I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
2
0
2
5
,
p
p
.
1
6
6
1
~
1
672
I
SS
N:
2
5
0
2
-
4
7
5
2
,
DOI
: 1
0
.
1
1
5
9
1
/
ijeec
s
.
v
3
9
.i
3
.
pp
1
6
6
1
-
1
6
7
2
1661
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs.ia
esco
r
e.
co
m
Enha
ncing
priv
a
cy
in
do
cumen
t
-
o
ri
ented
da
taba
ses
u
sing
sea
rcha
ble encry
ption a
nd
fully ho
mo
mo
rphic encry
ption
Abdelil
a
h
B
elha
j
1
,
So
um
ia
Z
it
i
1
,
So
ua
d Na
j
o
ua
L
a
g
m
iri
2
,
K
a
rim
E
l Bo
uchti
3
1
I
n
t
e
l
l
i
g
e
n
t
P
r
o
c
e
ssi
n
g
S
y
st
e
ms a
n
d
S
e
c
u
r
i
t
y
(
I
P
P
S
)
Te
a
m
,
F
a
c
u
l
t
y
o
f
S
c
i
e
n
c
e
s,
M
o
h
a
mm
e
d
V
U
n
i
v
e
r
si
t
y
i
n
R
a
b
a
t
,
R
a
b
a
t
,
M
o
r
o
c
c
o
2
I
R
S
M
,
H
i
g
h
e
r
I
n
st
i
t
u
t
e
o
f
M
a
n
a
g
e
me
n
t
,
A
d
m
i
n
i
s
t
r
a
t
i
o
n
a
n
d
C
o
mp
u
t
e
r
E
n
g
i
n
e
e
r
i
n
g
i
n
R
a
b
a
t
,
R
a
b
a
t
,
M
o
r
o
c
c
o
3
La
b
o
r
a
t
o
r
y
o
f
C
o
m
p
u
t
e
r
S
y
s
t
e
m
s E
n
g
i
n
e
e
r
i
n
g
(
LI
S
I
)
,
F
a
c
u
l
t
y
o
f
S
c
i
e
n
c
e
S
e
ml
a
l
i
a
,
C
a
d
i
A
y
y
a
d
U
n
i
v
e
r
si
t
y
,
M
a
r
r
a
k
e
c
h
,
M
o
r
o
c
c
o
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Oct
2
,
2
0
2
4
R
ev
is
ed
Ap
r
2
0
,
2
0
2
5
Acc
ep
ted
J
u
l
2
,
2
0
2
5
In
c
lo
u
d
-
b
a
se
d
n
o
t
o
n
l
y
S
QL
(
N
o
S
QL
)
d
a
tab
a
se
s,
m
a
in
tain
in
g
d
a
ta
p
riv
a
c
y
a
n
d
t
h
e
in
te
g
rit
y
a
re
c
rit
ica
ll
y
c
h
a
ll
e
n
g
e
d
b
y
th
e
r
isk
s
o
f
u
n
a
u
th
o
rize
d
e
x
tern
a
l
a
c
c
e
ss
a
n
d
p
o
ten
t
ial
th
re
a
ts
fro
m
m
a
li
c
io
u
s
in
sid
e
rs.
T
h
is
p
a
p
e
r
p
re
se
n
ts
a
p
ro
x
y
-
b
a
se
d
so
lu
t
i
o
n
t
h
a
t
p
r
o
v
i
d
e
s
p
ri
v
a
c
y
-
p
re
s
e
rv
in
g
b
y
c
o
m
b
in
i
n
g
se
a
rc
h
a
b
le
e
n
c
ry
p
ti
o
n
a
n
d
b
ra
k
e
rsk
i
-
fa
n
-
v
e
rc
a
u
tere
n
(
BF
V)
fu
ll
y
h
o
m
o
m
o
r
p
h
ic
e
n
c
r
y
p
ti
o
n
(
F
HE
)
to
fa
c
il
it
a
te
se
c
u
re
se
a
rc
h
a
n
d
a
g
g
re
g
a
te
q
u
e
ry
e
x
e
c
u
ti
o
n
o
n
e
n
c
ry
p
ted
d
a
ta.
Th
r
o
u
g
h
e
x
ten
siv
e
p
e
rfo
rm
a
n
c
e
e
v
a
lu
a
ti
o
n
s
a
n
d
se
c
u
rit
y
a
n
a
ly
se
s,
we
sh
o
w
t
h
a
t
o
u
r
a
p
p
r
o
a
c
h
o
ffe
r
s
a
ro
b
u
st
so
lu
ti
o
n
fo
r
p
riv
a
c
y
-
p
re
se
rv
in
g
d
a
ta
o
p
e
ra
ti
o
n
s,
with
p
e
rf
o
rm
a
n
c
e
o
v
e
rh
e
a
d
in
tro
d
u
c
e
d
b
y
th
e
u
se
o
f
F
HE
.
Th
is
so
l
u
ti
o
n
g
iv
e
s
a
n
o
p
p
o
rt
u
n
it
y
f
o
r
a
ro
b
u
st
fra
m
e
wo
rk
fo
r
se
c
u
re
d
a
ta
m
a
n
a
g
e
m
e
n
t
a
n
d
q
u
e
ry
i
n
g
i
n
No
S
QL
d
a
tab
a
se
s,
with
p
r
o
m
isin
g
imp
li
c
a
ti
o
n
s
f
o
r
p
ra
c
ti
c
a
l
d
e
p
lo
y
m
e
n
t
a
n
d
f
u
tu
r
e
re
se
a
rc
h
.
Th
is
wo
rk
re
p
re
se
n
ts
a
sig
n
ifi
c
a
n
t
a
d
v
a
n
c
e
m
e
n
t
in
th
e
se
c
u
re
h
a
n
d
l
in
g
o
f
d
a
ta
i
n
N
o
S
QL
o
rien
t
e
d
d
a
tab
a
se
s,
s
u
p
p
ly
i
n
g
a
p
ra
c
ti
c
a
l
so
l
u
ti
o
n
fo
r
p
ri
v
a
c
y
-
c
o
n
sc
io
u
s
o
rg
a
n
iza
ti
o
n
s.
K
ey
w
o
r
d
s
:
E
n
cr
y
p
tio
n
Fu
lly
h
o
m
o
m
o
r
p
h
ic
No
SQL
d
atab
ase
Or
ien
ted
d
o
c
u
m
en
t
Sear
ch
ab
le
en
cr
y
p
tio
n
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ab
d
elilah
B
elh
aj
I
n
tellig
en
t Pr
o
ce
s
s
in
g
Sy
s
tem
s
an
d
Secu
r
ity
(
I
PP
S)
T
ea
m
,
Fa
cu
lty
o
f
Scien
ce
s
Mo
h
am
m
ed
V
U
n
iv
er
s
ity
in
R
ab
at
Mo
r
o
cc
o
E
m
ail:
ab
d
elilah
_
b
elh
aj@
u
m
5
.
ac
.
m
a
1.
I
NT
RO
D
UCT
I
O
N
Ou
ts
o
u
r
cin
g
th
e
s
to
r
ag
e
an
d
th
e
p
r
o
ce
s
s
in
g
o
f
p
r
iv
ate
d
at
a
to
th
ir
d
-
p
ar
ty
clo
u
d
s
er
v
ice
p
r
o
v
id
er
s
h
av
e
b
ec
o
m
e
a
co
m
m
o
n
d
ec
is
io
n
f
o
r
m
an
y
o
r
g
an
izatio
n
s
b
ec
au
s
e
o
f
its
co
s
t
-
ef
f
icien
cy
,
s
ca
lab
ilit
y
,
an
d
co
n
v
en
ie
n
ce
.
