I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
201
6
,
p
p
.
299
4
~
3
0
0
0
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
6i
6
.
1
1
9
7
2
2994
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
JE
C
E
A Cl
o
ud Ba
sed
Se
cure Voti
ng
Sys
te
m
u
sing
H
o
m
o
m
o
rphic
Encry
ption
for
A
ndro
id P
la
t
for
m
M
a
nis
h Ra
nja
n
,
Ay
ub
H
us
s
a
in M
o
nd
a
l,
M
o
njul
Sa
ik
ia
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
E
n
g
in
e
e
rin
g
,
No
r
th
Eas
tern
Re
g
io
n
a
l
In
stit
u
te o
f
S
c
ien
c
e
a
n
d
T
e
c
h
n
o
lo
g
y
,
Nirju
li
,
A
ru
n
a
c
h
a
l
P
ra
d
e
sh
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
l
26
,
2
0
1
6
R
ev
i
s
ed
No
v
8
,
2
0
1
6
A
cc
ep
ted
No
v
22
,
2
0
1
6
Clo
u
d
b
a
se
d
se
rv
ice
p
ro
v
id
e
r
a
re
a
t
it
s
to
p
o
f
it
s
se
rv
ice
s
fo
r
v
a
rio
u
s
a
p
p
li
c
a
ti
o
n
s,
a
s
t
h
e
ir
se
rv
ice
s
a
re
v
e
r
y
m
u
c
h
re
a
c
h
a
b
le
f
ro
m
a
n
y
w
h
e
r
e
a
n
y
ti
m
e
in
c
u
rre
n
t
d
a
y
s.
It
is
re
sp
o
n
si
b
il
i
ty
o
f
th
e
c
o
m
p
a
n
y
th
a
t
th
e
Clo
u
d
sto
ra
g
e
is
o
w
n
e
d
a
n
d
m
a
in
tain
e
d
b
y
th
e
m
se
lv
e
s
k
e
e
p
in
g
th
e
d
a
ta
a
v
a
il
a
b
le
a
n
d
a
c
c
e
ss
ib
le,
a
n
d
th
e
p
h
y
sic
a
l
e
n
v
iro
n
m
e
n
t
p
ro
tec
ted
a
n
d
ru
n
n
i
n
g
.
C
o
u
ld
sto
ra
g
e
p
ro
v
id
e
r
se
e
m
to
b
e
u
n
c
e
r
tain
o
f
c
o
n
f
id
e
n
ti
a
li
ty
in
m
a
n
y
c
a
se
s,
a
s
we
n
e
e
d
to
li
m
it
o
u
rse
lv
e
s
o
n
tr
u
st
t
o
a
th
ir
d
p
a
rty
.
Ke
e
p
in
g
o
u
r
se
n
sit
iv
e
d
a
ta
re
a
d
y
to
a
c
c
e
ss
a
n
y
ti
m
e
a
n
y
w
h
e
re
w
it
h
p
re
v
e
n
ti
n
g
a
n
y
in
f
o
r
m
a
ti
o
n
lea
k
a
g
e
is
a
c
h
a
ll
e
n
g
in
g
tas
k
.
Cry
p
to
g
ra
p
h
y
in
th
is
sc
e
n
a
rio
p
lay
s
a
n
im
p
o
rtan
t
r
o
le,
p
ro
v
id
i
n
g
se
c
u
rit
y
f
o
r
in
f
o
r
m
a
ti
o
n
to
p
ro
tec
t
v
a
lu
a
b
le
in
f
o
r
m
a
ti
o
n
re
so
u
rc
e
s
o
n
i
n
tran
e
ts,
I
n
te
rn
e
t
a
n
d
t
h
e
c
lo
u
d
.
I
n
a
d
d
it
i
o
n
,
Ho
m
o
m
o
rp
h
ic
c
ry
p
to
s
y
ste
m
is
a
f
o
r
m
o
f
Cr
y
p
to
g
ra
p
h
y
wh
e
re
so
m
e
sp
e
c
i
f
ic
c
o
m
p
u
tatio
n
c
a
n
b
e
p
e
rf
o
r
m
e
d
o
v
e
r
th
e
c
ip
h
e
r
tex
t
p
ro
d
u
c
i
n
g
a
re
su
lt
a
n
t
c
ip
h
e
r
tex
t
wh
ich
,
w
h
e
n
d
e
c
r
y
p
ted
,
e
q
u
a
l
s
th
e
re
su
lt
o
f
o
p
e
ra
ti
o
n
s
c
a
rry
o
u
t
o
n
th
e
p
lai
n
t
e
x
t.
W
it
h
h
e
lp
o
f
th
is
u
n
i
q
u
e
p
r
o
p
e
rty
o
f
h
o
m
o
m
o
rp
h
ism
c
r
y
p
to
g
ra
p
h
y
w
e
p
ro
p
o
se
d
a
s
y
ste
m
to
k
e
e
p
se
n
siti
v
e
in
f
o
r
m
a
ti
o
n
in
e
n
c
ry
p
ted
f
o
rm
in
th
e
c
lo
u
d
sto
ra
g
e
/se
rv
i
c
e
p
ro
v
id
e
r
a
n
d
u
se
d
th
o
se
d
a
ta
a
s
w
h
e
n
e
v
e
r
w
e
re
q
u
ire.
T
h
e
sc
h
e
m
e
p
ro
p
o
se
d
h
e
re
is
d
e
sig
n
e
d
f
o
r
a
s
e
c
u
re
o
n
li
n
e
v
o
ti
n
g
s
y
ste
m
o
n
A
n
d
ro
id
p
latf
o
rm
a
n
d
v
o
ted
i
n
f
o
rm
a
ti
o
n
is
e
n
c
ry
p
ted
a
n
d
st
o
re
d
t
h
o
se
in
th
e
c
lo
u
d
.
K
ey
w
o
r
d
:
An
d
r
o
id
p
latef
o
r
m
C
lo
u
d
co
m
p
u
tin
g
C
r
y
p
to
g
r
ap
h
y
Ho
m
o
m
o
r
p
h
ic
cr
y
p
to
s
y
s
te
m
Secu
r
it
y
an
d
p
r
iv
ac
y
Co
p
y
rig
h
t
©
2
0
1
6
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Mo
n
j
u
l Saik
ia,
Dep
ar
te
m
en
t o
f
C
o
m
p
u
ter
Sci
en
ce
an
d
E
n
g
i
n
ee
r
in
g
,
No
r
th
E
aster
n
R
eg
io
n
al
I
n
s
tit
u
te
o
f
Scien
ce
a
n
d
T
e
ch
n
o
lo
g
y
,
Nir
j
u
li
-
791109
,
A
r
u
n
ac
h
al
P
r
ad
esh
,
I
n
d
ia
.
E
m
ail:
m
o
n
j
u
l
s
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
m
ea
n
i
n
g
o
f
E
n
cr
y
p
tio
n
c
o
n
tain
s
i
n
t
h
e
w
o
r
d
it
s
el
f
,
th
e
b
ase
"
en
cr
y
p
t"
ca
n
b
e
s
ee
n
a
s
"
en
"
an
d
"
cr
y
p
t"
.
