r
a
w
b
a
c
k
s
1
P
r
o
v
a
b
l
e
D
a
t
a
P
o
sse
ssi
o
n
[
7
]
R
S
A
b
a
se
d
h
o
mo
mo
r
p
h
i
sm
l
i
n
e
a
r
mo
d
e
l
I
t
ma
y
l
e
a
k
u
se
r
’
s
d
a
t
a
t
o
t
h
e
t
h
i
r
d
p
a
r
t
y
u
se
r
s
2
A
B
E
[
8
]
S
e
t
u
p
,
P
u
b
l
i
c
a
n
d
se
c
r
e
t
k
e
y
s
D
o
e
sn
’
t
su
p
p
o
r
t
se
c
u
r
e
c
o
mm
u
n
i
c
a
t
i
o
n
i
n
c
l
o
u
d
e
n
v
i
r
o
n
me
n
t
3
CP
-
A
B
E
[
9
]
A
t
t
r
i
b
u
t
e
s,
P
o
l
i
c
i
e
s,
K
e
y
G
e
n
e
r
a
t
o
r
s
A
s
t
h
e
n
u
m
b
e
r
o
f
a
t
t
r
i
b
u
t
e
s
si
z
e
o
r
st
o
r
a
g
e
sp
a
c
e
i
n
c
r
e
a
se
s,
c
o
m
p
u
t
a
t
i
o
n
a
l
t
i
me
a
l
so
i
n
c
r
e
a
se
s.
4
KP
-
A
B
E
[
1
0
]
K
e
y
p
o
l
i
c
i
e
s,
A
t
t
r
i
b
u
t
e
s,
K
e
y
g
e
n
e
r
a
t
i
o
n
F
a
i
l
t
o
c
o
n
st
r
u
c
t
t
h
e
a
c
c
e
ss
p
o
l
i
c
y
p
a
t
t
e
r
n
s
f
o
r
mu
l
t
i
p
l
e
c
l
o
u
d
st
o
r
a
g
e
se
r
v
i
c
e
s.
R
eq
u
ir
e
a
n
u
m
b
er
o
f
ex
p
o
n
e
n
tial
g
e
n
er
ato
r
s
f
o
r
p
r
iv
ate
k
e
y
co
m
p
u
tatio
n
w
h
ic
h
is
a
s
ig
n
if
ican
t
co
m
p
u
tatio
n
o
v
e
h
ea
d
.
Als
o
it
r
eq
u
ir
es
R
a
n
d
o
m
o
r
ac
le
m
o
d
el
w
h
ic
h
i
s
les
s
s
ec
u
r
e
t
h
a
n
o
th
e
r
s
tan
d
ar
d
m
o
d
els.
B
o
th
th
e
cip
h
er
te
x
t
s
a
n
d
p
r
iv
ate
k
e
y
s
ar
e
lab
eled
w
it
h
a
n
p
o
lic
y
s
et
a
n
d
attr
ib
u
te
s
et
,
th
e
d
ec
r
y
p
tio
n
w
il
l
s
u
cc
ee
d
o
n
l
y
if
t
h
er
e
ex
is
t a
t l
ea
s
t k
co
m
m
o
n
attr
ib
u
te
s
b
et
w
ee
n
th
e
cip
h
er
tex
t a
n
d
a
p
r
iv
ate
k
e
y
.
T
h
e
tr
ad
itio
n
al
m
o
d
els
e
n
s
u
r
e
d
ata
s
ec
u
r
it
y
b
y
u
s
i
n
g
e
n
cr
y
p
tio
n
is
n
o
t
o
p
ti
m
a
l
i
n
t
h
e
cl
o
u
d
v
ir
t
u
al
m
ac
h
in
e
s
o
f
clo
u
d
p
r
o
v
id
er
s
.
A
lt
h
o
u
g
h
t
h
e
tr
u
s
ted
th
ir
d
p
ar
t
y
au
th
o
r
itie
s
ar
e
a
w
ar
e
o
f
th
e
m
alicio
u
s
i
n
s
id
er
,
th
e
y
a
s
s
u
m
e
th
at
t
h
e
y
h
a
v
e
li
m
ited
s
o
l
u
tio
n
s
to
o
v
er
co
m
e
t
h
ese
i
s
s
u
es.
A
s
ec
u
r
ed
,
co
s
t
-
e
f
f
ec
tiv
e
m
u
lti
-
clo
u
d
s
to
r
ag
e
m
et
h
o
d
is
i
m
p
le
m
e
n
ted
in
clo
u
d
en
v
ir
o
n
m
e
n
t
w
h
ic
h
co
n
tr
o
ls
an
ec
o
n
o
m
i
ca
l
d
is
tr
ib
u
tio
n
o
f
in
f
o
r
m
atio
n
a
m
o
n
g
t
h
e
av
ail
ab
le
clo
u
d
in
s
ta
n
ce
s
to
p
r
o
v
id
e
th
e
cu
s
to
m
er
s
w
it
h
s
ec
u
r
e
s
to
r
ag
e
an
d
d
ata
av
ailab
ilit
y
.
A
h
i
g
h
p
er
f
o
r
m
an
ce
clo
u
d
co
m
p
u
t
in
g
s
er
v
i
ce
is
i
m
p
le
m
en
ted
th
a
t
i
n
te
g
r
ates
t
h
e
p
ar
alle
l
p
r
o
ce
s
s
in
g
f
r
a
m
e
w
o
r
k
an
d
c
h
e
ck
p
o
in
t i
n
f
r
a
s
tr
u
ct
u
r
e
s
u
ch
a
s
Me
s
s
a
g
e
p
ass
i
n
g
i
n
ter
f
ac
e
f
o
r
v
ir
tu
a
l
m
ac
h
i
n
es.