Ho
wev
e
r
,
th
is
p
r
ac
tice
m
ak
es
ap
p
licatio
n
s
v
u
l
n
er
ab
le
to
u
n
a
u
th
o
r
ized
ac
ce
s
s
b
y
an
e
x
ter
n
al
o
r
b
y
m
alicio
u
s
in
s
id
er
s
.
I
t
i
n
tr
o
d
u
ce
s
s
ig
n
if
ican
t
s
ec
u
r
ity
a
n
d
p
r
iv
ac
y
r
is
k
s
th
at
m
u
s
t
b
e
ca
r
ef
u
lly
co
n
s
id
er
ed
.
n
o
t
o
n
ly
SQL
(
No
SQL
)
d
atab
ases
[
1
]
,
wid
ely
u
s
ed
f
o
r
th
eir
f
lex
ib
ilit
y
in
m
an
ag
i
n
g
u
n
s
tr
u
ctu
r
ed
d
ata,
p
r
esen
t
s
p
ec
if
ic
ch
allen
g
es
in
m
ain
ta
in
in
g
p
r
i
v
ac
y
.
T
h
ese
d
atab
ases
ar
e
o
f
ten
u
s
ed
to
s
to
r
e
s
en
s
itiv
e
in
f
o
r
m
atio
n
,
s
u
ch
as
m
ed
ical
r
ec
o
r
d
s
,
f
in
an
cial
d
ata
,
u
s
er
au
t
h
en
ticatio
n
d
ata
,
an
d
c
o
n
f
id
e
n
tial
d
o
cu
m
en
ts
.
Ho
wev
e
r
,
en
s
u
r
in
g
d
ata
p
r
iv
ac
y
wh
ile
e
n
ab
lin
g
ef
f
icien
t
s
ea
r
ch
an
d
a
g
g
r
eg
ate
q
u
er
ies
p
r
esen
ts
a
s
ig
n
if
ican
t
ch
allen
g
e.
E
n
cr
y
p
tin
g
d
ata
b
e
f
o
r
e
s
en
d
i
n
g
it
to
t
h
e
clo
u
d
d
atab
ase
i
s
a
well
-
estab
lis
h
ed
s
tr
ateg
y
to
p
r
o
tect
p
r
iv
ac
y
.
Nev
er
th
eless
,
th
is
ap
p
r
o
ac
h
i
n
tr
o
d
u
ce
s
n
ew
ch
allen
g
es
s
u
c
h
as
p
er
f
o
r
m
in
g
s
ea
r
ch
q
u
e
r
ies
an
d
ag
g
r
eg
ate
q
u
er
ies
o
n
en
c
r
y
p
te
d
d
ata.
I
n
ad
d
itio
n
,
b
alan
cin
g
th
e
tr
ad
e
-
o
f
f
s
b
etwe
en
s
ec
u
r
ity
,
e
f
f
icien
c
y
,
an
d
p
er
f
o
r
m
an
ce
ar
e
r
em
ar
k
ed
to
b
e
co
m
p
le
x
in
o
r
d
e
r
to
p
r
o
v
id
e
a
p
r
ac
tica
l
s
o
lu
tio
n
f
o
r
s
ec
u
r
e
d
ata
m
a
n
ag
em
en
t
i
n
cl
o
u
d
en
v
ir
o
n
m
en
ts
.
Giv
en
th
at
en
c
r
y
p
ted
d
ata
ca
n
n
o
t
ea
s
ily
b
e
q
u
er
ied
,
s
ev
er
al
s
ch
em
es
h
av
e
b
ee
n
p
r
o
p
o
s
ed
to
ad
d
r
ess
s
u
ch
ch
allen
g
es.
T
h
e
r
esear
ch
er
s
[2
]
-
[
5
]
f
o
cu
s
o
n
t
h
e
s
ec
u
r
ity
is
s
u
es
an
d
ch
allen
g
es
ass
o
ciate
d
with
clo
u
d
s
to
r
ag
e,
p
ar
ticu
lar
ly
ad
d
r
ess
in
g
co
m
p
r
o
m
is
ed
ac
co
u
n
ts
,
in
s
id
er
th
r
ea
ts
,
an
d
lo
s
s
o
f
co
n
tr
o
l
o
v
e
r
d
ata.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
6
6
1
-
1
6
7
2
1662
I
n
r
elatio
n
al
d
atab
ases
,
v
a
r
io
u
s
m
o
d
els
h
av
e
b
ee
n
d
e
v
elo
p
e
d
to
ac
h
iev
e
tr
a
n
s
p
ar
en
t
d
ata
en
cr
y
p
tio
n
(
T
DE
)
.
T
h
ese
m
o
d
els
p
r
o
v
i
d
e
s
o
lu
tio
n
s
f
o
r
s
ec
u
r
in
g
d
ata
in
u
s
e
th
r
o
u
g
h
s
ec
u
r
e
q
u
er
y
p
r
o
ce
s
s
in
g
o
n
en
cr
y
p
ted
d
ata,
s
u
ch
as
s
ec
u
r
e
q
u
er
y
d
atab
ase
SDB
[
6
]
,
C
r
y
p
tDB
[
7
]
,
an
d
MO
NOM
I
[
8
]
.
I
t
is
d
en
o
ted
th
at
C
r
y
p
tDB
is
a
q
u
er
y
p
r
o
ce
s
s
in
g
s
y
s
tem
d
esig
n
ed
f
o
r
en
cr
y
p
ted
SQL
d
atab
ases
.
I
t
u
s
es
a
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
s
ch
em
e
th
at
allo
ws it to
co
m
p
u
te
th
e
s
u
m
o
f
p
lain
te
x
t v
alu
es b
y
p
er
f
o
r
m
in
g
m
u
ltip
licatio
n
o
n
ci
p
h
er
tex
ts
.
T
h
e
au
th
o
r
s
o
f
[
9
]
in
tr
o
d
u
ce
a
n
o
v
el
a
p
p
r
o
ac
h
to
s
af
eg
u
a
r
d
in
g
en
cr
y
p
tio
n
k
ey
s
with
in
a
DB
MS
b
y
u
ti
lizin
g
a
m
aster
k
ey
th
at
is
g
en
er
ated
th
r
o
u
g
h
en
c
r
y
p
tio
n
o
f
a
tab
le
o
r
co
lu
m
n
.
Xu
et
a
l.
[
1
0
]
p
r
o
p
o
s
e
cr
y
p
tMDB,
a
p
r
ac
tical
en
cr
y
p
ted
Mo
n
g
o
DB
b
ein
g
a
d
o
cu
m
en
t
-
o
r
ien
ted
d
atab
ase
wid
ely
u
s
ed
.
T
h
is
s
ch
em
e
u
tili
ze
s
an
ad
d
itiv
e
h
o
m
o
m
o
r
p
h
ic
asy
m
m
etr
ic
cr
y
p
to
s
y
s
tem
to
e
n
cr
y
p
t
u
s
er
d
at
a.
I
t
ca
n
n
o
t
s
u
p
p
o
r
t
co
m
p
le
x
ag
g
r
eg
ate
q
u
e
r
ies.
Mo
r
eo
v
er
,
th
e
a
u
th
o
r
s
o
f
[
1
1
]
p
r
o
p
o
s
e
a
s
ec
u
r
e
d
o
cu
m
en
t
d
atab
ase
(
SDDB
)
f
o
r
d
o
cu
m
e
n
t
-
o
r
ien
te
d
d
atab
ases
.
T
h
e
s
ch
em
e
is
in
s
p
ir
ed
b
y
PIRATT
E
[
1
2
]
a
n
d
C
r
y
p
tDB
co
n
ce
p
ts
.