T
h
e
m
ea
n
i
n
g
o
f
"
en
"
is
"
to
m
ak
e"
,
an
d
th
e
w
o
r
d
"
c
r
y
p
t"
m
ea
n
s
h
id
d
en
o
r
s
ec
r
et.
T
h
er
ef
o
r
e
th
e
m
ea
n
in
g
o
f
"
en
cr
y
p
t"
is
"
to
m
ak
e
h
id
d
en
o
r
s
ec
r
et"
[
1
]
.
I
n
cr
y
p
to
g
r
ap
h
y
,
e
n
cr
y
p
tio
n
i
s
t
h
e
p
r
o
ce
s
s
o
f
e
n
co
d
in
g
m
e
s
s
a
g
es
o
r
i
n
f
o
r
m
atio
n
i
n
s
u
c
h
a
m
an
n
er
th
at
o
n
l
y
a
u
t
h
o
r
ized
u
s
er
ca
n
i
n
ter
p
r
et
it.
Hen
ce
t
h
e
s
c
h
e
m
e
o
f
e
n
cr
y
p
tio
n
is
w
id
el
y
u
s
ed
f
o
r
s
ec
r
et
e
co
m
m
u
n
icatio
n
b
et
w
ee
n
t
w
o
p
ar
ties
.
I
n
a
n
e
n
cr
y
p
tio
n
s
ch
e
m
e
a
lar
g
e
p
s
e
u
d
o
-
r
an
d
o
m
n
u
m
b
er
ca
lled
en
cr
y
p
tio
n
k
e
y
is
g
en
er
ated
b
y
an
alg
o
r
it
h
m
w
h
ic
h
is
to
b
e
u
s
ed
f
o
r
co
m
p
u
tatio
n
o
f
th
e
ci
p
h
er
tex
t
.
L
ater
th
e
r
ec
eiv
er
u
s
es
t
h
e
s
a
m
e
k
e
y
to
d
ec
r
y
p
t
to
e
x
tr
ac
t
t
h
e
ac
tu
a
l
m
es
s
ag
e
b
ein
g
tr
an
s
m
i
tted
(
in
ca
s
e
o
f
s
y
m
m
etr
i
c
k
e
y
e
n
cr
y
p
tio
n
)
.
A
u
s
er
w
it
h
o
u
t h
a
v
i
n
g
t
h
e
s
a
m
e
k
e
y
u
s
ed
f
o
r
en
cr
y
p
tio
n
ca
n
n
o
t d
ec
r
y
p
t c
o
r
r
ec
tly
.
T
h
e
o
b
j
ec
tiv
e
o
f
m
o
d
er
n
cr
y
p
t
o
g
r
ap
h
y
ca
n
b
e
class
i
f
ied
in
f
o
u
r
ca
teg
o
r
ies
:
a.
C
o
n
f
id
en
tia
lit
y
: T
h
e
in
f
o
r
m
ati
o
n
is
s
ec
r
ete
an
d
ca
n
n
o
t b
e
r
ec
o
g
n
ize
b
y
u
n
in
te
n
d
ed
p
er
s
o
n
.
b.
I
n
teg
r
it
y
:
No
m
o
d
i
f
icatio
n
ca
n
b
e
d
o
n
e
o
n
th
e
i
n
f
o
r
m
atio
n
s
en
d
i
n
b
et
w
ee
n
t
h
e
s
e
n
d
er
an
d
th
e
in
te
n
d
ed
r
ec
eiv
er
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
C
lo
u
d
B
a
s
ed
S
ec
u
r
e
V
o
tin
g
S
ystem
Usi
n
g
Ho
mo
mo
r
p
h
ic
E
n
cry
p
tio
n
fo
r
....
(
Ma
n
is
h
R
a
n
ja
n
)
2995
c.
No
n
-
r
ep
u
d
iatio
n
:
T
h
e
s
e
n
d
er
ca
n
n
o
t
r
e
f
u
s
e
th
e
s
en
d
i
n
g
o
f
t
h
e
in
f
o
r
m
at
io
n
o
n
ce
it
is
en
cr
y
p
ted
an
d
p
ass
ed
to
th
e
r
ec
eiv
er
.
d.
Au
t
h
en
t
icatio
n
:
I
d
en
ti
t
y
o
f
t
h
e
s
en
d
er
an
d
r
ec
eiv
er
o
r
th
e
o
r
ig
in
o
f
t
h
e
s
o
u
r
ce
an
d
th
e
d
esti
n
atio
n
is
co
n
f
ir
m
ed
b
y
ea
ch
o
th
er
.
R
ec
en
t
cr
y
p
to
g
r
ap
h
y
u
s
e
s
co
m
p
lex
m
at
h
e
m
atica
l
th
eo
r
y
an
d
co
m
p
u
ta
tio
n
al
lo
g
ic
m
a
k
in
g
it
h
ar
d
t
o
b
r
ea
k
s
u
c
h
alg
o
r
it
h
m
.
A
l
g
o
r
it
h
m
s
an
d
p
r
o
ce
d
u
r
es
to
b
r
ea
k
s
u
c
h
alg
o
r
it
h
m
ic
lo
g
ic
i
s
also
u
n
d
er
th
e
s
tu
d
y
o
f
b
r
o
ad
t
o
p
ic
o
f
cr
y
p
tan
al
y
s
is
[
2
]
.
I
n
a
clo
u
d
b
ased
en
v
ir
o
n
m
e
n
t
it
s
ee
m
s
th
a
t
th
e
d
e
m
an
d
f
o
r
p
r
iv
ac
y
o
f
d
i
g
ital
d
ata
an
d
a
lg
o
r
ith
m
s
th
at
h
a
n
d
les
t
h
e
p
r
o
ce
s
s
o
f
p
r
iv
ac
y
h
a
v
e
in
cr
ea
s
ed
e
x
p
o
n
e
n
tiall
y
.
P
r
o
b
ab
ilit
y
o
f
s
u
s
p
icio
u
s
a
ttack
s
i
n
v
o
lv
ed
w
it
h
i
n
o
r
o
u
ts
id
e
a
th
ir
d
p
a
r
t
y
s
er
v
ice
p
r
o
v
id
er
t
h
at
m
a
y
m
an
ip
u
late
an
d
d
estr
u
ct
t
h
e
s
to
r
ed
s
en
s
iti
v
e
in
f
o
r
m
atio
n
.
T
ec
h
n
o
lo
g
y
f
o
r
g
u
ar
an
tee
s
ec
u
r
it
y
o
f
p
r
i
v
ate
d
a
ta
in
clo
u
d
i
s
c
u
r
r
en
t
to
p
ic
o
f
r
esear
ch
.
A
lt
h
o
u
g
h
s
ec
u
r
e
s
to
r
ag
e
ca
n
b
e
ac
h
ie
v
e
b
y
m
ea
n
s
o
f
u
s
i
n
g
cr
y
p
to
g
r
a
p
h
y
al
g
o
r
ith
m
,
s
til
l
s
er
io
u
s
p
r
o
b
lem
ar
is
e
w
h
e
n
co
m
p
u
tatio
n
o
v
er
th
e
s
to
r
ed
d
ata
is
r
eq
u
ir
ed
.