I
n
th
e
clo
u
d
s
er
v
er
attac
k
s
,
th
e
le
n
g
t
h
o
f
t
h
e
o
v
er
lap
p
in
g
r
u
n
ti
m
e
o
f
t
h
e
clo
u
d
i
n
s
t
an
ce
s
a
n
d
m
alicio
u
s
v
ir
tu
al
m
ac
h
in
e
s
i
s
i
m
p
o
r
tan
t
to
f
in
d
t
h
e
n
et
wo
r
k
b
an
d
w
id
t
h
.
Si
n
ce
li
m
iti
n
g
th
e
o
v
er
lap
p
in
g
ex
ec
u
t
io
n
ti
m
es
m
a
y
d
eg
r
ad
e
th
e
n
et
w
o
r
k
p
er
f
o
r
m
a
n
ce
an
d
in
cr
ea
s
e
th
e
er
r
o
r
r
ate.
J
u
n
g
et
.
a
l.
[
8
]
p
r
o
p
o
s
ed
a
m
o
d
el
th
at
en
cr
y
p
t
s
clo
u
d
d
ata
w
ith
u
s
er
’
s
attr
ib
u
tes
a
n
d
s
en
d
it
to
th
e
r
e
m
o
te
clo
u
d
s
er
v
er
f
o
r
lo
n
g
ter
m
ac
ce
s
s
.
T
h
e
clo
u
d
p
r
o
v
id
er
s
n
o
t
o
n
l
y
g
e
n
er
ate
ac
ce
s
s
r
i
g
h
ts
to
u
s
er
s
,
b
u
t
also
co
m
p
u
te
a
s
ec
r
et
k
e
y
u
s
in
g
attr
ib
u
tes
an
d
p
o
licies.
I
n
th
i
s
ca
s
e,
KDC
is
n
o
t
r
eq
u
ir
ed
.
T
h
e
m
aj
o
r
is
s
u
e
w
it
h
th
i
s
ap
p
r
o
a
ch
is
th
at
u
s
er
s
ca
n
g
et
d
i
f
f
er
e
n
t
k
e
y
s
f
r
o
m
d
if
f
er
en
t
o
w
n
er
s
f
o
r
th
e
s
a
m
e
at
tr
ib
u
te,
w
h
ich
in
cr
ea
s
es
t
h
e
to
tal
n
u
m
b
er
o
f
s
ec
r
e
t
k
e
y
s
to
th
e
u
s
er
s
alo
n
g
w
i
th
s
t
o
r
ag
e
an
d
co
m
m
u
n
icatio
n
o
v
e
r
h
ea
d
.
3.
P
R
O
P
O
SE
D
M
E
T
H
O
D
I
n
th
is
p
r
o
p
o
s
ed
m
o
d
el,
ea
ch
clo
u
d
u
p
lo
ad
s
h
ig
h
d
i
m
e
n
tio
n
al
d
o
cu
m
e
n
t
s
as
in
p
u
t
to
o
u
r
en
co
d
ed
p
r
o
ce
s
s
as
s
h
o
w
n
i
n
Fi
g
u
r
e
2
.
I
n
t
h
is
f
r
a
m
e
w
o
r
k
,
u
s
er
’
s
ea
c
h
d
o
cu
m
en
t
is
h
a
s
h
ed
u
s
in
g
t
h
e
p
r
o
p
o
s
ed
clo
u
d
h
ar
d
w
ar
e
b
ased
h
as
h
al
g
o
r
ith
m
.
C
o
m
p
u
ted
h
as
h
v
al
u
e
alo
n
g
w
it
h
t
h
e
u
s
er
’
s
d
o
cu
m
en
t
d
ata
ar
e
en
cr
y
p
ted
u
s
i
n
g
th
e
p
r
o
p
o
s
ed
A
B
E
e
n
cryp
tio
n
mo
d
el
.
Ou
r
p
r
o
p
o
s
ed
en
cr
y
p
tio
n
m
o
d
el
in
it
i
alize
s
clo
u
d
s
er
v
er
p
ar
am
eter
s
f
o
r
k
e
y
g
e
n
er
atio
n
,
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
.
E
n
cr
y
p
ted
h
a
s
h
a
n
d
u
s
er
’
s
d
ata
ar
e
u
p
lo
ad
ed
to
th
e
clo
u
d
s
to
r
a
g
e
w
it
h
i
n
te
g
r
it
y
v
a
lu
e
in
en
c
o
d
ed
f
o
r
m
a
t.
Si
m
ilar
l
y
,
ea
c
h
u
s
er
d
ec
r
y
p
ts
th
e
en
co
d
ed
h
ash
an
d
d
ata
f
r
o
m
th
e
clo
u
d
s
to
r
ag
e
u
s
i
n
g
th
e
d
ec
o
d
in
g
p
r
o
ce
s
s
as
s
h
o
w
n
in
Fi
g
u
r
e
3
.
I
n
th
e
d
ec
o
d
in
g
p
r
o
ce
s
s
,
ea
ch
u
s
er
’
s
en
co
d
ed
d
ata
f
r
o
m
t
h
e
clo
u
d
is
d
ec
r
y
p
ted
u
s
i
n
g
th
e
p
r
o
p
o
s
ed
A
B
E
d
ec
r
y
p
tio
n
m
o
d
el.
I
n
te
g
r
it
y
v
er
if
icat
io
n
o
f
t
h
e
d
ec
r
y
p
ted
p
lai
n
te
x
t
is
c
h
ec
k
ed
a
g
ai
n
s
t
t
h
e
d
ec
r
y
p
ted
h
as
h
v
al
u
e
f
o
r
d
ata
m
o
d
i
f
icat
io
n
v
er
i
f
icat
io
n
.
I
f
t
h
e
d
ata
is
n
o
t
m
o
d
if
ied
th
e
n
it
is
ac
ce
s
s
ed
to
th
e
u
s
er
’
s
s
y
s
te
m
th
r
o
u
g
h
th
e
in
ter
n
e
t.
Fig
u
r
e
4
.
S
h
o
w
s
t
h
e
o
v
er
v
ie
w
o
f
th
e
m
u
l
ti
-
d
ata
p
ar
titi
o
n
u
s
in
g
a
v
ailab
le
clo
u
d
s
er
v
e
r
s
.