T
o
ad
d
r
ess
th
ese
lim
itatio
n
s
,
th
e
p
r
esen
t
wo
r
k
p
r
o
p
o
s
es
a
m
o
d
el
en
s
u
r
in
g
p
r
iv
ac
y
p
r
ese
r
v
in
g
u
s
in
g
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
s
ch
em
e
to
en
ab
le
s
ec
u
r
e
s
ea
r
ch
a
n
d
th
e
B
r
ak
e
r
s
k
i/F
an
-
Ver
ca
u
ter
en
(
B
FV)
f
u
lly
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
(
F
HE
)
s
ch
em
e
[
1
3
]
-
[
1
8
]
t
o
ex
ec
u
te
ag
g
r
e
g
ate
q
u
er
ies
in
d
o
cu
m
en
t
-
o
r
ien
ted
d
atab
ases
.
Ou
r
co
n
tr
ib
u
tio
n
is
to
d
ev
elo
p
an
d
im
p
lem
en
t
a
s
er
v
er
p
r
o
x
y
d
esig
n
ed
t
o
en
s
u
r
e
p
r
iv
ac
y
-
p
r
eser
v
in
g
s
ea
r
ch
a
n
d
a
g
g
r
e
g
a
tio
n
in
d
o
cu
m
en
t
-
o
r
ien
ted
d
at
ab
ases
.
I
n
th
e
f
o
llo
win
g
s
ec
tio
n
s
,
we
will
ex
p
o
s
e
in
d
etail
th
e
ar
ch
itectu
r
e,
th
e
im
p
lem
en
tatio
n
o
f
th
e
s
y
s
te
m
.
T
h
en
,
we
d
is
cu
s
s
its
p
r
ac
tical
im
p
licatio
n
s
,
ch
allen
g
es
,
an
d
p
o
s
s
ib
le
d
ir
ec
t
io
n
f
o
r
f
u
tu
r
e
wo
r
k
.
2.
P
RO
P
O
SAL
M
O
D
E
L
2
.
1
.
Sy
s
t
e
m
a
rc
hite
ct
ure
A
s
ec
u
r
e
No
SQL
d
atab
ase
as
a
s
er
v
ice
(
DB
aa
S)
in
a
p
u
b
lic
clo
u
d
in
f
r
astru
ctu
r
e
i
n
v
o
lv
es
r
o
b
u
s
t
s
ec
u
r
ity
,
in
p
a
r
ticu
lar
,
wh
e
r
e
t
h
e
d
ata
o
w
n
er
ca
n
n
o
t
f
u
lly
tr
u
s
t
th
e
clo
u
d
s
e
r
v
ice
p
r
o
v
id
er
(
C
SP
)
.
I
t
is
n
ee
d
ed
to
en
s
u
r
e
b
o
th
th
e
co
n
f
id
en
tiality
an
d
in
te
g
r
ity
o
f
d
ata
in
a
No
SQL
DB
aa
S
with
in
a
p
u
b
lic
clo
u
d
in
f
r
astru
ctu
r
e.
W
e
p
r
o
p
o
s
e
a
s
ec
u
r
e
p
r
o
x
y
s
er
v
er
th
at
h
a
n
d
les
all
s
ec
u
r
ity
-
r
elate
d
task
s
a
n
d
th
e
clo
u
d
s
er
v
er
r
em
ain
s
u
n
a
f
f
ec
ted
.
W
e
u
s
e
a
s
ea
r
ch
ab
le
e
n
cr
y
p
tio
n
s
ch
em
e
th
at
allo
ws
u
s
er
s
to
s
ea
r
ch
o
v
er
e
n
cr
y
p
ted
d
ata
with
o
u
t
d
ec
r
y
p
tin
g
it.
W
e
ad
o
p
t
a
FHE
to
p
er
f
o
r
m
ag
g
r
eg
at
io
n
s
o
v
er
en
c
r
y
p
te
d
d
ata.
T
h
e
ar
ch
itectu
r
e
o
f
t
h
e
s
y
s
tem
is
illu
s
tr
ated
in
Fig
u
r
e
1
.
T
h
e
p
r
o
p
o
s
al
m
o
d
el
m
ai
n
ly
co
n
tain
s
th
r
ee
p
a
r
ts
:
clien
t,
p
r
o
x
y
s
er
v
er
an
d
s
er
v
er
p
r
o
v
id
e
r
(
SP
)
wh
e
r
e
t
h
e
clien
ts
ca
n
o
n
ly
in
ter
ac
t
with
No
SQL
d
atab
ase
v
ia
p
r
o
x
y
.
T
h
e
p
r
o
x
y
is
r
esp
o
n
s
ib
le
f
o
r
p
r
o
tectin
g
d
at
a
p
r
iv
ac
y
b
y
ap
p
l
y
in
g
th
e
c
r
y
p
to
g
r
ap
h
ic
m
o
d
u
les.
T
h
e
p
r
o
x
y
s
to
r
es
f
ield
k
ey
s
f
o
r
ea
c
h
s
en
s
itiv
e
f
ield
i
n
its
k
ey
s
to
r
e.
Firstl
y
,
d
ata
s
u
b
m
it
ted
b
y
u
s
er
s
will
b
e
e
n
cr
y
p
te
d
u
s
in
g
en
cr
y
p
tio
n
to
o
ls
an
d
th
en
s
av
ed
i
n
d
ata
b
a
s
e.
T
o
q
u
er
y
th
e
en
cr
y
p
ted
d
a
tab
ase
clien
t
s
en
d
s
a
r
eq
u
est
t
o
th
e
p
r
o
x
y
s
er
v
er
.
T
h
e
p
r
o
x
y
r
ewr
ites
th
e
q
u
er
y
t
h
at
in
v
o
l
v
es
s
en
s
itiv
e
f
ield
s
an
d
s
u
b
m
its
th
e
r
ewr
itten
q
u
er
y
to
th
e
SP
.
Fin
ally
,
th
e
p
r
o
x
y
d
ec
r
y
p
ts
th
e
e
n
cr
y
p
ted
r
esu
lts
an
d
s
en
d
th
e
p
lain
te
x
t r
esu
lt to
clien
t.
Fig
u
r
e
1
.
Sy
s
tem
a
r
c
h
itectu
r
e
W
e
d
is
tin
g
u
is
h
two
ty
p
es
o
f
s
en
s
itiv
e
f
ield
s
s
ea
r
ch
f
ield
s
an
d
ag
g
r
eg
atio
n
f
ield
s
.
Sear
c
h
f
ield
s
ar
e
d
ata
f
ield
s
th
at
we
n
ee
d
to
q
u
er
y
o
r
s
ea
r
ch
ag
ain
s
t
d
en
o
te
d
b
y
s
ea
r
ch
f
ield
.
H
o
wev
er
,
a
g
g
r
eg
atio
n
f
ield
s
r
ef
e
r
to
th
e
d
ata
f
ield
s
o
n
wh
ic
h
a
g
g
r
eg
atio
n
o
p
er
atio
n
s
ar
e
p
er
f
o
r
m
ed
in
clu
d
in
g
m
u
ltip
licati
o
n
,
a
d
d
ictio
n
,
s
u
m
s
,
av
er
ag
es,
co
u
n
ts
d
en
o
ted
b
y
Ag
g
_
f
ield
s
.
Ou
r
ap
p
r
o
ac
h
in
v
o
lv
es
g
en
er
atin
g
an
d
m
an
a
g
in
g
s
ep
ar
ate
k
ey
s
f
o
r
ea
ch
s
en
s
itiv
e
f
ield
in
a
co
llectio
n
,
s
o
th
at
ea
ch
s
en
s
itiv
e
d
ata
is
en
cr
y
p
ted
an
d
d
ec
r
y
p
te
d
with
its
o
wn
k
ey
.
Data
ca
n
b
e
class
if
ied
b
ased
o
n
its
s
en
s
itiv
ity
d
eg
r
ee
wh
ic
h
r
ef
er
s
t
o
h
o
w
cr
itical
an
d
c
o
n
f
id
en
tial
th
e
d
ata
ar
e.