I
n
r
ec
en
t
d
a
y
s
,
d
ev
elo
p
m
e
n
t
o
f
s
u
itab
le
alg
o
r
ith
m
s
to
p
er
f
o
r
m
co
m
p
u
tatio
n
o
v
er
cip
h
er
d
ata
is
a
h
o
t
to
p
ic
o
f
r
esear
ch
th
at
f
all
s
u
n
d
er
b
r
o
a
d
ar
ea
o
f
h
o
m
o
m
o
r
p
h
ic
cr
y
p
to
s
y
s
te
m
s
[
3
]
.
2.
H
O
M
O
M
O
RP
H
I
C
CRYP
T
O
SYST
E
M
T
h
e
co
n
ce
p
t
o
f
h
o
m
o
m
o
r
p
h
i
c
en
cr
y
p
t
io
n
w
a
s
f
ir
s
t
p
r
o
p
o
s
ed
in
1
9
7
8
b
y
R
o
n
ald
R
i
v
es
t
,
L
eo
n
ar
d
A
d
le
m
an
an
d
M
ich
ae
l
Der
to
u
zo
s
[
4
]
.
Ov
er
p
ast 3
0
y
ea
r
s
a
m
o
d
e
s
t
g
r
o
w
t
h
h
a
s
b
ee
n
s
ee
n
.
I
n
1
9
8
2
Go
ld
w
ass
er
an
d
Mic
al
p
r
o
p
o
s
ed
an
en
cr
y
p
tio
n
s
c
h
e
m
e
w
h
ic
h
h
as
ac
c
o
m
p
li
s
h
ed
a
n
o
tab
le
le
v
el
o
f
s
ec
u
r
it
y
[
5
]
.
T
h
ey
p
r
o
p
o
s
ed
an
ad
d
itiv
e
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
w
h
ic
h
ab
le
to
en
cr
y
p
t o
n
l
y
o
n
e
b
it.
I
n
t
h
e
y
e
ar
1
9
9
9
P
ailler
[
6
]
h
ad
u
s
ed
t
h
e
s
a
m
e
t
h
o
u
g
h
t
to
d
esig
n
an
e
n
cr
y
p
tio
n
s
y
s
te
m
th
at
ca
n
p
er
f
o
r
m
ad
d
itio
n
o
v
er
cip
h
er
tex
t,
also
ca
lled
an
ad
d
itiv
e
h
o
m
o
m
o
r
p
h
ic
e
n
cr
y
p
tio
n
.
Da
n
B
o
n
e
h
et.
,
al.
,
[
7
]
in
2
0
0
5
,
in
v
en
ted
a
s
y
s
te
m
o
f
v
er
i
f
iab
le
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
s
ch
e
m
e,
w
it
h
w
h
ich
ca
n
p
er
f
o
r
m
a
n
u
m
b
er
o
f
ad
d
itio
n
s
w
it
h
o
n
l
y
o
n
e
m
u
ltip
licatio
n
at
a
ti
m
e.
I
n
2
0
0
9
C
r
aig
Gen
tr
y
[
8
]
o
f
I
B
M
h
as
p
r
o
p
o
s
ed
a
s
ch
e
m
e
t
h
at
ca
n
co
m
p
u
te
an
ar
b
itra
r
y
n
u
m
b
er
o
f
ad
d
itio
n
an
d
m
u
l
tip
licatio
n
o
v
er
cip
h
e
r
tex
t.
T
h
e
en
cr
y
p
tio
n
s
y
s
te
m
is
ca
lled
a
"
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
"
.
T
h
e
ap
p
licatio
n
o
f
th
i
s
s
c
h
e
m
e
h
as
b
ee
n
lo
n
g
w
aited
d
u
e
to
th
e
p
r
o
b
le
m
o
f
co
m
p
le
x
co
m
p
u
tatio
n
,
w
h
ich
later
f
e
asib
le
a
f
ter
d
ev
e
lo
p
m
e
n
t
o
f
R
S
A
.
A
s
o
l
u
tio
n
p
r
o
v
ed
h
ar
d
er
to
p
in
d
o
w
n
f
o
r
m
o
r
e
th
a
n
3
0
y
ea
r
s
,
t
h
e
p
r
ac
tical
ap
p
licatio
n
o
f
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
e
n
cr
y
p
tio
n
w
as
u
n
ce
r
tai
n
w
h
et
h
er
it
w
a
s
ev
e
n
f
ea
s
ib
le.
Du
r
i
n
g
t
h
i
s
p
er
io
d
,
B
o
n
eh
[
9
]
s
h
o
w
ed
t
h
e
b
est
r
esu
l
t,
w
ith
u
n
li
m
ited
n
u
m
b
er
o
f
ad
d
itio
n
an
d
at
m
o
s
t
o
n
e
m
u
ltip
licati
o
n
.
I
n
2
0
0
9
C
r
aig
Gen
tr
y
f
r
o
m
I
B
M
s
h
o
w
ed
th
e
f
ir
s
t
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
u
s
i
n
g
lattice
-
b
ased
cr
y
p
to
g
r
ap
h
y
.
3.
H
O
M
O
M
O
RP
H
I
C
CRYP
T
O
SYST
E
M
CL
ASSI
F
I
CA
T
I
O
N
Ho
m
o
m
o
r
p
h
ic
C
r
y
p
to
s
y
s
te
m
is
m
ai
n
l
y
clas
s
if
ie
d
in
to
t
w
o
b
r
o
ad
ca
teg
o
r
ies
n
a
m
e
l
y
p
ar
tiall
y
h
o
m
o
m
o
r
p
h
ic
cr
y
p
to
s
y
s
te
m
s
an
d
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
C
r
y
p
t
o
s
y
s
te
m
.
Di
f
f
er
en
t
e
n
cr
y
p
tio
n
s
ch
e
m
e
u
n
d
er
ea
c
h
ca
teg
o
r
y
ar
e
as s
h
o
w
n
i
n
F
i
g
u
r
e
1
.
3
.
1
.
P
a
r
t
ia
lly
H
o
m
o
m
o
rphic C
ry
pto
s
y
s
t
e
m
A
cr
y
p
to
s
y
s
te
m
i
s
s
aid
to
b
e
p
ar
tially
h
o
m
o
m
o
r
p
h
ic
[
3
]
if
it
ca
n
p
er
f
o
r
m
eit
h
er
a
ad
d
iti
on
o
r
m
u
ltip
licat
io
n
,
b
u
t
n
o
t
b
o
th
a
t
th
e
s
a
m
e
ti
m
e
.
C
lear
l
y
,
th
i
s
is
li
m
iti
n
g
t
h
e
s
c
h
e
m
e
o
f
p
a
r
tial
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
to
ce
r
tai
n
ap
p
licati
o
n
s
,
alt
h
o
u
g
h
t
h
e
e
f
f
icie
n
c
y
p
ar
tial
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
t
io
n
s
ch
e
m
es
is
h
ig
h
en
o
u
g
h
f
o
r
p
r
ac
tical
ap
p
licatio
n
s
.