I
n
t
h
i
s
p
r
o
ce
s
s
,
clo
u
d
u
s
er
’
s
m
u
ltip
le
d
o
cu
m
e
n
ts
ar
e
p
ar
titi
o
n
ed
an
d
ass
ig
n
ed
to
t
h
e
n
ea
r
e
s
t
clo
u
d
s
er
v
er
s
u
s
i
n
g
th
e
d
ata
b
lo
ck
s
ize.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
n
I
mp
r
o
ve
d
I
n
teg
r
a
ted
H
a
s
h
a
n
d
A
ttr
ib
u
ted
B
a
s
ed
E
n
cryp
ti
o
n
Mo
d
el
.
.
.
.
(
S
a
th
ee
s
h
K
S
V
A
K
a
vu
r
i)
953
Fig
u
r
e
2
.
P
ar
allel
Mu
lti
-
Do
c
Hash
b
ased
E
n
cr
y
p
tio
n
Mo
d
el
Fig
u
r
e
3
.
P
ar
allel
Mu
lti
-
Do
c
Hash
b
ased
Dec
r
y
p
tio
n
Mo
d
el
Fig
u
r
e
4
.
Mu
lti
-
Data
P
ar
titi
o
n
b
ased
o
n
Av
ailab
le
Data
-
C
e
n
t
er
s
3
.
1
.
M
ulti
-
F
ile
Da
t
a
P
a
r
t
it
io
n Alg
o
rit
h
m
I
n
p
u
t: U
s
er
Data
Fil
es
[
]
b
e
th
e
n
u
m
b
er
o
f
a
v
ailab
le
clo
u
d
in
s
ta
n
ce
s
er
v
er
s
.
[
]
b
e
th
e
lis
t o
f
d
ata
s
to
r
ag
e
zo
n
es.
Ou
tp
u
t: File
w
i
s
e
p
ar
titi
o
n
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
2
,
A
p
r
il 2
0
1
7
:
9
50
–
9
6
0
954
P
r
o
ce
d
u
r
e:
Fo
r
ea
ch
f
ile
i
n
th
e
Fo
ld
er
R
ea
d
d
ata
f
ile
f
,
L
et
N
b
et
th
e
n
u
m
b
er
o
f
p
ar
titi
o
n
s
,
ea
ch
w
it
h
b
y
te
s
b
it
s.
Div
id
e
d
ata
-
f
ile
i
n
to
N
p
ar
titi
o
n
s
ea
c
h
w
it
h
b
y
tes.
N=
f
.
s
ize/1
0
2
4
;
Data
[
]
d
t;
Fo
r
ea
ch
i=0
to
N
Do
Fo
r
ea
ch
p
ar
titi
o
n
p
in
N
Do
L
et
D
b
e
th
e
b
lo
ck
s
ize
in
KB
,
th
e
m
i
n
i
m
al
s
ize
ca
n
b
e
co
m
p
u
ted
u
s
in
g
I
f
(
nn
i
1
i
1
|
f
[
i
1
]
,
p
]
|
|
f
[
i
]
,
p
]
|
D
m
a
x
{
,
}
M
i
n
B
l
o
c
k
S
i
z
e
M
a
x
B
l
o
c
k
S
i
z
e
)
th
en
Ass
i
g
n
f
ile
i
n
d
ex
f
[
p
,
i]
to
p
.
[
i]
=c
o
u
n
t(
f
[
p
,
i]
,
[
i]
)
//
d
is
t
r
ib
u
tin
g
d
i
f
f
er
en
t
p
ar
titi
o
n
d
ata
in
clo
u
d
s
er
v
er
s
.
A
p
p
en
d
d
ata
ce
n
ter
[
i]
’
s
in
s
ta
n
ce
I
D
.
E
ls
e
Dt[
]
=f
[
p
,
i]
;
E
n
d
if
Do
n
e
Fo
r
(
in
t k
=0
;
k
<
.
len
g
t
h
;k
++
)
Do
I
f
(
[
k
]
==
e
m
p
t
y
)
T
h
en
[
k
]
=c
o
u
n
t(
Dt[
]
,
[
i]
)
//
d
is
tr
ib
u
tin
g
d
i
f
f
er
en
t
p
ar
titi
o
n
d
ata
in
clo
u
d
s
er
v
er
s
.
A
p
p
en
d
d
ata
ce
n
ter
[
k
]
to
th
e
q
u
ein
g
li
s
t.
E
ls
e
C
o
n
ti
n
u
e;
d
o
n
e
Do
n
e
Do
n
e
3
.
2
.
P
a
ra
llel
m
ulti
-
do
c
ba
s
e
d H
a
s
h Alg
o
rit
h
m
(
P
M
H
A)
I
n
p
u
t:
M
u
ltip
le
Fil
e
d
ata
p
ar
tit
io
n
s
.
Ou
tp
u
t: 1
0
2
4
-
b
it h
as
h
v
al
u
e.
P
r
o
ce
d
u
r
e:
P
r
o
p
o
s
ed
p
ar
allel
h
ash
alg
o
r
it
h
m
u
s
e
1
0
r
o
u
n
d
s
to
g
en
er
ate
co
m
p
r
es
s
ed
h
as
h
co
d
e.
I
n
ea
ch
r
o
u
n
d
1
0
2
4
-
b
it
p
ar
titi
o
n
ed
d
ata
as a
n
in
p
u
t.
E
ac
h
r
o
u
n
d
f
o
llo
w
s
th
r
ee
p
h
a
s
e
s
n
a
m
el
y
.
1.
T
r
an
s
f
o
r
m
ed
Data
C
o
n
v
er
s
io
n
State
R
ep
r
esen
tatio
n
.
2.
C
lo
u
d
User
P
o
lic
y
b
ased
Su
b
s
tit
u
tio
n
B
o
x
.
3.
User
A
cc
e
s
s
P
o
lic
y
B
ased
Sh
i
f
t Co
l
u
m
n
s
in
r
i
g
h
t to
lef
t a
n
d
lef
t to
r
ig
h
t.