Dep
en
d
in
g
o
n
th
e
s
en
s
iti
v
ity
o
f
th
e
f
ield
,
d
if
f
er
e
n
t
s
ec
u
r
ity
m
ea
s
u
r
es
a
n
d
en
cr
y
p
tio
n
tech
n
i
q
u
es
ca
n
b
e
u
s
ed
in
clu
d
in
g
k
ey
s
ize.
Pro
x
y
s
er
v
er
s
to
r
es a
ll d
ata
en
cr
y
p
ti
o
n
in
cr
y
p
to
_
v
au
lt su
ch
th
at:
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
E
n
h
a
n
ci
n
g
p
r
iva
cy
i
n
d
o
c
u
me
n
t
-
o
r
ien
ted
d
a
ta
b
a
s
es u
s
in
g
s
e
a
r
ch
a
b
le
en
cryp
tio
n
…
(
A
b
d
el
ila
h
B
elh
a
j
)
1663
C
r
y
p
to
_
v
au
lt {
‘
C
o
llectio
n
_
i
’
:
{
‘
s
en
s
itiv
eField
1
":
{
‘
k
ey
Field
’
:
‘
k
e
y
1
’
‘
class
’
:
‘
co
n
f
id
e
n
tial
‘
}
‘
s
en
s
itiv
eField
2
":
{
‘
k
ey
Field
’
:
‘
k
e
y
2
’
‘
class
e
’
:
‘
s
ec
r
et
’
}
‘
s
en
s
itiv
eField
3
":
{
‘
Scem
e:
‘
Fu
lly
Ho
m
o
m
o
r
p
h
ic
E
n
c
r
y
p
tio
n
’
‘
class
e
’
:
‘
ag
g
r
e
g
ate
f
ield
‘
}
…………
…….
‘
s
en
s
itiv
eField
_
n
":
{
‘
k
ey
Field
’
:
‘
k
e
y
_
n
’
‘
class
’
: h
ig
h
ly
c
o
n
f
i
d
en
tial
’
}
Sen
s
itiv
e_
ag
g
_
Field
s
:
‘
FHE
f
u
lly
h
o
m
o
m
o
r
p
h
ic
en
c
r
y
p
tio
n
B
FV sch
em
e
’
}
2
.
2
.
P
r
o
po
s
a
l a
lg
o
ri
t
hm
s
2
.
2
.
1
.
Sea
rc
ha
ble
encr
y
ptio
n schem
e
us
ed
f
o
r
s
ens
it
i
v
e
s
e
a
rc
ha
ble f
ield
Ad
v
an
ce
d
e
n
cr
y
p
tio
n
s
tan
d
ar
d
(
AE
S)
is
a
h
ig
h
ly
tr
u
s
ted
e
n
cr
y
p
tio
n
alg
o
r
ith
m
th
at
en
s
u
r
es
s
ec
u
r
e
d
ata
tr
an
s
m
is
s
io
n
an
d
s
to
r
a
g
e.
T
wo
m
eth
o
d
s
ar
e
s
u
g
g
ested
f
o
r
im
p
lem
en
tin
g
s
ea
r
ch
a
b
le
en
cr
y
p
tio
n
f
o
r
s
en
s
itiv
e
s
er
ac
h
_
f
ield
s
in
clu
d
in
g
r
an
d
o
m
en
cr
y
p
tio
n
a
n
d
d
e
ter
m
in
is
tic
en
cr
y
p
tio
n
.
W
e
u
s
e
AE
S
en
cr
y
p
tio
n
s
ch
em
e
wh
ich
ca
n
b
e
co
n
f
ig
u
r
ed
to
b
e
eith
er
d
eter
m
in
is
tic
o
r
r
an
d
o
m
,
d
ep
e
n
d
in
g
o
n
th
e
m
o
d
e
an
d
th
e
u
s
e
o
f
in
itializatio
n
v
ec
to
r
s
I
Vs
[
1
9
]
-
[
2
1
]
.
W
e
p
r
o
v
i
d
e
a
d
etailed
ex
p
lan
atio
n
o
f
th
e
m
eth
o
d
s
f
o
r
u
tili
zin
g
b
o
th
ty
p
es
o
f
AE
S e
n
cr
y
p
tio
n
.
a)
Ra
nd
o
m
ized
encr
y
ptio
n
T
h
is
m
o
d
el
o
f
en
cr
y
p
tio
n
en
s
u
r
es
th
at
th
e
s
am
e
p
lain
tex
t
will
n
o
t
p
r
o
d
u
ce
th
e
s
am
e
cip
h
e
r
tex
t
ev
e
n
th
o
u
g
h
en
c
r
y
p
te
d
with
th
e
s
am
e
k
ey
.
I
t
en
cr
y
p
ts
ea
c
h
p
l
ain
tex
t
u
s
in
g
r
an
d
o
m
in
itializatio
n
v
ec
to
r
s
I
Vs.
Ho
wev
er
,
th
e
u
s
e
o
f
a
r
an
d
o
m
in
itializatio
n
v
ec
to
r
m
ak
es
s
ea
r
ch
in
g
en
cr
y
p
ted
f
ield
d
if
f
icu
lt.
I
n
th
is
way
,
we
n
ee
d
to
r
ely
o
n
ap
p
r
o
ac
h
es
th
at
en
ab
le
u
s
s
ea
r
ch
in
g
o
n
en
c
r
y
p
ted
d
ata
wh
ile
m
ain
tain
in
g
its
co
n
f
id
en
tiality
s
u
ch
as
B
lin
d
I
n
d
e
x
in
g
.
B
lin
d
in
d
ex
is
u
s
ed
to
s
to
r
es
th
e
h
ash
v
alu
e
co
r
r
esp
o
n
d
in
g
t
o
p
lain
tex
ts
b
y
u
s
in
g
HM
AC
al
g
o
r
ith
m
[
2
2
]
-
[
2
4
]
.
Alter
n
ativ
e
ly
,
we
ca
n
u
s
e
o
th
er
cr
y
p
to
g
r
a
p
h
ic
alg
o
r
ith
m
s
f
o
r
g
en
er
atin
g
a
b
lin
d
in
d
ex
s
u
ch
as
SHA3
-
5
1
2
o
r
k
e
y
d
er
i
v
atio
n
f
u
n
ctio
n
(
KDF)
lik
e
A
r
g
o
n
2
o
r
PB
KDF.
B
esid
es
th
at,
th
e
r
e
ar
e
ce
r
tain
tech
n
iq
u
es
in
clu
d
in
g
o
r
d
e
r
-
p
r
eser
v
in
g
e
n
cr
y
p
tio
n
(
OPE)
.
Ho
wev
er
,
th
e
later
in
tr
o
d
u
ce
s
s
o
m
e
ch
allen
g
es
an
d
co
n
s
id
er
atio
n
s
ass
o
ciate
d
with
its
ap
p
licatio
n
f
o
r
tex
tu
a
l
d
ata.
Fu
r
th
er
m
o
r
e,
it
is
cr
u
cial
t
o
s
to
r
e
th
e
r
an
d
o
m
in
itializatio
n
v
ec
to
r
s
I
V
alo
n
g
s
id
e
th
e
cip
h
er
tex
t
in
t
h
e
d
o
c
u
m
en
t
in
t
h
e
co
llectio
n
s
o
t
h
at
it
ca
n
b
e
u
s
ed
f
o
r
d
ec
r
y
p
tio
n
.
Giv
en
a
d
o
c
u
m
en
t
wh
ich
co
n
tain
t
wo
s
en
s
itiv
e
f
ield
s
s
en
s
itiv
eField
1
et
s
en
s
itiv
eFi
eld
2
.