M
o
s
t
p
ar
tial
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
s
ch
e
m
es
o
n
l
y
s
u
p
p
o
r
t
o
n
e
ty
p
e
o
f
o
p
er
atio
n
,
e.
g
.
P
aillier
’
s
alg
o
r
i
th
m
s
u
p
p
o
r
ts
ad
d
itio
n
w
h
er
ea
s
R
S
A
s
u
p
p
o
r
ts
o
n
l
y
m
u
ltip
lica
tio
n
s
.
3
.
2
.
F
ull
y
H
o
m
o
m
o
rp
h
ic
Cry
pto
s
y
s
t
e
m
A
cr
y
p
to
s
y
s
te
m
w
h
er
e
ar
b
itra
r
y
co
m
p
u
tatio
n
o
v
er
cip
h
er
t
ex
ts
ca
n
b
e
p
er
f
o
r
m
ed
is
ca
l
led
a
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
t
io
n
(
FH
E
)
[
4
]
.
A
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
ca
n
b
e
u
s
ed
f
o
r
d
esig
n
o
f
p
r
o
g
r
a
m
s
w
h
er
e
v
ar
io
u
s
f
u
n
ctio
n
a
lit
y
a
r
e
in
v
o
l
v
ed
.
S
u
c
h
a
p
r
o
g
r
a
m
ca
n
b
e
r
u
n
b
y
a
n
u
n
tr
u
s
ted
th
ir
d
p
ar
t
y
w
it
h
o
u
t
r
ev
ea
lin
g
i
ts
o
r
ig
in
al
in
p
u
ts
an
d
i
n
ter
n
al
s
tate
to
p
r
o
d
u
ce
d
esire
d
o
u
tp
u
t
.
T
h
e
d
is
c
o
v
er
y
o
f
th
e
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
cr
y
p
to
s
y
s
te
m
w
o
u
ld
h
av
e
v
ar
io
u
s
p
r
ac
tical
ap
p
licatio
n
s
i
n
t
h
e
o
u
ts
o
u
r
cin
g
o
f
p
r
iv
at
e
co
m
p
u
tatio
n
s
as
w
el
l a
s
i
n
th
e
co
n
tex
t o
f
clo
u
d
co
m
p
u
t
in
g
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
2
0
1
6
:
2
9
9
4
–
3
0
0
0
2996
Fig
u
r
e
1
.
Ho
m
o
m
o
r
p
h
ic
C
r
y
p
t
o
s
y
s
te
m
C
las
s
i
f
icatio
n
4.
P
AIL
L
I
E
R'S
H
O
M
O
M
O
RP
H
I
C
CRYP
T
O
S
YST
E
M
AND
T
H
E
I
R
H
O
M
O
M
O
RP
H
I
C
P
RO
P
E
RT
I
E
S
P
aillier
'
s
cr
y
p
to
s
y
s
te
m
;
i
n
v
en
ted
b
y
Fre
n
c
h
r
esear
ch
er
P
as
ca
l
P
aillier
in
1
9
9
9
is
an
alg
o
r
ith
m
f
o
r
p
ar
tiall
y
h
o
m
o
m
o
r
p
h
ic
cr
y
p
to
s
y
s
te
m
[
1
0
]
.
I
t
is
i
n
d
ee
d
a
p
u
b
lic
k
e
y
cr
y
p
to
g
r
ap
h
y
w
h
er
e
as
y
m
m
etr
ic
k
e
y
s
ar
e
u
s
ed
.
User
s
n
ee
d
to
ag
r
ee
w
it
h
a
p
u
b
lic
k
e
y
p
r
io
r
to
th
e
e
n
c
r
y
p
tio
n
p
r
o
ce
s
s
.
A
p
r
iv
ate
k
e
y
is
k
ep
t
s
ec
r
et,
an
d
u
s
ed
at
th
e
d
est
in
at
io
n
f
o
r
d
ec
r
y
p
tio
n
p
u
r
p
o
s
e.
T
h
e
r
ec
ip
ie
n
t
p
u
b
lic
k
e
y
i
s
u
s
ed
f
o
r
th
e
en
cr
y
p
tio
n
p
u
r
p
o
s
e.
T
h
e
k
e
y
s
ar
e
g
en
er
ated
w
it
h
t
h
e
h
elp
o
f
s
o
m
e
m
at
h
e
m
atica
l
th
eo
r
ies,
r
estricti
n
g
d
er
i
v
atio
n
o
f
t
h
e
p
r
iv
ate
k
e
y
f
r
o
m
t
h
e
p
u
b
lic
k
e
y
.
T
h
e
P
aillier
C
r
y
p
to
s
y
s
te
m
s
c
h
e
m
e
h
a
s
th
r
ee
p
h
a
s
es:
a.
Ke
y
Ge
n
er
atio
n
.
b.
E
n
cr
y
p
tio
n
.
c.
Dec
r
y
p
tio
n
.
4
.
1
.
K
ey
G
ener
a
t
io
n
1.
T
w
o
lar
g
e
p
r
i
m
e
n
u
m
b
er
s
p
a
n
d
q
r
an
d
o
m
l
y
ar
e
r
an
d
o
m
l
y
ch
o
s
en
,
w
h
ic
h
ar
e
i
n
d
ep
en
d
en
t
o
f
ea
c
h
o
th
er
,
s
u
c
h
th
a
t
(
(
)
(
)
)
.
2.
C
o
m
p
u
te
an
d
(
)
.
3.
Select
r
an
d
o
m
i
n
te
g
er
w
h
er
e
4.
E
n
s
u
r
e
d
iv
id
es t
h
e
o
r
d
er
o
f
b
y
ch
ec
k
i
n
g
:
(
(
)
)
,
w
h
er
e
f
u
n
ctio
n
is
d
ef
in
ed
as
(
)
a.
T
h
e
p
u
b
lic
(
en
cr
y
p
tio
n
)
k
e
y
is
(
)
.
b.
T
h
e
p
r
iv
ate
(
d
ec
r
y
p
tio
n
)
k
e
y
i
s
(
)
.
4
.
2
.
E
ncry
ptio
n
I
f
th
e
p
u
b
lic
k
e
y
p
air
is
(
)
,
th
en
t
h
e
en
cr
y
p
t
io
n
o
f
a
m
ess
a
g
e
m
is
f
o
r
a
r
an
d
o
m
w
h
er
e
.
H
o
mo
mo
r
p
h
i
c
C
r
y
p
t
o
sy
st
e
m
P
a
r
t
i
a
l
l
y
H
o
mo
mo
r
p
h
i
c
C
r
y
p
t
o
sy
st
e
m
F
u
l
l
y
H
o
mo
mo
r
p
h
i
c
C
r
y
p
t
o
sy
st
e
m
Ea
r
l
y
:
a.
U
n
p
a
d
d
e
d
R
S
A
c
r
y
p
t
o
s
y
st
e
m
b.