3
.
3
.
O
v
er
v
ie
w
o
f
e
a
ch
ph
a
s
e
P
ha
s
e
1
:
I
n
th
i
s
p
h
ase,
u
s
er
p
ar
titi
o
n
ed
d
ata
is
co
n
v
er
ted
in
to
s
u
b
-
p
ar
t
itio
n
s
as
f
o
llo
w
s
:
L
et
0
1
2
3
,
,
,
,
.
.
i
i
i
i
i
N
F
P
F
P
F
P
F
P
F
P
ar
e
th
e
ith
f
ile
d
ata
p
ar
titi
o
n
s
w
it
h
1
0
2
4
b
it si
ze
.
E
ac
h
p
ar
titi
o
n
is
r
ep
r
esen
ted
in
th
e
f
o
r
m
o
f
l
is
t
as sh
o
w
n
b
elo
w
.
0
0
0
0
0
0
0
0
0
1
0
2
0
1
0
2
4
,
,
.
.
.
.
F
P
F
d
F
d
F
d
F
d
………
1
1
1
1
1
0
0
0
0
1
0
2
0
1
0
2
4
,
,
.
.
.
.
n
n
n
n
n
F
P
F
d
F
d
F
d
F
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
n
I
mp
r
o
ve
d
I
n
teg
r
a
ted
H
a
s
h
a
n
d
A
ttr
ib
u
ted
B
a
s
ed
E
n
cryp
ti
o
n
Mo
d
el
.
.
.
.
(
S
a
th
ee
s
h
K
S
V
A
K
a
vu
r
i)
955
0
0
0
0
1
1
1
0
1
1
1
2
1
1
0
2
4
,
,
.
.
.
.
F
P
F
d
F
d
F
d
F
d
………
2
2
2
2
2
1
1
0
1
1
1
2
1
1
0
2
4
,
,
.
.
.
.
n
n
n
n
n
F
P
F
d
F
d
F
d
F
d
.
.
.
0
1
2
1
0
2
4
,
,
.
.
.
.
N
N
N
N
N
M
N
N
N
N
F
P
F
d
F
d
F
d
F
d
………
1
1
1
1
1
0
0
0
0
1
0
2
0
1
0
2
4
,
,
.
.
.
.
n
n
n
n
n
F
P
F
d
F
d
F
d
F
d
Fo
r
ea
ch
f
ile
p
ar
titi
o
n
ij
FP
Do
E
a
ch
file
P
a
r
titi
o
n
is
d
ivid
ed
in
to
N
b
lo
ck
s
o
f
6
4
b
its
’
b
lo
ck
s
iz
e.
He
r
e
w
i
s
8
b
lo
ck
s
.
S
o
00
FP
ca
n
b
e
fu
r
th
er p
a
r
titi
o
n
ed
in
to
s
u
b
-
p
a
r
titi
o
n
a
s
:
0
0
0
0
0
0
0
1
2
1
5
,
,
.
.
.
F
P
S
P
S
P
S
P
S
P
0
0
1
2
6
3
0
0
0
0
0
0
0
1
2
6
3
1
1
1
1
1
0
0
1
2
6
3
2
2
2
2
2
0
0
1
2
6
3
,
,
.
.
.
.
,
,
.
.
.
.
,
,
.
.
.
.
.
.
,
,
,
.
.
.
.
n
n
n
n
n
S
P
S
d
S
d
S
d
S
d
S
P
S
d
S
d
S
d
S
d
S
P
S
d
S
d
S
d
S
d
S
P
S
d
S
d
S
d
S
d
Si
m
i
lar
l
y
,
0
1
2
7
,
,
.
.
.
N
N
N
N
NM
F
P
S
P
S
P
S
P
S
P
.
No
n
-
L
inea
r
Su
b
-
P
a
rt
it
io
n Sub
s
t
it
utio
n
Fo
r
ea
ch
s
u
b
-
p
ar
titi
o
n
Do
2
[
*
(
)
*
]
m
o
d
3
i
i
i
T
S
P
a
S
P
b
S
P
c
i=0
….
1
6
W
h
er
e
a=
n
u
m
b
er
o
f
A
ND
p
o
licies.
b
=n
u
m
b
er
o
f
O
R
p
o
licies.
c
=n
u
m
b
er
o
f
A
NY
p
o
licies.
Do
n
e
P
ha
s
e
2
I
n
th
i
s
p
h
ase,
tr
a
n
s
f
o
r
m
ed
s
u
b
-
p
ar
titi
o
n
d
ata
is
ta
k
en
a
s
s
o
u
r
ce
d
ata.
User
ac
ce
s
s
p
o
lic
y
d
ata
is
r
ep
r
esen
ted
as
s
ta
te
m
a
tr
ix
.
F
o
r
ea
ch
d
y
n
a
m
ic
u
s
er
ac
ce
s
s
p
o
licy
,
r
a
n
d
o
m
d
y
n
a
m
ic
S
-
B
o
x
is
g
e
n
er
ated
to
ea
ch
au
t
h
o
r
ized
c
lo
u
d
u
s
er
.
P
ha
s
e
3
I
n
th
is
p
h
a
s
e,
in
p
u
t
d
ata
ar
e
s
h
i
f
ted
f
r
o
m
le
f
t
to
r
ig
h
t
i
n
co
lu
m
n
w
i
s
e
u
s
in
g
au
t
h
o
r
ized
clo
u
d
u
s
er
p
ar
am
eter
s
.
Dep
en
d
s
o
n
t
h
e
u
s
er
ac
ce
s
s
in
t
h
e
p
o
lic
y
s
tr
u
ct
u
r
e,
th
r
ee
p
ar
a
m
eter
s
ar
e
ca
lcu
lated
.
T
h
ese
th
r
ee
p
ar
am
eter
s
ar
e
u
s
ed
to
tr
an
s
f
o
r
m
co
lu
m
n
s
le
f
t to
r
ig
h
t a
n
d
th
en
s
i
m
ilar
l
y
s
h
i
f
t r
o
w
w
i
s
e
in
t
h
e
r
ev
er
s
e
o
r
d
er
.