W
e
wo
u
ld
lik
e
to
in
s
e
r
t
th
e
d
o
cu
m
en
t
in
th
e
co
lle
ctio
n
o
f
d
o
cu
m
en
t
-
o
r
ien
ted
No
SQL
as f
o
llo
w:
d
o
cu
m
e
n
t =
{
‘
s
en
s
itiv
eField
1
’
:
‘
s
ec
r
etVa
lu
e1
’
,
‘
‘
s
en
s
itiv
eField
2
’
:
‘
s
ec
r
etv
alu
e2
’
,
‘
……
Oth
er
_
f
iel
d
s
:
’
d
ata
’
}
DB
.
m
y
C
o
llectio
n
.
in
s
er
t_
o
n
e
(
d
o
cu
m
e
n
t)
At
f
ir
s
t,
p
r
o
x
y
s
er
v
er
in
ter
ce
p
ts
an
d
p
ar
s
es
th
e
in
co
m
in
g
clien
t
r
eq
u
ests
.
I
t
id
en
tifie
s
s
en
s
i
tiv
e
f
ield
s
an
d
d
eter
m
in
es
th
e
k
ey
u
s
ed
t
o
en
cr
y
p
t
ea
ch
s
en
s
itiv
e
f
ield
f
r
o
m
C
r
y
p
to
_
Vau
lt
m
en
tio
n
ed
ab
o
v
e.
I
t
en
cr
y
p
ts
th
e
p
lain
tex
t
u
s
in
g
AE
S
s
ch
e
m
e
with
r
an
d
o
m
in
itializatio
n
v
ec
to
r
I
V
an
d
ad
d
s
th
e
v
ec
t
o
r
I
V
in
th
e
d
o
c
u
m
en
t.
At
th
e
tim
e
o
f
in
s
er
tio
n
o
f
d
o
cu
m
en
t,
p
r
o
x
y
s
er
v
er
ca
lc
u
lates
h
ash
v
alu
e
co
r
r
esp
o
n
d
in
g
o
f
th
e
p
lai
n
tex
t
an
d
s
to
r
e
th
e
h
ash
v
alu
e
alo
n
g
with
th
e
cip
h
er
tex
t in
o
r
d
e
r
to
o
p
t
im
ize
s
ea
r
ch
p
er
f
o
r
m
a
n
ce
.
B
elo
w
is
Alg
o
r
ith
m
1
,
wh
ich
o
u
tlin
es
th
e
s
tep
s
f
o
r
in
s
er
tin
g
a
d
o
cu
m
en
t
co
n
tain
i
n
g
s
ea
r
ch
ab
le
s
en
s
itiv
e
f
ield
s
u
s
in
g
r
an
d
o
m
ized
en
cr
y
p
tio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
6
6
1
-
1
6
7
2
1664
Alg
o
r
ith
m
1
.
I
n
s
er
tio
n
o
f
th
e
d
o
cu
m
en
t c
o
n
tain
in
g
s
ea
r
ch
ab
l
e
s
en
s
itiv
e
f
ield
s
u
s
in
g
r
an
d
o
m
ized
en
cr
y
p
tio
n
Input
: document, sensitiveFields [ ]
for
each
field
in
document
do
:
if
field
in
sensitiveFields
do
:
Let key = crypto_vault [myCollection][field]
Generate random vector iv=random()
cipherText = Encrypt (document[field],algorithms.AES(key), modes.CBC(iv))
document[field]=cipherText
document[field_iv] = iv
create the blind index
hash
=
HMAC(document[field],bli
nd_key)
document[field_blind_index
’
] = hash
DB. myCollection .insert_one(document)
e
n
d
.
T
h
e
s
er
v
er
p
r
o
x
y
en
c
r
y
p
ts
ea
ch
s
en
s
itiv
e
f
ield
an
d
s
to
r
es
its
I
V
an
d
th
e
b
lin
d
in
d
e
x
in
s
ep
ar
ate
f
ield
s
.
B
lin
d
in
d
ex
h
elp
s
th
e
p
r
o
x
y
to
f
in
d
th
e
d
o
cu
m
e
n
t,
wh
ile
th
e
v
ec
to
r
I
V
is
n
ee
d
ed
to
d
ec
r
y
p
t
th
e
cip
h
er
tex
t
o
n
ce
a
s
en
s
itiv
e
f
ield
is
f
o
u
n
d
.
H
o
wev
er
,
th
is
m
eth
o
d
h
as
a
s
o
lu
tio
n
f
o
r
s
e
ar
ch
ab
le
en
cr
y
p
tio
n
.
Ho
wev
er
,
th
e
ex
tr
a
d
ata
is
a
d
d
ed
an
d
s
to
r
ed
alo
n
g
s
id
e
with
ea
ch
s
en
s
itiv
e
f
i
eld
,
wh
ic
h
co
m
p
r
o
m
is
es
th
e
s
to
r
ag
e
an
d
t
h
e
p
er
f
o
r
m
a
n
ce
.
b)
Det
er
m
ini
s
t
ic
encr
y
ptio
n
A
d
eter
m
in
is
tic
en
cr
y
p
tio
n
s
ch
em
e
is
a
cr
y
p
to
s
y
s
tem
th
at
c
o
n
s
is
ten
tly
g
en
er
ates
th
e
s
am
e
cip
h
er
tex
t
f
o
r
a
g
iv
en
p
lain
tex
t
an
d
k
e
y
.
T
h
is
p
r
o
p
e
r
ty
m
a
k
es
it
u
s
ef
u
l
f
o
r
p
r
ac
tical
ap
p
licatio
n
s
,
p
ar
ticu
lar
ly
in
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
an
d
en
s
u
r
in
g
d
ata
in
teg
r
ity
.
I
t
allo
ws
f
o
r
ef
f
icien
t
s
ea
r
ch
in
g
an
d
in
d
ex
in
g
o
f
en
c
r
y
p
ted
d
ata.
I
t
en
ab
les
d
atab
ases
to
p
er
f
o
r
m
e
q
u
ality
ch
ec
k
s
an
d
jo
in
s
d
ir
ec
tly
o
n
en
c
r
y
p
ted
d
ata.
Fu
r
th
er
m
o
r
e
,
o
n
ly
th
e
en
cr
y
p
tio
n
k
ey
n
e
ed
s
to
b
e
m
an
ag
e
d
,
a
v
o
id
in
g
th
e
n
e
ed
to
h
a
n
d
le
o
r
s
to
r
e
in
itiali
za
tio
n
v
ec
to
r
s
I
Vs.
Nev
er
th
eless
,
it
is
h
ig
h
ly
v
u
ln
er
ab
le
f
r
o
m
a
d
ata
p
r
o
tecti
o
n
p
e
r
s
p
ec
tiv
e.
I
t
p
o
s
es
s
ev
er
al
s
ec
u
r
ity
r
is
k
s
,
p
ar
ticu
lar
ly
in
te
r
m
s
o
f
p
atter
n
ex
p
o
s
u
r
e.
T
o
o
v
er
co
m
e
th
is
p
r
o
b
lem
,
w
e
u
s
e
a
f
ield
en
cr
y
p
tio
n
k
e
y
in
a
d
cu
m
en
t
d
en
o
ted
b
y
FDK
wh
ich
will
b
e
ex
p
lo
ited
to
en
c
r
y
p
t
an
d
d
ec
r
y
p
t
th
e
s
en
s
itiv
e
f
ield
in
e
ac
h
d
o
cu
m
en
t.
Alg
o
r
ith
m
2
s
h
o
ws
h
o
w
to
in
s
er
t
d
o
cu
m
e
n
t
u
s
in
g
d
eter
m
in
is
tic
alg
o
r
ith
m
b
ased
o
n
f
ield
d
o
cu
m
e
n
t
en
cr
y
p
tio
n
.