El
G
a
mal
c
r
y
p
t
o
sy
st
e
m
c.
G
o
l
d
w
a
ss
e
r
–
M
i
c
a
l
i
c
r
y
p
t
o
sy
st
e
m
d.
B
e
n
a
l
o
h
c
r
y
p
t
o
sy
st
e
m
e.
P
a
i
l
l
i
e
r
c
r
y
p
t
o
s
y
st
e
m
A
d
v
a
n
c
e
d
:
a.
O
k
a
mo
t
o
–
U
c
h
i
y
a
ma
c
r
y
p
t
o
s
y
st
e
m
b.
N
a
c
c
a
c
h
e
–
S
t
e
r
n
c
r
y
p
t
o
sy
st
e
m
c.
D
a
mg
å
r
d
–
Ju
r
i
k
c
r
y
p
t
o
sy
st
e
m
d.
B
o
n
e
h
–
G
o
h
–
N
i
ssi
m
c
r
y
p
t
o
s
y
st
e
m
e.
I
sh
a
i
-
P
a
sk
i
n
c
r
y
p
t
o
sy
st
e
m
Ea
r
l
y
:
a.
G
e
n
t
r
y
's c
r
y
p
t
o
sy
st
e
m
b.
C
r
y
p
t
o
sy
st
e
m o
v
e
r
t
h
e
i
n
t
e
g
e
r
s
T
h
e
2
n
d
g
e
n
e
r
a
t
i
o
n
o
f
h
o
mo
mo
r
p
h
i
c
c
r
y
p
t
o
sy
st
e
ms
:
a.
T
h
e
B
r
a
k
e
r
sk
i
-
G
e
n
t
r
y
-
V
a
i
k
u
n
t
a
n
a
t
h
a
n
c
r
y
p
t
o
s
y
st
e
m (BG
V
)
,
b.
B
r
a
k
e
r
sk
i
's s
c
a
l
e
-
i
n
v
a
r
i
a
n
t
c
r
y
p
t
o
s
y
st
e
m.
c.
T
h
e
N
T
R
U
-
b
a
se
d
c
r
y
p
t
o
s
y
st
e
m (
L
T
V
)
d.
T
h
e
G
e
n
t
r
y
-
S
a
h
a
i
-
W
a
t
e
r
s
c
r
y
p
t
o
s
y
st
e
m (
G
S
W
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
C
lo
u
d
B
a
s
ed
S
ec
u
r
e
V
o
tin
g
S
ystem
Usi
n
g
Ho
mo
mo
r
p
h
ic
E
n
cry
p
tio
n
fo
r
....
(
Ma
n
is
h
R
a
n
ja
n
)
2997
4
.
3
.
Dec
ry
ptio
n
I
f
is
t
h
e
cip
h
er
tex
t to
d
ec
r
y
p
t,
w
h
er
e
,
w
e
c
o
m
p
u
te
t
h
e
p
lain
t
ex
t
m
e
s
s
a
g
e
as:
(
)
4
.
4
.
T
he
H
o
m
o
m
o
r
ph
ic
P
ro
pert
i
es:
a.
Ho
m
o
m
o
r
p
h
ic
ad
d
itio
n
:
T
h
e
p
r
o
d
u
ct
o
f
t
w
o
cip
h
er
tex
t
s
w
ill
d
ec
r
y
p
t
to
th
e
s
u
m
o
f
th
eir
co
r
r
esp
o
n
d
in
g
p
lain
tex
ts
,
(
(
)
(
)
)
b
.
Ho
m
o
m
o
r
p
h
ic
m
u
lt
ip
licatio
n
:
An
en
cr
y
p
ted
p
lain
te
x
t
r
ais
ed
to
th
e
p
o
w
er
o
f
a
n
o
th
er
p
la
in
te
x
t
w
ill
d
ec
r
y
p
t
to
th
e
p
r
o
d
u
ct
o
f
th
e
t
w
o
p
lain
tex
ts
,
(
(
)
)
(
(
)
)
Mo
r
e
g
en
er
all
y
,
an
e
n
cr
y
p
ted
p
lain
tex
t
r
aised
to
a
co
n
s
tan
t
k
w
i
ll
d
ec
r
y
p
t
to
t
h
e
p
r
o
d
u
ct
o
f
th
e
p
lai
n
te
x
t
a
n
d
th
e
co
n
s
tan
t,
(
(
)
)
T
h
ese
s
p
ec
ial
h
o
m
o
m
o
r
p
h
ic
p
r
o
p
er
ties
ar
e
b
est s
u
itab
le
in
t
h
e
p
r
o
p
o
s
ed
s
ec
u
r
e
v
o
tin
g
s
c
h
e
m
e
.
5.
T
H
E
P
RO
P
S
E
D
VO
T
I
N
G
S
YST
E
M
M
O
DE
L
T
h
e
p
r
o
p
o
s
ed
o
n
lin
e
v
o
tin
g
s
y
s
te
m
is
d
esi
g
n
ed
to
p
r
o
v
id
e
h
i
g
h
s
ec
u
r
it
y
w
it
h
m
i
n
i
m
u
m
co
s
t
w
i
t
h
p
ap
er
less
w
o
r
k
i
n
t
h
e
p
r
o
ce
s
s
o
f
v
o
ti
n
g
.
P
aillier
'
s
e
n
cr
y
p
ti
o
n
tech
n
iq
u
e
is
u
s
ed
to
en
cr
y
p
t
th
e
ca
s
ted
v
o
tes
be
f
o
r
e
s
to
r
in
g
it
i
n
t
h
e
w
eb
s
e
r
v
er
.
T
h
e
m
o
s
t
v
al
u
ab
le
f
ea
t
u
r
e
o
f
Ho
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
d
is
c
u
s
s
ed
ea
r
lier
p
er
f
o
r
m
s
t
h
e
o
p
er
atio
n
s
o
n
s
t
o
r
ed
d
ata
t
o
f
in
d
o
u
t
f
in
al
r
es
u
lt
o
f
v
o
tin
g
w
i
t
h
o
u
t
ev
e
n
d
ec
r
y
p
ti
n
g
th
o
s
e
d
ata
.
T
h
is
w
a
y
w
e
ca
n
p
r
ev
en
t
a
u
s
er
f
r
o
m
k
n
o
w
i
n
g
w
h
ate
v
er
in
f
o
r
m
at
io
n
b
ein
g
s
to
r
ed
o
n
th
e
w
eb
s
er
v
er
p
r
o
v
id
in
g
v
er
y
h
ig
h
s
ec
u
r
it
y
a
s
w
ell
a
s
m
i
n
i
m
izi
n
g
t
h
e
co
s
t
b
y
d
esi
g
n
i
n
g
a
u
s
er
f
r
ie
n
d
l
y
A
n
d
r
o
id
in
ter
f
ac
e
f
o
r
ca
s
tin
g
v
o
tes
.
T
h
e
p
r
o
p
o
s
ed
m
o
d
el
h
as
f
iv
e
p
h
ases
:
a.