K
ey
G
ener
a
t
io
n P
ro
ce
s
s
I
np
ut:
T
o
tal
User
A
cc
es
s
P
o
licies
P
ro
ce
du
re
:
S
tep
1
:
C
o
n
s
tr
u
ct
1
0
2
4
b
its
s
t
a
te
ma
tr
ix
u
s
in
g
To
ta
l U
s
er A
cc
ess
P
o
licies.
S
tep
2
:
S
elec
t 1
0
2
4
b
its
r
a
n
d
o
mly
fr
o
m
1
0
2
4
b
its
u
s
in
g
p
a
tte
r
n
/ p
ermu
ta
tio
n
ma
tr
ix.
S
tep
3
:
S
elec
t 1
0
2
4
b
its
is
a
s
s
ig
n
ed
to
ea
ch
r
o
u
n
d
f
u
n
ctio
n
o
f h
a
s
h
a
lg
o
r
ith
m.
S
tep
4
:
R
ep
ea
t step
s
1
to
3
u
n
t
il 1
0
r
o
u
n
d
s
.
E
ncry
t
io
n
a
nd
Dec
ry
ptio
n P
ro
po
s
ed
a
pp
ro
a
ch
f
o
llo
w
s
f
o
ur
ph
a
s
es:
1.
S
etu
p
2.
K
ey
Gen
era
tio
n
3.
E
n
cryp
tio
n
P
r
o
ce
s
s
4.
Dec
r
yp
tio
n
P
r
o
ce
s
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
2
,
A
p
r
il 2
0
1
7
:
9
50
–
9
6
0
956
Set
up
Setu
p
al
g
o
r
ith
m
tak
e
s
,,
,
G,
e
w
it
h
G=
G
G
G
.
p
,
q
,
r
ar
e
th
e
ele
m
e
n
ts
in
Z
p
.
First
co
m
p
u
te
,,
pqr
g
g
g
ar
e
t
h
e
g
e
n
er
ato
r
s
o
f
,,
G
G
G
r
esp
ec
tiv
el
y
.
Fo
llo
w
in
g
a
lg
o
r
ith
m
g
e
n
er
ates
s
et
u
p
p
ar
am
eter
s
f
o
r
t
h
e
g
iv
e
n
T
o
tal
p
o
lic
y
p
atter
n
(
T
.
P
)
.
Giv
en
T
o
tal
p
o
licy
p
atter
n
is
d
iv
id
e
d
in
to
th
r
ee
p
atter
n
s
w
it
h
A
ND
(
),
OR
(
)
,
*
.
Alg
o
r
it
h
m
ta
k
es
A
ttrib
u
te
li
s
t
Attli
s
t,
P
o
licy
li
s
t
p
o
lili
s
t,
o
p
er
ato
r
’
s
lis
t
o
p
lis
t
a
n
d
o
p
er
ato
r
s
p
o
s
itio
n
lis
t p
o
s
li
s
t a
s
in
p
u
t a
n
d
g
e
n
er
ates
h
as
h
co
d
es o
f
th
r
ee
p
o
lic
y
p
atter
n
s
o
f
p
o
lic
y
lis
t.
I
np
ut:
L
is
t:=P
o
lili
s
t,
A
ttl
is
t,
Op
lis
t,P
o
s
lis
t.
Har
d
w
ar
e
p
ar
a
m
eter
s
P
ro
ce
du
re
:
'
1
H
=Hex
to
Dec
ima
l(
Ha
s
h
(
p
a
t1
)
)
;
i=0
…p
a
t1
.
len
g
t
h
.
'
2
H
=Hex
to
Dec
ima
l(
Ha
s
h
(
p
a
t2
)
)
;
i=0
…p
a
t2
.
len
g
t
h
.
'
3
H
=Hex
to
Dec
ima
l(
Ha
s
h
(
p
a
t2
)
)
;
i=0
…p
a
t2
.
len
g
t
h
.
'
'
'
'
1
2
3
H
H
H
h
a
r
d
w
a
r
e
p
a
r
a
m
s
;
S
P
u
b
lic
K
ey
=
{
'
S
,
,,
pqr
g
g
g
,
,,
G
G
G
,
'
'
'
1
2
3
H
,
H
,
H
;
};
[
1
]
M
aster
k
e
y
=
{
,,
};
k
n
o
w
n
to
T
.
A
K
ey
G
ener
a
t
io
n
Ke
y
Ge
n
er
atio
n
al
g
o
r
ith
m
w
i
l
l
tak
e
s
et
o
f
at
tr
ib
u
tes,
P
o
lic
y
p
atter
n
h
a
s
h
v
a
lu
e
s
as
i
n
p
u
t
a
n
d
r
etu
r
n
s
Secr
et
k
e
y
a
s
o
u
tp
u
t.
E
ac
h
u
s
er
is
ass
o
ciate
d
w
ith
s
ec
r
et
k
e
y
a
n
d
it
w
ill
b
e
g
e
n
er
ated
u
s
in
g
th
r
ee
p
atter
n
k
e
y
s
as
'
1
/
(
)
1
,i
;
S
p
Kg
i=0
….
.
p
at1
.
len
g
th
;
'
1
/
(
)
1
,
j
;
S
q
Kg
j
=0
….
.
p
at2
.
len
g
th
;
'
1
/
(
)
1
,
k
;
S
r
Kg
k
=0
….
p
at3
.
len
g
h
t;
Secr
et
k
e
y
=
{T
p
,
Hash
(
p
at1
)
,
Hash
(
p
at2
)
,
Hash
(
p
at3
)
,
1
,
i
1
,
j
1
,
k
,,
K
K
K
};
E
ncry
ptio
n P
ro
ce
s
s
E
n
cr
y
p
tio
n
al
g
o
r
ith
m
e
n
cr
y
p
t
s
t
h
e
m
es
s
ag
e
u
s
i
n
g
p
o
lic
y
p
atter
n
s
tr
u
ct
u
r
es.