FDK
ca
n
b
e
g
en
er
ate
d
f
r
o
m
co
m
b
in
in
g
th
e
f
ield
en
c
r
y
p
ti
o
n
k
ey
s
to
r
ed
in
c
r
y
p
to
_
v
au
lt
with
a
d
o
cu
m
en
t
’
s
u
n
iq
u
e
id
en
tifie
r
o
f
th
e
d
o
cu
m
e
n
t m
an
u
ally
g
en
er
ated
.
T
h
is
co
u
ld
b
e
d
o
n
e
ac
co
r
d
in
g
to
th
e
f
o
llo
win
g
r
elatio
n
s
h
ip
:
=
ℎ
(
⊕
_
_
)
T
h
e
f
o
llo
win
g
is
Alg
o
r
ith
m
2
,
wh
ich
o
u
tlin
es
th
e
s
tep
s
f
o
r
in
s
er
tin
g
a
d
o
cu
m
e
n
t
co
n
tain
in
g
s
ea
r
ch
ab
le
s
en
s
itiv
e
f
ield
s
u
s
in
g
d
eter
m
in
is
tic
en
cr
y
p
tio
n
with
a
f
iel
d
en
cr
y
p
tio
n
k
ey
in
ea
ch
d
c
u
m
en
t
FDK
.
Alg
o
r
ith
m
2
.
I
n
s
er
tio
n
o
f
th
e
d
o
cu
m
en
t c
o
n
tain
in
g
s
ea
r
ch
ab
l
e
s
en
s
itiv
e
f
ield
s
u
s
in
g
d
e
t
e
rm
in
ist
ic
e
ncryp
t
io
n
:
Input
: document, sensitiveFields [ ]
Generate _id document
for
each
field
in
document do:
if
field
in
sensitiveFields
do
:
Let key = crypto_vault [myCollection][field]
Combine the key and the document _id to derive FDK
FDK=hash (key_field
⊕
_id)
cipherText
=
Encry
pt
(
do
cu
me
nt
[f
ie
ld
],
al
go
ri
th
ms
.A
ES
(F
DK
),
deterministic_mode)
document[field]=cipherText
creates the blind index
hash
=
HMAC (document[field], blind_key)
document[field_blind_index
’
] =
hash
DB. myCollection. insert_one(document)
end
.
2
.
2
.
2
.
F
ull
y
ho
m
o
m
o
rphic e
ncry
ptio
n
Ag
g
r
eg
atio
n
o
f
s
en
s
itiv
e
f
ield
s
in
en
cr
y
p
ted
f
o
r
m
in
v
o
lv
es
p
er
f
o
r
m
in
g
o
p
er
atio
n
s
s
u
ch
as
s
u
m
m
atio
n
,
av
e
r
ag
in
g
,
o
r
o
th
er
s
tatis
tical
co
m
p
u
tatio
n
s
.
FHE
allo
ws
m
ath
em
atica
l
o
p
er
atio
n
s
to
b
e
p
er
f
o
r
m
ed
o
n
e
n
cr
y
p
ted
d
ata
with
o
u
t
th
e
r
eq
u
ir
em
en
t
f
o
r
d
ec
r
y
p
tio
n
.
T
h
is
tr
ait
m
ak
es
it
u
s
ef
u
l
f
o
r
d
ata
s
ec
u
r
ity
an
d
co
n
f
id
en
tiality
,
p
ar
ticu
lar
ly
in
clo
u
d
co
m
p
u
tin
g
.
I
n
th
is
wo
r
k
,
we
ad
o
p
t
a
b
r
ak
er
s
k
i
-
f
a
n
-
v
er
ca
u
ter
en
(
B
FV)
[
2
5
]
,
[
2
6
]
s
ch
em
e
wh
ich
h
as
s
ev
er
al
ad
v
an
tag
es
in
clu
d
in
g
its
s
im
p
licity
an
d
its
co
m
p
atib
ilit
y
.
I
t is
d
esig
n
e
d
b
ased
o
n
th
e
r
in
g
-
lear
n
in
g
with
er
r
o
r
s
(
R
L
W
E
)
p
r
o
b
lem
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
E
n
h
a
n
ci
n
g
p
r
iva
cy
i
n
d
o
c
u
me
n
t
-
o
r
ien
ted
d
a
ta
b
a
s
es u
s
in
g
s
e
a
r
ch
a
b
le
en
cryp
tio
n
…
(
A
b
d
el
ila
h
B
elh
a
j
)
1665
I
n
B
FV,
T
h
e
p
lain
te
x
t
an
d
t
h
e
cip
h
er
te
x
t
s
p
ac
es
ar
e
d
ef
i
n
ed
o
v
er
two
d
is
tin
ct
p
o
ly
n
o
m
ial
r
in
g
s
d
en
o
ted
b
y
=
=
[
]
/
(
+
1
)
an
d
=
×
,
wh
er
e
=
[
]
/
(
+
1
)
,
∈
is
th
e
r
in
g
d
im
en
s
io
n
an
d
∈
an
d
)
,
∈
ar
e
th
e
p
lain
tex
t
an
d
cip
h
er
tex
t
co
e
f
f
i
cien
ts
,
r
esp
ec
tiv
ely
.
T
h
e
in
s
e
r
tio
n
o
f
d
o
cu
m
e
n
ts
co
n
tain
in
g
ag
g
r
eg
ate
f
ield
s
f
o
llo
ws
a
s
tr
u
ctu
r
e
d
p
r
o
ce
s
s
.
Fo
r
m
ally
,
an
FHE
h
as
f
o
u
r
c
o
m
p
o
n
en
ts
wh
ich
ar
e
k
ey
g
en
er
atio
n
d
en
o
te
d
b
y
g
e
n
er
ate_
k
ey
s
,
en
cr
y
p
tio
n
,
d
ec
r
y
p
tio
n
an
d
ev
alu
atio
n
.
T
h
e
co
m
p
u
tatio
n
al
co
m
p
lex
ity
o
f
all
o
p
er
atio
n
s
o
f
th
e
en
cr
y
p
ti
o
n
s
ch
em
e
m
u
s
t
b
e
p
o
ly
n
o
m
i
al
in
o
r
d
er
to
m
ak
e
th
e
s
ch
em
e
ef
f
icien
tly
im
p
le
m
en
tab
le
f
o
r
p
r
ac
tical
u
s
e.
Her
e,
we
p
r
o
v
id
e
a
c
o
n
cise
d
escr
ip
tio
n
o
f
ea
ch
o
p
er
atio
n
o
f
th
e
s
ch
em
e:
−
g
en
er
ate_
k
e
y
s
: g
en
er
ates p
u
b
l
ic
k
ey
p
k
,
s
ec
r
et
k
ey
s
k
an
d
e
v
alu
at
e_
k
ey
d
er
iv
ed
f
r
o
m
s
k
.
−
E
n
cr
y
p
tio
n
(
m
ess
ag
e
m
\
in
P)
:
th
is
o
p
er
atio
n
p
r
o
d
u
ce
s
a
ci
p
h
er
s
u
ch
th
at
c
=
E
n
cr
y
p
t(
m
,
p
k
)
an
d
ad
d
s
s
o
m
e
n
o
is
e
to
en
s
u
r
e
s
ec
u
r
ity
.
−
Dec
r
y
p
tio
n
(
cip
h
er
te
x
t
∈
)
:
d
ef
i
n
es
th
e
o
p
p
o
s
ite
p
r
o
ce
s
s
o
f
E
n
cr
y
p
t,
r
em
o
v
es
th
e
n
o
is
e
to
r
ec
o
v
er
th
e
o
r
ig
in
al
p
lain
tex
t
d
en
o
ted
b
y
=
d
ec
r
y
p
t
(
m
,
s
k
)
−
E
v
alu
atio
n
: th
is
p
r
o
ce
s
s
en
ab
les ef
f
icien
t a
n
d
s
ec
u
r
e
h
o
m
o
m
o
r
p
h
ic
c
o
m
p
u
tatio
n
,
p
a
r
ticu
lar
ly
m
u
ltip
licatio
n
.