C
an
d
id
ate
A
d
d
itio
n
p
h
a
s
e:
I
n
t
h
is
p
h
a
s
e
t
h
e
lis
t c
o
n
test
a
n
t a
r
e
to
b
e
u
p
lo
ad
e
d
to
th
e
s
er
v
er
.
b.
Vo
ter
R
eg
i
s
tr
a
tio
n
a
n
d
v
al
id
atio
n
p
h
ase:
T
h
e
v
o
ter
r
eg
is
ter
s
th
e
m
s
el
v
es
f
o
r
v
o
ti
n
g
p
u
r
p
o
s
e
an
d
ad
m
in
i
s
tr
ato
r
v
er
i
f
ies t
h
e
v
o
te
r
an
d
g
iv
e
s
ac
ce
s
s
p
er
m
is
s
io
n
f
o
r
v
o
tin
g
.
c.
Sh
ar
i
n
g
p
as
s
co
d
e
an
d
p
u
b
lic
k
e
y
p
h
a
s
e:
W
it
h
h
elp
o
f
a
k
e
y
g
e
n
er
atio
n
al
g
o
r
ith
m
p
u
b
li
c
an
d
p
r
iv
ate
k
e
y
s
ar
e
g
e
n
er
ated
,
a
d
m
in
i
s
tr
ato
r
th
e
n
s
h
ar
e
s
t
h
e
p
u
b
lic
k
e
y
w
it
h
v
o
ter
s
b
y
a
s
e
p
ar
ate
co
m
m
u
n
icatio
n
m
ed
i
u
m
.
d.
Vo
tin
g
p
r
o
ce
s
s
(
w
it
h
en
cr
y
p
t
io
n
)
p
h
ase:
W
h
e
n
ev
er
v
o
ter
g
o
es
f
o
r
v
o
ti
n
g
,
t
h
e
w
h
o
le
p
r
o
ce
s
s
g
o
es th
r
o
u
g
h
v
ar
io
u
s
p
h
a
s
es o
f
h
o
m
o
m
o
r
p
h
ic
e
n
cr
y
p
tio
n
p
r
o
ce
s
s.
e.
C
o
u
n
ti
n
g
p
h
a
s
e:
A
d
m
i
n
is
tr
ato
r
f
in
all
y
c
h
ec
k
s
th
e
to
tal
v
o
te
s
ag
ain
s
t
ea
ch
o
f
th
e
ca
n
d
id
ate
s
an
d
d
ec
lar
e
th
e
r
esu
lt
s
.
I
t
is
a
clie
n
t
s
er
v
er
b
ased
v
o
tin
g
s
y
s
te
m
w
h
ic
h
h
as
o
n
e
ad
m
i
n
is
tr
ato
r
w
h
o
ca
n
co
n
tr
o
l
t
h
e
w
h
o
l
e
s
y
s
te
m
.
A
d
m
in
is
tr
ato
r
is
th
e
o
n
e
w
h
o
h
a
s
th
e
p
r
iv
ile
g
e
to
ad
d
th
e
ca
n
d
id
ates
as
s
h
o
w
n
in
Fig
u
r
e
2
,
to
w
h
o
m
o
n
e
ca
n
v
o
te,
g
e
n
er
ate
p
ass
wo
r
d
f
o
r
u
s
er
an
d
ca
lcu
late
th
e
r
esu
lt.
A
u
s
er
/
v
o
ter
n
ee
d
s
to
r
eg
is
ter
b
e
f
o
r
e
v
o
tin
g
.
A
d
m
in
i
s
tr
ato
r
v
er
i
f
ies
h
is
/
h
er
au
t
h
e
n
ticit
y
t
h
en
o
n
l
y
p
r
o
v
id
es
a
p
ass
w
o
r
d
th
r
o
u
g
h
ch
o
o
s
in
g
a
s
ec
u
r
e
ch
an
n
el.
A
f
ter
g
etti
n
g
t
h
e
p
ass
w
o
r
d
th
e
v
o
ter
n
o
w
ca
n
lo
g
i
n
to
th
e
ac
tu
al
v
o
ti
n
g
s
y
s
te
m
an
d
ca
n
v
o
te
f
o
r
an
y
ca
n
d
id
ate
o
f
h
i
s
/h
er
c
h
o
ice.
Fig
u
r
e
3
s
h
o
w
s
h
o
w
ad
m
in
d
is
tr
ib
u
te
s
t
h
e
p
u
b
lic
k
e
y
p
air
to
th
e
v
o
ter
s
w
h
o
h
a
v
e
r
e
g
is
t
er
ed
.
T
h
is
d
is
tr
ib
u
tio
n
n
ee
d
to
b
e
i
n
a
s
ep
ar
ate
ch
a
n
n
e
l.
Af
ter
e
n
ter
in
g
to
t
h
e
s
y
s
te
m
a
v
o
ter
n
e
ed
to
ch
o
o
s
e
o
n
e
ca
n
d
id
ate
o
f
h
i
s
ch
o
ice
an
d
t
h
en
t
h
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
b
eg
in
s
at
th
is
s
ta
g
e.
T
h
e
cip
h
e
r
tex
t
o
f
th
e
ca
s
ted
v
o
tes
w
ill b
e
s
t
o
r
ed
in
t
h
e
w
eb
s
er
v
er
d
atab
ase
(
Sh
o
w
n
i
n
F
i
g
u
r
e
4
)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
2
0
1
6
:
2
9
9
4
–
3
0
0
0
2998
Fig
u
r
e
2
.
A
d
d
in
g
C
a
n
d
id
ate
to
th
e
S
y
s
te
m
Fig
u
r
e
3
.
An
d
r
o
id
an
d
W
eb
B
ased
R
eg
i
s
tr
atio
n
Fig
u
r
e
4
.
Vo
tin
g
P
r
o
ce
s
s
Fig
u
r
e
5
s
h
o
w
s
d
i
f
f
er
en
t
A
n
d
r
o
id
in
ter
f
ac
e
f
o
r
th
e
v
o
ti
n
g
s
y
s
te
m
.
T
o
tal
n
u
m
b
er
o
f
v
o
te
a
ca
n
d
id
ate
o
b
tain
s
:
To
ta
l
_A
=A
[1]*
A
[2
]*
--------
--
*
A
[n
];
A
=De
c
r
yp
t
(
To
ta
l
_A
)
/
/
To
ta
l
n
umb
e
r
of
vot
e
s
o
b
ta
in
b
y
A
To
ta
l
_B
=B
[1]*
B
[2
]*
--------
--
*
B
[n
];
B
=De
c
r
yp
t
(
To
ta
l
_B
)
/
/
To
ta
l
n
umb
e
r
of
vot
e
s
o
b
ta
in
b
y
C
To
ta
l
_C
=C
[1]*
C
[2]
*
-
-
-
-
-
-
-
-
-
-
*
C
[n
];
C
=De
c
r
yp
t
(
To
ta
l
_C
)
/
/
To
ta
l
n
umb
e
r
of
vot
e
s
o
b
ta
in
b
y
C
T
he
ca
s
ted
v
o
tes
o
f
th
e
v
o
ter
s
w
h
ic
h
ar
e
s
av
ed
in
t
h
e
w
eb
s
er
v
er
d
atab
ase
/
clo
u
d
s
to
r
a
g
e
in
t
h
e
en
cr
y
p
ted
f
o
r
m
ar
e
m
u
ltip
lied
[
Ho
m
o
m
o
r
p
h
ic
ad
d
itio
n
p
r
o
p
e
r
t
y
]
an
d
th
e
d
ec
r
y
p
t
f
u
n
ctio
n
i
s
ap
p
lied
to
o
b
tain
th
e
f
in
al
r
es
u
lt
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
A
C
lo
u
d
B
a
s
ed
S
ec
u
r
e
V
o
tin
g
S
ystem
Usi
n
g
Ho
mo
mo
r
p
h
ic
E
n
cry
p
tio
n
fo
r
....