Alg
o
r
it
h
m
u
s
e
s
t
h
r
ee
p
atter
n
s
w
it
h
h
o
m
o
m
o
r
p
h
ic
e
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
.
A
d
d
itiv
e
an
d
Mu
ltip
licat
iv
e
h
o
m
o
m
o
r
p
h
is
m
tak
es
t
w
o
i
n
p
u
t
s
a
n
d
g
en
er
ate
s
ec
u
r
e
en
cr
y
p
ted
v
a
lu
e
s
as
o
u
tp
u
t.
Ho
m
o
m
o
r
p
h
ic
e
n
cr
y
p
ti
o
n
an
d
d
ec
r
y
p
tio
n
u
s
e
s
0
C
,
'
0
C
a
s
in
p
u
t.
Fo
r
ea
ch
p
air
o
f
f
ile
p
ar
titi
o
n
f
[
i]
d
ata
Do
Fo
r
ea
ch
ch
ar
ac
ter
j
in
f
[
i]
1
M
=f
[
i]
[
j
]
;
2
M
=
f
[
i+1
]
[
j
]
;
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
n
I
mp
r
o
ve
d
I
n
teg
r
a
ted
H
a
s
h
a
n
d
A
ttr
ib
u
ted
B
a
s
ed
E
n
cryp
ti
o
n
Mo
d
el
.
.
.
.
(
S
a
th
ee
s
h
K
S
V
A
K
a
vu
r
i)
957
A
d
d
iti
v
e
Ho
m
o
m
o
r
p
h
ic
E
n
cr
y
p
tio
n
1
2
1
2
(
)
(
)
(
)
;
E
n
c
M
M
E
n
c
M
E
n
c
M
Mu
ltip
licat
iv
e
Ho
m
o
m
o
r
p
h
ic
E
n
cr
y
p
tio
n
1
2
1
2
(
.
)
(
)
.
(
)
;
E
n
c
M
M
E
n
c
M
E
n
c
M
10
:
MC
;
'
20
:
MC
;
//
|
P
|
is
p
ar
titi
o
n
s
ize
E
n
c(
1
M
)
:=E
n
c(
0
C
)
=(
0
C
+
*
)
m
o
d
n
w
h
e
r
e
n
=
*
;
E
n
c(
2
M
)
:=E
n
c(
'
0
C
)
=(
'
0
C
+
*
)
m
o
d
n
w
h
e
r
e
n
=
*
;
12
()
E
n
c
M
M
=E
n
c(
'
00
CC
)
=E
n
c(
0
C
)
+E
n
c(
'
0
C
);
=(
0
C
+
*
)
m
o
d
n
+(
'
0
C
+
*
)
m
o
d
|
P
|
E
n
c(
12
.
MM
)
=E
n
c(
'
00
.
CC
)
=
E
n
c(
0
C
)
.
E
n
c(
'
0
C
);
=(
0
C
+
*
)
m
o
d
n
.
+(
'
0
C
+
*
)
m
o
d
|
P
|
C
ip
h
er
T
ex
t CT
={
T
.P
,
'
'
'
1
2
3
H
,
H
,
H
,
M.
e(
12
()
E
n
c
M
M
,
E
n
c(
12
.
MM
))
,{
1
,
2
,
j
3
,
k
,,
i
C
C
C
},
C
};
Do
n
e
C
ip
h
er
T
ex
t CT
is
p
u
b
licl
y
a
v
ailab
le
to
all
th
e
attr
ib
u
te
p
o
lic
y
h
o
ld
er
s
.
T
h
is
C
T
w
ill b
e
d
ec
r
y
p
ted
o
n
l
y
t
h
o
s
e
u
s
er
s
w
h
o
h
a
s
ex
ac
t p
o
lic
y
m
a
tch
i
n
g
p
atter
n
s
.
'
()
(
,
)
S
pp
e
g
g
.
||
1
,
1
,
1
(
,
)
P
ii
i
e
C
K
.
||
2
,
j
1
,
j
1
(
,
)
P
j
e
C
K
.
||
3
,
k
1
,
k
1
(
,
)
P
k
e
C
K
M.
'
()
(
,
)
S
pp
e
g
g
.
1
.
1
.
1
M.
'
()
(
,
)
S
pp
e
g
g
No
w
B
ased
o
n
th
e
u
s
er
e
n
ter
ed
p
o
licy
A
an
d
D
p
ar
a
m
eter
s
m
a
y
v
ar
y
a
s
I
f
u
s
er
e
n
ter
ed
p
o
licy
i
s
in
p
att
er
n
1
th
en
1
,
i
D
p
g
1,
ip
Ag
I
f
u
s
er
e
n
ter
ed
p
o
licy
i
s
in
p
att
er
n
2
th
en
2
,
j
D
p
g
2
,
j
p
Ag
I
f
u
s
er
e
n
ter
ed
p
o
licy
i
s
in
p
att
er
n
3
th
en
3
,
k
D
p
g
3
,
k
p
Ag
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
2
,
A
p
r
il 2
0
1
7
:
9
50
–
9
6
0
958
4.
RE
SU
L
T
S
A
ND
AN
AL
Y
SI
S
A
ll
ex
p
er
i
m
en
t
s
ar
e
p
er
f
o
r
m
ed
w
it
h
t
h
e
r
ea
l
ti
m
e
Am
az
o
n
a
w
s
clo
u
d
s
er
v
er
s
an
d
clien
t
co
n
f
i
g
u
r
atio
n
s
a
s
I
n
tel(
R
)
C
P
U
2
.
1
3
GHz
,
4
G
B
R
A
M,
an
d
th
e
m
i
n
i
m
u
m
OS
p
lat
f
o
r
m
is
Mic
r
o
s
o
f
t
W
in
d
o
w
s
7
P
r
o
f
ess
io
n
al
(
SP
2
)
.