I
t is cr
u
cial
to
r
ed
u
ce
th
e
n
o
is
e
an
d
th
e
s
ize
o
f
th
e
cip
h
er
tex
t.
Pre
s
en
ted
is
Alg
o
r
ith
m
3
,
wh
i
ch
d
escr
ib
es
th
e
s
tep
s
f
o
r
en
c
r
y
p
tio
n
u
s
in
g
B
FV
Fu
lly
Ho
m
o
m
o
r
p
h
ic
E
n
cr
y
p
tio
n
:
Alg
o
r
ith
m
3
.
B
FV e
n
cr
y
p
tio
n
Input
, pk(a,b) where a, b are polynomials in appropriate ring
Output
=
(
1
,
2
)
where
1
,
2
are two encrypted polynomials
Create a polynomial in polynomial ring from message (m)
Generate a random polynomial
in the ring of polynomials.
Calculate
1
:
1
=
(
.
)
Calculate c2:
2
=
(
.
+
)
Return
=
(
1
,
2
)
B
elo
w
is
Alg
o
r
ith
m
4
,
wh
ich
d
escr
ib
es th
e
p
r
o
ce
s
s
o
f
B
FV d
ec
r
y
p
tio
n
:
Alg
o
r
ith
m
4
.
B
FV d
ec
r
y
p
tio
n
Input
=
(
1
,
2
)
, secret key sk
Output
the plaintext message
Calculate
:
=
(
2
−
1
.
)
Convert the polynomial m into original message
Return
m
3.
M
E
T
H
O
D
3
.
1
.
I
m
ple
m
ent
a
t
io
n
I
n
th
is
s
ec
tio
n
,
we
d
escr
ib
e
in
d
etail
th
e
ar
ch
itectu
r
e
o
f
th
e
p
r
o
p
o
s
ed
m
o
d
el
wh
ich
en
s
u
r
e
s
p
r
iv
ac
y
-
p
r
eser
v
in
g
b
y
u
s
in
g
s
ea
r
ch
ab
l
e
en
cr
y
p
tio
n
s
ch
em
e
an
d
B
FV h
o
m
o
m
o
r
p
h
is
m
en
cr
y
p
tio
n
o
n
No
SQL
d
o
cu
m
e
n
t
d
atab
ases
.
T
h
e
ar
ch
itectu
r
e
o
f
s
ec
u
r
e
m
o
d
el
co
m
p
r
is
es
th
r
ee
m
ain
c
o
m
p
o
n
en
ts
in
clu
d
i
n
g
clien
t
r
e
q
u
ests
,
p
r
o
x
y
an
d
clo
u
d
s
er
v
er
p
r
o
v
id
er
C
SP
wh
ich
p
r
o
v
id
e
No
SQ
L
d
o
cu
m
en
t
-
b
ased
d
atab
ases
.
T
h
e
m
ain
l
o
g
ic
lies
in
th
e
p
r
o
x
y
s
er
v
er
wh
ich
m
a
n
ag
es
an
d
s
to
r
es
all
f
ield
k
ey
s
an
d
b
lin
d
k
ey
s
u
s
ed
f
o
r
cr
ea
ti
n
g
b
lin
d
in
d
e
x
es.
I
n
ad
d
itio
n
,
it
r
ewr
ites
an
d
tr
an
s
f
o
r
m
s
th
e
q
u
er
y
to
m
atch
t
h
e
en
cr
y
p
te
d
in
d
ex
es
s
to
r
ed
alo
n
g
s
id
e
with
th
e
s
en
s
itiv
e
f
ield
.
I
t
co
n
f
ig
u
r
e
s
all
p
ar
am
eter
s
o
f
a
FHE
B
FV
s
ch
em
e.
W
e
ad
o
p
t
d
eter
m
in
is
tic
en
cr
y
p
tio
n
ac
co
r
d
in
g
to
th
e
al
g
o
r
ith
m
m
e
n
tio
n
ed
ab
o
v
e
wh
ich
r
elies
o
n
FDK
f
ield
d
o
cu
m
e
n
t
Key
f
o
r
ea
ch
s
en
s
itiv
e
f
ield
wh
ich
is
d
er
iv
ed
f
r
o
m
th
e
k
e
y
f
ield
an
d
_
I
d
d
o
cu
m
en
t.
T
o
im
p
lem
en
t
FHE
with
th
e
B
FV
s
ch
em
e
in
Py
th
o
n
,
lib
r
ar
ies
s
u
ch
as
T
en
SEAL
an
d
Py
SEAL
ca
n
b
e
u
tili
ze
d
.
T
h
ey
o
f
f
er
Py
th
o
n
b
in
d
in
g
s
f
o
r
wo
r
k
in
g
with
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
.
I
n
th
i
s
wo
r
k
,
we
ch
o
o
s
e
th
e
T
en
SEAL
lib
r
ar
y
[
2
7
]
to
ac
h
iev
e
p
r
ac
tical
im
p
lem
e
n
tatio
n
o
f
th
e
B
FV
s
ch
em
e.
T
en
SEAL
is
d
esig
n
ed
to
b
e
u
s
er
-
f
r
ien
d
l
y
,
a
n
d
s
im
p
lifie
s
m
an
y
co
m
p
lex
asp
ec
ts
o
f
FHE.
I
t
is
an
o
p
e
n
-
s
o
u
r
ce
Py
th
o
n
lib
r
ar
y
allo
win
g
f
o
r
ea
s
y
an
d
e
f
f
icien
t
c
o
m
p
u
t
atio
n
o
n
e
n
cr
y
p
ted
d
ata.
W
e
n
ee
d
to
co
n
f
ig
u
r
e
s
o
m
e
m
ain
p
ar
am
eter
s
in
clu
d
i
n
g
po
ly
n
o
m
ial
m
o
d
u
lu
s
d
e
g
r
ee
(
p
o
l
y
_
m
o
d
u
lu
s
_
d
e
g
r
ee
)
,
co
ef
f
icien
t
m
o
d
u
lu
s
(
c
o
ef
f
_
m
o
d
u
lu
s
)
,
p
lain
tex
t
Mo
d
u
lu
s
(
p
lain
_
m
o
d
u
lu
s
)
.
I
t
is
cr
u
cial
f
o
r
m
ain
tain
in
g
a
b
alan
ce
b
etwe
en
s
ec
u
r
ity
,
p
er
f
o
r
m
an
ce
,
an
d
f
u
n
ctio
n
ality
in
o
r
d
er
to
m
ak
e
th
e
en
cr
y
p
tio
n
s
ch
em
e
e
f
f
icie
n
t
,
an
d
s
u
itab
le
f
o
r
s
p
ec
if
ic
a
p
p
licatio
n
s
.
T
h
e
B
FV
s
ch
em
e
is
u
s
ed
f
o
r
ag
g
r
eg
ate
q
u
er
ies
s
u
ch
as
ad
d
itio
n
,
m
u
ltip
licatio
n
,
s
u
m
an
d
av
er
ag
e.
Ho
wev
er
,
eq
u
ality
-
b
ased
q
u
e
r
ies
ar
e
p
er
f
o
r
m
e
d
b
y
s
ea
r
c
h
ab
le
en
cr
y
p
tio
n
s
ch
em
e
an
d
AE
S
en
cr
y
p
tio
n
s
ch
em
e.
T
h
e
ch
o
ice
o
f
AE
S
k
ey
s
ize
s
h
o
u
ld
alig
n
with
th
e
d
eg
r
ee
o
f
s
en
s
itiv
ity
o
f
th
e
f
i
eld
s
u
ch
as
clas
s
1
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
6
6
1
-
1
6
7
2
1666
(
lo
w
s
en
s
itiv
ity
f
ield
s
AE
S
-
1
2
8
)
,
class
2
(
m
ed
iu
m
s
en
s
itiv
ity
f
ield
s
AE
S
-
1
9
2
)
an
d
class
3
(
h
ig
h
s
en
s
itiv
ity
f
iel
d
s
AE
S
-
2
5
6
)
.