(
Ma
n
is
h
R
a
n
ja
n
)
2999
(
a)
C
an
d
id
ate
Ad
d
itio
n
(
b
)
Vo
ter
R
eg
is
tr
atio
n
(
c)
Vo
ter
L
o
g
in
I
n
ter
f
ac
e
(
d
)
Vo
tin
g
I
n
ter
f
ac
e
Fig
u
r
e
5.
T
h
e
A
n
d
r
o
id
I
n
ter
f
a
ce
s
f
o
r
Vo
tin
g
S
y
s
te
m
6.
CO
NCLU
SI
O
N
I
n
th
is
p
ap
er
w
e
p
r
o
p
o
s
ed
a
s
ec
u
r
e
v
o
tin
g
s
c
h
e
m
e
ap
p
lica
b
le
to
An
d
r
o
id
p
latf
o
r
m
u
s
i
n
g
P
aillier
's
A
l
g
o
r
ith
m
o
f
Ho
m
o
m
o
r
p
h
ic
C
r
y
p
to
s
y
s
te
m
.
W
e
d
is
c
u
s
s
t
h
e
m
o
d
el
w
it
h
t
h
e
p
r
o
s
p
ec
tiv
e
o
f
co
m
p
u
tatio
n
o
v
er
cip
h
er
tex
t
an
d
co
m
p
u
ti
n
g
t
h
e
v
o
tin
g
r
esu
lts
w
it
h
t
h
e
h
elp
o
f
th
eir
Ho
m
o
m
o
r
p
h
i
s
m
p
r
o
p
er
ties
.
I
t
is
o
b
s
er
v
ed
th
at
th
e
p
r
o
p
o
s
e
m
o
d
el
w
o
r
k
s
ef
f
icie
n
tl
y
i
n
a
w
eb
s
er
v
er
b
ased
m
o
d
el,
h
av
in
g
An
d
r
o
id
b
ased
in
ter
f
ac
e
f
o
r
ca
s
tin
g
v
o
te
s
an
d
a
clo
u
d
b
ased
w
eb
s
er
v
er
f
o
r
s
to
r
in
g
v
o
te
d
in
f
o
r
m
atio
n
in
e
n
cr
y
p
ted
f
o
r
m
.
T
h
e
s
aid
m
o
d
el
ca
n
b
e
e
x
te
n
d
ed
to
m
a
k
e
s
u
i
tab
le
f
o
r
v
ar
io
u
s
ap
p
licatio
n
s
lik
e
C
lo
u
d
C
o
m
p
u
tin
g
,
Un
tr
u
s
ted
w
eb
s
er
v
er
s
,
Secr
et
S
h
ar
i
n
g
s
ch
e
m
e
,
P
r
o
tectio
n
o
f
m
o
b
ile
a
g
en
ts
,
E
lectio
n
s
c
h
e
m
e
s
etc.
ACK
NO
WL
E
D
G
E
M
E
NT
S
T
h
is
r
esear
ch
w
as
s
u
p
p
o
r
ted
b
y
T
E
QI
P
I
I
,
NE
R
I
ST
.
W
e
t
h
an
k
o
u
r
co
lleag
u
e
s
f
r
o
m
d
ep
ar
t
m
en
t
o
f
C
SE,
NE
R
I
ST
w
h
o
p
r
o
v
id
ed
in
s
i
g
h
t
an
d
e
x
p
er
tis
e
t
h
at
g
r
ea
tl
y
as
s
is
ted
th
e
r
esear
ch
.
W
e
th
an
k
P
r
o
f
.
,
Md
.
,
An
w
ar
Hu
s
s
ai
n
o
f
E
C
E
Dep
ar
t
m
en
t,
NE
R
I
ST
f
o
r
h
is
g
u
i
d
an
ce
an
d
co
m
m
e
n
ts
t
h
at
g
r
ea
tl
y
i
m
p
r
o
v
ed
th
e
m
an
u
s
cr
ip
t.
RE
F
E
R
E
NC
E
S
[1
]
S
.
L
ian
,
“
M
u
lt
im
e
d
ia Co
n
ten
t
En
c
r
y
p
ti
o
n
:
T
e
c
h
n
i
q
u
e
s an
d
A
p
p
li
c
a
ti
o
n
,
”
CRC
Pre
ss
,
IS
BN
9
8
7
-
1
-
4
2
0
0
-
6
5
2
7
-
5
.
[2
]
J.
A
.
Bu
c
h
m
a
n
n
,
“
In
tro
d
u
c
ti
o
n
to
Cr
y
p
to
g
ra
p
h
y
(2
n
d
e
d
.
)
,”
S
p
ri
n
g
e
r
,
IS
BN 0
-
3
8
7
-
2
0
7
5
6
-
2
.
[3
]
D.
Ra
p
p
e
,
“
Ho
m
o
m
o
rp
h
ic
Cry
p
t
o
sy
st
e
m
s
a
n
d
th
e
ir
A
p
p
li
c
a
ti
o
n
s
,
”
Do
c
to
ra
l
Diss
e
rta
ti
o
n
,
Un
ive
rs
it
y
o
f
Do
rtmu
n
d
,
Do
rtmu
n
d
,
Ge
rm
a
n
y
.
[4
]
R.
L
.
Riv
e
st,
e
t
a
l.
,
“
O
n
d
a
ta
b
a
n
k
s an
d
p
riv
a
c
y
h
o
m
o
m
o
rp
h
ism
s
-
I
n
F
o
u
n
d
a
ti
o
n
s
o
f
S
e
c
u
re
Co
m
p
u
tatio
n
,
”
1
9
7
8
.
[5
]
S.
G
o
ld
w
a
ss
e
r,
e
t
a
l.
,
“
W
h
y
a
n
d
Ho
w
to
Es
tab
li
s
h
a
P
riv
a
te
Co
d
e
o
n
a
P
u
b
li
c
Ne
tw
o
rk
,”
Pro
c
e
e
d
i
n
g
s
o
f
t
h
e
2
3
r
d
An
n
u
a
l
S
y
mp
o
siu
m
o
n
Fo
u
n
d
a
ti
o
n
s o
f
C
o
mp
u
ter
S
c
ien
c
e
(
FOCS
'8
2
),
Ch
ica
g
o
,
Ill
i
n
o
is,
p
p
.