T
h
is
f
r
a
m
e
w
o
r
k
r
eq
u
ir
es
t
h
ir
d
p
ar
t
y
lib
r
ar
ies
cp
ab
e,
ab
e,
a
m
az
o
n
a
w
s
,
an
d
j
am
a.
etc.
Fig
u
r
e
5
.
P
r
o
p
o
s
ed
P
ar
allel
H
ash
i
n
g
P
r
o
ce
s
s
T
ab
le
2
.
C
o
m
p
ar
is
o
n
o
f
Ha
s
h
b
ased
E
n
cr
y
p
tio
n
a
n
d
Dec
r
y
P
tio
n
m
o
d
els
A
l
g
o
r
i
t
h
m
D
a
t
a
S
i
z
e
(
K
B
)
H
a
sh
T
i
me
(
ms)
En
c
r
y
p
t
i
o
n
T
i
me
(
ms)
D
e
c
r
y
p
t
i
o
n
TI
me
(
ms)
C
P
A
B
E+
M
D
5
>
1
5
0
0
4
7
4
6
7
3
3
0
5
7
6
6
K
P
A
B
E+
S
H
A
1
2
>
1
5
0
0
5
8
4
4
5
8
6
6
5
4
3
2
F
H
En
c
r
y
t
i
o
n
+
S
H
A
2
5
6
>
1
5
0
0
6
8
3
4
7
9
5
5
7
1
9
8
D
U
P
H
A
+
H
y
b
r
i
d
A
B
E
>
1
5
0
0
2
3
6
5
3
6
8
6
3
5
1
9
P
a
r
a
l
l
e
l
H
a
sh
+
H
y
b
r
i
d
A
B
E
>
3
0
0
0
2
1
7
8
3
2
8
6
3
3
1
6
Fro
m
th
e
T
ab
le
2
,
it
is
clea
r
t
h
at
p
r
o
p
o
s
ed
p
ar
allel
A
B
E
b
a
s
ed
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
m
o
d
el
h
a
s
less
co
m
p
u
tatio
n
al
ti
m
e
co
m
p
ar
ed
to
tr
ad
itio
n
al
m
o
d
els
i
n
clo
u
d
en
v
ir
o
n
m
en
t.
Fro
m
t
h
e
Fig
u
r
e
5
,
it
is
clea
r
th
at
p
r
o
p
o
s
ed
p
ar
allel
m
u
l
ti
-
d
o
c
h
as
h
m
o
d
el
h
as
less
co
m
p
u
tatio
n
a
l
ti
m
e
co
m
p
ar
ed
to
tr
ad
itio
n
al
m
o
d
els
in
clo
u
d
en
v
ir
o
n
m
e
n
t.
Fro
m
t
h
e
f
i
g
u
r
e
6
,
it
is
clea
r
t
h
at
p
r
o
p
o
s
ed
p
ar
allel
A
B
E
b
ased
e
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
m
o
d
el
h
a
s
le
s
s
co
m
p
u
tatio
n
al
ti
m
e
co
m
p
ar
ed
to
tr
ad
itio
n
al
m
o
d
el
s
i
n
c
lo
u
d
e
n
v
ir
o
n
m
e
n
t.
Fro
m
t
h
e
T
ab
le
3
,
it
is
clea
r
th
at
p
r
o
p
o
s
ed
p
a
r
allel
h
as
h
b
a
s
ed
A
B
E
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
m
o
d
el
h
a
s
less
clo
u
d
s
to
r
ag
e
co
m
p
u
tatio
n
co
m
p
ar
ed
to
t
r
ad
itio
n
al
m
o
d
els
A
B
E
o
n
clo
u
d
en
v
ir
o
n
m
e
n
t.
Fro
m
th
e
Fi
g
u
r
e
7
,
i
t
is
clea
r
th
at
p
r
o
p
o
s
ed
p
ar
allel
h
ash
b
ased
A
B
E
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
m
o
d
el
h
as
le
s
s
clo
u
d
s
t
o
r
ag
e
co
m
p
u
tatio
n
co
m
p
ar
ed
to
tr
ad
itio
n
al
m
o
d
el
s
A
B
E
o
n
clo
u
d
e
n
v
ir
o
n
m
e
n
t.
T
ab
le
3
.
Me
m
o
r
y
s
to
r
ag
e
co
m
p
ar
is
o
n
w
ith
tr
ad
itio
n
al
A
B
E
m
o
d
el
s
en
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
ti
m
e
A
l
g
o
r
i
t
h
m
D
a
t
a
S
i
z
e
(
K
B
)
C
l
o
u
d
S
t
o
r
a
g
e
(
K
B
)
C
P
A
B
E+
M
D
5
5
0
0
5
4
5
K
P
A
B
E+
S
H
A
1
2
5
0
0
5
7
4
F
H
En
c
r
y
t
i
o
n
+
S
H
A
2
5
6
5
0
0
5
4
1
D
U
P
H
A
+
H
y
b
r
i
d
A
B
E
5
0
0
4
1
7
P
a
r
a
l
l
e
l
H
a
sh
+
H
y
b
r
i
d
A
B
E
5
0
0
3
5
9
R
o
u
n
d
(
R
1
)
R
o
u
n
d
(
R
2
)
R
o
u
n
d
(
R
3
)
R
o
u
n
d
(
R
1
0
)
…….
1
0
2
4
-
b
i
t
P
a
r
t
i
t
i
o
n
d
a
t
a
Key
Gene
r
a
t
i
o
n
1
0
2
4
B
i
t
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
n
I
mp
r
o
ve
d
I
n
teg
r
a
ted
H
a
s
h
a
n
d
A
ttr
ib
u
ted
B
a
s
ed
E
n
cryp
ti
o
n
Mo
d
el
.
.
.
.
(
S
a
th
ee
s
h
K
S
V
A
K
a
vu
r
i)
959
Fig
u
r
e
5
.
P
r
o
p
o
s
ed
p
ar
allel
m
u
lti
-
d
o
c
h
as
h
co
m
p
u
tatio
n
Fig
u
r
e
6
.
P
r
o
p
o
s
ed
p
ar
allel
m
u
lti
-
d
o
c
Fig
u
r
e
7
.