1
3
4
-
1
4
4
,
1
9
8
2
.
[6
]
M
.
T
e
b
a
a
,
et
a
l
.
,
“
Ho
m
o
m
o
rp
h
ic
En
c
ry
p
ti
o
n
A
p
p
li
e
d
t
o
th
e
Clo
u
d
Co
m
p
u
ti
n
g
S
e
c
u
rit
y
,
”
Pro
c
e
e
d
in
g
s
o
f
th
e
W
o
rl
d
Co
n
g
re
ss
o
n
E
n
g
i
n
e
e
rin
g
2
0
1
2
,
J
u
ly
4
-
6
,
L
o
n
d
o
n
,
U.K.
, v
ol
.
I
,
2
0
1
2
.
[7
]
D
.
Bo
n
e
h
,
e
t
a
l.
,
“
Ev
a
lu
a
ti
n
g
2
-
DN
F
f
o
r
m
u
las
o
n
c
ip
h
e
rtex
ts
,”
In
T
h
e
o
ry
o
f
Cry
p
to
g
ra
p
h
y
Co
n
fer
e
n
c
e
,
T
CC'2
0
0
5
,
L
e
c
tu
re
N
o
tes
i
n
C
o
mp
u
ter
S
c
ien
c
e
,
v
o
l
.
3
3
7
8
,
p
p.
3
2
5
-
3
4
1
,
2
0
0
5
.
[8
]
C
.
G
e
n
tr
y
,
“
A
F
u
ll
y
Ho
m
o
m
o
rp
h
i
c
En
c
ry
p
ti
o
n
S
c
h
e
m
e
,
”
2
0
0
9
.
[9
]
C.
A
.
M
e
lch
o
r,
e
t
a
l.
,
“
A
d
d
it
iv
e
ly
h
o
m
o
m
o
rp
h
ic
e
n
c
ry
p
ti
o
n
w
it
h
d
-
o
p
e
ra
n
d
m
u
lt
ip
li
c
a
ti
o
n
s
,
”
Cry
p
to
l
o
g
y
e
Prin
t
Arc
h
ive
,
Rep
o
rt
2
0
0
8
/3
7
8
,
h
tt
p
:/
/
e
p
rin
t.
iac
r.
o
rg
/
,
2
0
0
8
.
[1
0
]
P.
P
a
i
ll
ier,
“
P
u
b
li
c
-
k
e
y
c
r
y
p
to
s
y
ste
m
s
b
a
se
d
o
n
c
o
m
p
o
site d
e
g
re
e
re
sid
u
o
sity
c
l
a
ss
e
s
,”
In
Ad
v
a
n
c
e
s in
c
ry
p
to
lo
g
y
-
EUROCRY
PT
'
99
,
S
p
ri
n
g
e
r
Be
rli
n
He
id
e
lb
e
rg
,
p
p
.
2
2
3
-
2
3
8
,
1
9
9
9
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
6
,
No
.
6
,
Dec
em
b
er
2
0
1
6
:
2
9
9
4
–
3
0
0
0
3000
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
M
a
n
ish
Ra
n
j
a
n
is
a
stu
d
e
n
t
o
f
Ba
c
h
e
lo
r
o
f
T
e
c
h
n
o
lo
g
y
in
No
rt
h
Eas
tern
Re
g
io
n
a
l
In
sti
tu
te
o
f
S
c
ien
c
e
&
T
e
c
h
n
o
lo
g
y
De
e
m
e
d
Un
iv
e
rsity
,
A
ru
n
a
c
h
a
l
P
ra
d
e
s
h
,
In
d
ia.
He
h
a
s
v
e
r
y
g
o
o
d
k
n
o
w
led
g
e
in
th
e
f
ield
o
f
in
f
o
r
m
a
ti
o
n
se
c
u
rit
y
.
His
m
a
jo
r
a
re
a
s o
f
i
n
tere
sts a
re
Clo
u
d
c
o
m
p
u
ti
n
g
,
A
n
d
ro
id
d
e
v
e
lo
p
m
e
n
t
stu
d
i
o
,
Cry
p
to
g
ra
p
h
y
,
w
e
b
se
rv
ic
e
s etc
.
Ay
u
b
H
u
ss
a
i
n
M
o
n
d
a
l
is
a
st
u
d
e
n
t
o
f
Ba
c
h
e
lo
r
o
f
T
e
c
h
n
o
l
o
g
y
in
No
rth
Eas
tern
Re
g
io
n
a
l
In
stit
u
te
o
f
S
c
ien
c
e
&
T
e
c
h
n
o
lo
g
y
,
De
e
m
e
d
Un
iv
e
rsit
y
,
A
ru
n
a
c
h
a
l
P
ra
d
e
sh
,
In
d
ia.
He
h
a
s
v
e
ry
g
o
o
d
k
n
o
w
led
g
e
in
th
e
f
ield
o
f
in
f
o
rm
a
ti
o
n
se
c
u
rit
y
.
His
m
a
j
o
r
re
se
a
rc
h
a
re
a
s
a
re
Clo
u
d
c
o
m
p
u
ti
n
g
,
Cry
p
to
g
ra
p
h
y
,
w
e
b
se
rv
ice
s etc
.
M
o
n
ju
l
S
a
i
k
i
a
is
A
ss
istan
t
P
ro
f
e
ss
o
r
in
No
rth
Eas
tern
Re
g
io
n
a
l
In
stit
u
te
o
f
S
c
ien
c
e
a
n
d
T
e
c
h
n
o
lo
g
y
,
De
e
m
e
d
Un
iv
e
rsit
y
,
A
ru
n
a
c
h
a
l
P
ra
d
e
sh
,
I
n
d
ia.
He
is
a
m
e
m
b
e
r
o
f
v
a
rio
u
s
f
a
m
o
u
s
a
n
d
re
p
u
ted
T
e
c
h
n
ica
l
a
n
d
Re
se
a
rc
h
o
rg
a
n
iza
ti
o
n
s
su
c
h
a
s
Co
m
p
u
ter
S
o
c
iety
o
f
IEE
E,
In
d
ia
(In
d
ia),
IEI
(I
n
d
ia),
IS
T
E
I
n
d
ia
e
tc.
Cu
rre
n
tl
y
h
e
is
p
u
rs
u
in
g
h
is
P
h
.
D
.
i
n
d
e
p
a
rtm
e
n
t
o
f
ECE
,
N
ERIS
T
.
He
h
a
s
m
a
n
y
c
o
n
tri
b
u
ti
o
n
s
i
n
th
e
f
ield
o
f
In
f
o
r
m
a
ti
o
n
T
e
c
h
n
o
lo
g
y
a
n
d
th
e
a
re
a
s
o
f
in
f
o
rm
a
ti
o
n
se
c
u
rit
y
,
c
r
y
p
to
g
ra
p
h
y
,
V
L
S
I,
m
u
lt
im
e
d
ia sig
n
a
l
p
ro
c
e
ss
in
g
e
tc.
Evaluation Warning : The document was created with Spire.PDF for Python.