P
r
o
p
o
s
ed
p
ar
allel
m
u
lti
-
d
o
c
s
to
r
ag
e
co
m
p
u
tatio
n
5.
CO
NCLU
SI
O
N
C
lo
u
d
d
ata
o
u
t
s
o
u
r
cin
g
t
h
r
o
u
g
h
u
n
-
a
u
t
h
o
r
ized
clien
ts
a
n
d
d
is
tr
ib
u
ted
s
y
s
te
m
s
ar
e
e
x
p
o
n
en
tiall
y
in
cr
ea
s
i
n
g
clo
u
d
h
ar
d
w
ar
e
a
n
d
s
o
f
t
w
ar
e
r
eso
u
r
ce
s
.
C
lo
u
d
en
v
ir
o
n
m
e
n
t
p
r
o
v
id
es
o
n
d
e
m
an
d
r
eso
u
r
ce
allo
ca
tio
n
f
r
o
m
a
s
h
ar
ed
p
o
o
l
o
f
h
ar
d
w
ar
e
an
d
s
o
f
t
w
ar
e
r
eso
u
r
ce
s
.
W
ith
m
o
r
e
an
d
m
o
r
e
clo
u
d
b
ased
ap
p
licatio
n
s
ar
e
b
ein
g
a
v
aila
b
le
an
d
s
to
r
ed
o
n
v
ar
io
u
s
cl
o
u
d
s
er
v
er
s
,
a
n
o
v
el
m
u
lt
i
-
u
s
er
b
ased
p
r
iv
ac
y
p
r
o
tectio
n
m
ec
h
a
n
i
s
m
n
ee
d
t
o
d
esig
n
a
n
d
d
ev
elo
p
to
i
m
p
r
o
v
e
th
e
p
r
iv
ac
y
p
r
o
tectio
n
o
n
h
ig
h
d
i
m
en
s
io
n
a
l
d
ata.
I
n
th
i
s
p
ap
er
,
a
n
o
v
e
l
i
n
teg
r
i
t
y
a
lg
o
r
it
h
m
w
it
h
attr
ib
u
te
b
ased
e
n
cr
y
p
tio
n
m
o
d
el
w
a
s
i
m
p
le
m
e
n
ted
to
en
s
u
r
e
co
n
f
id
en
t
ialit
y
f
o
r
h
i
g
h
d
i
m
en
s
io
n
a
l d
ata
s
ec
u
r
it
y
o
n
clo
u
d
s
to
r
ag
e.
T
h
e
m
a
in
o
b
j
ec
tiv
e
o
f
th
is
m
o
d
el
i
s
to
s
to
r
e,
tr
an
s
m
it
a
n
d
r
et
r
ie
v
e
t
h
e
h
ig
h
d
i
m
e
n
s
io
n
al
clo
u
d
d
ata
w
it
h
lo
w
co
m
p
u
tat
i
o
n
al
ti
m
e
a
n
d
h
i
g
h
s
ec
u
r
it
y
.
E
x
p
er
i
m
en
ta
l
r
esu
lt
s
s
h
o
w
t
h
at
th
e
p
r
o
p
o
s
ed
m
o
d
el
h
as
h
i
g
h
d
ata
s
ca
lab
ilit
y
,
le
s
s
co
m
p
u
tatio
n
al
ti
m
e
an
d
lo
w
m
e
m
o
r
y
u
s
ag
e
co
m
p
a
r
ed
to
tr
a
d
itio
n
al
clo
u
d
b
ased
p
r
iv
ac
y
p
r
o
tec
tio
n
m
o
d
els.
RE
F
E
R
E
NC
E
S
[1
]
L
.
Ib
ra
im
i,
e
t
a
l.
,
“
Ef
f
icie
n
t
a
n
d
p
ro
v
a
b
le
se
c
u
re
c
ip
h
e
rtex
t
-
p
o
li
c
y
a
tt
rib
u
te
-
b
a
se
d
e
n
c
ry
p
ti
o
n
sc
h
e
m
e
s
,
”
Pro
c
.
5
t
h
In
t.
C
o
n
f
.
In
f
.
S
e
c
u
r.
Pra
c
t.
Exp
e
r.
,
v
o
l.
5
4
5
1
,
p
p
.
1
-
1
2
.
[2
]
J.
Hu
r,
“
Im
p
ro
v
in
g
se
c
u
rit
y
a
n
d
e
ff
icie
n
c
y
in
a
tt
rib
u
te
-
b
a
se
d
d
a
ta
sh
a
rin
g
,
”
IEE
E
T
ra
n
s.
K
n
o
wl.
Da
ta
En
g
.
,
v
o
l
/i
ss
u
e
:
25
(
10
)
,
p
p
.
2
2
7
1
-
2
2
8
2
,
2
0
1
3
.
[3
]
J.
L
a
i,
e
t
a
l.
,
“
A
tt
rib
u
te
-
b
a
se
d
e
n
c
r
y
p
ti
o
n
w
it
h
v
e
rif
iab
le
o
u
tso
u
rc
e
d
d
e
c
ry
p
ti
o
n
,
”
IE
EE
T
r
a
n
s.
In
f.
Fo
re
n
sic
s
S
e
c
u
rity
,
v
o
l
/i
ss
u
e
:
8
(
8
)
,
p
p
.
1
3
4
3
-
1
3
5
4
,
2
0
1
3
.
[4
]
Hu
r,
“
A
tt
rib
u
te
-
b
a
se
d
se
c
u
re
d
a
ta
sh
a
rin
g
w
it
h
h
id
d
e
n
p
o
li
c
ies
in
s
m
a
rt
g
rid
,
”
I
EEE
T
ra
n
sa
c
t
io
n
s
o
n
P
a
ra
ll
e
l
a
nd
Distrib
u
ted
S
y
ste
ms
,
v
o
l
/i
ss
u
e
:
24
(
11
)
,
2
0
1
3
.
Evaluation Warning : The document was created with Spire.PDF for Python.