I
t d
ep
e
n
d
s
o
n
s
ev
er
al
f
ac
to
r
s
,
s
u
c
h
as th
e
d
esire
d
s
ec
u
r
ity
lev
el
an
d
p
er
f
o
r
m
an
ce
.
W
e
co
n
s
id
er
th
e
f
o
llo
win
g
d
o
cu
m
en
t
th
at
co
n
tain
s
s
en
s
itiv
e
f
ield
s
,
n
am
ely
s
o
cial
s
ec
u
r
ity
n
u
m
b
er
SS
N,
cr
ed
it_
ca
r
d
_
n
u
m
b
e
r
an
d
b
alan
ce
.
T
h
e
latter
as
an
a
g
g
r
eg
ate
f
ield
is
en
c
r
y
p
ted
u
s
in
g
B
FV
s
ch
em
e.
Fig
u
r
e
2
illu
s
tr
ate
s
th
e
d
o
c
u
m
en
t
af
ter
en
cr
y
p
tio
n
.
Do
cu
m
en
t w
ith
o
u
t e
n
cr
y
p
tio
n
:
{
"n
am
e"
:"ab
d
el",
"e
m
ail":"a
b
d
el1
5
@
g
m
ail.
co
m
",
"ss
n
":"1
5
-
1
5
4
-
1
8
9
5
",
"c
r
ed
it_
ca
r
d
_
n
u
m
b
er
":"1
4
5
1
2
0
2
4
1
5
2
4
",
"b
alan
ce
":1
5
2
6
}
Fig
u
r
e
2
illu
s
tr
ates
th
e
d
o
cu
m
en
t
af
ter
th
e
in
s
er
tio
n
an
d
en
c
r
y
p
tio
n
o
f
s
en
s
itiv
e
f
ield
s
u
s
in
g
B
FV
f
o
r
en
cr
y
p
tin
g
s
en
s
itiv
e
ag
g
r
eg
a
te
f
ield
s
an
d
th
e
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
alg
o
r
ith
m
f
o
r
e
n
cr
y
p
tin
g
s
en
s
itiv
e
s
ea
r
ch
ab
le
f
ield
s
.
Fig
u
r
e
2
.
E
n
cr
y
p
ted
d
o
cu
m
en
t
v
is
u
alize
d
b
y
M
o
n
g
o
DB
c
o
m
p
ass
3
.
2
.
Co
m
pa
riso
n in
F
H
E
FHE
,
s
u
ch
as
th
e
B
FV
s
ch
em
e,
s
u
p
p
o
r
ts
ar
ith
m
etic
o
p
er
ati
o
n
s
lik
e
ad
d
itio
n
an
d
m
u
ltip
li
ca
tio
n
b
u
t
d
o
es
n
o
t
s
u
p
p
o
r
t
co
m
p
ar
is
o
n
o
p
er
atio
n
s
.
C
o
m
p
ar
is
o
n
o
p
er
a
tio
n
s
,
s
u
ch
as
d
eter
m
in
in
g
wh
eth
er
>
is
q
u
ite
ch
allen
g
in
g
b
ec
au
s
e
th
ey
ar
e
n
o
n
-
lin
ea
r
.
Ho
wev
er
,
co
m
p
ar
is
o
n
o
p
er
ato
r
s
ca
n
b
e
in
te
g
r
ated
i
n
to
v
ar
io
u
s
d
o
cu
m
e
n
t
d
atab
ase
ag
g
r
e
g
atio
n
p
ip
elin
es
to
f
ilter
,
c
o
m
p
u
t
e,
o
r
p
r
o
ject
d
ata
b
ased
o
n
c
o
n
d
itio
n
s
.
T
h
e
r
e
ar
e
s
ev
er
al
ap
p
r
o
ac
h
es
to
p
er
f
o
r
m
co
m
p
ar
is
o
n
o
n
en
cr
y
p
ted
d
ata
b
u
t
th
ey
ar
e
co
m
p
u
tatio
n
ally
ex
p
en
s
iv
e
an
d
co
m
p
lex
.
Su
b
t
r
ac
tio
n
an
d
ch
e
ck
in
g
th
e
s
ig
n
af
ter
d
ec
r
y
p
tio
n
is
th
e
tr
ad
itio
n
al
ap
p
r
o
ac
h
t
o
en
ab
le
co
m
p
ar
is
o
n
o
n
FHE.
T
h
is
ap
p
r
o
ac
h
d
ec
r
y
p
ts
th
e
r
esu
lt
o
f
t
h
e
h
o
m
o
m
o
r
p
h
ic
s
u
b
tr
ac
tio
n
.
I
f
t
h
e
d
i
f
f
er
e
n
ce
is
p
o
s
itiv
e,
>
; if
n
eg
a
tiv
e,
<
; a
n
d
if
ze
r
o
,
=
=
.
T
h
er
e
is
an
o
th
er
ap
p
r
o
ac
h
th
at
in
v
o
lv
es
co
m
b
in
in
g
FHE
wit
h
OPE
wh
ich
ca
n
lev
er
ag
e
th
e
s
tr
en
g
th
s
o
f
b
o
th
s
ch
e
m
es.
On
o
n
e
h
an
d
,
it
en
ab
les
s
ec
u
r
e
co
m
p
u
tatio
n
s
o
n
en
c
r
y
p
ted
d
ata,
an
d
o
n
th
e
o
th
er
h
an
d
it
m
ain
tain
s
o
r
d
e
r
p
r
o
p
e
r
ties
f
o
r
ef
f
icien
t
co
m
p
ar
is
o
n
an
d
q
u
er
y
in
g
.
Fo
r
ea
ch
s
en
s
itiv
e
ag
g
r
eg
ate
f
ield
,
we
ass
o
ciate
two
cip
h
er
tex
t
v
alu
es,
o
n
e
e
n
cr
y
p
ted
u
s
in
g
FHE
an
d
an
o
th
e
r
en
c
r
y
p
ted
u
s
in
g
OPE.
I
n
th
is
way
,
we
ca
n
p
er
f
o
r
m
o
p
er
atio
n
s
o
n
th
e
FHE
en
cr
y
p
te
d
v
alu
e
an
d
u
s
e
th
e
OPE
en
cr
y
p
ted
v
alu
e
f
o
r
e
f
f
icien
t
co
m
p
ar
is
o
n
s
.
d
o
cu
m
e
n
t =
{
‘
FHE_
b
alan
ce
’
: “
f
h
e_
e
n
cr
y
p
ted
_
v
alu
e”
,
‘
OPE_
b
alan
ce
’
:
‘
o
p
e
_
en
cr
y
p
ted
_
v
alu
e
’
,
………}
B
y
p
ar
s
in
g
an
d
an
al
y
zin
g
q
u
er
ies,
we
ca
n
a
u
to
m
atica
lly
id
en
tify
wh
ich
f
ield
is
in
v
o
lv
ed
in
o
p
er
atio
n
s
lik
e
s
u
m
,
av
g
,
m
in
,
m
ax
,
g
r
ea
ter
th
an
,
less
th
an
.
T
h
u
s
,
we
ca
n
d
ec
id
e
wh
eth
er
to
u
s
e
th
e
f
h
e_
en
c
r
y
p
ted
_
v
alu
e
o
r
o
p
e_
e
n
cr
y
p
ted
_
v
alu
e
d
u
r
i
n
g
q
u
er
y
ex
ec
u
tio
n
.
H
o
wev
er
,
alth
o
u
g
h
OPE
m
ain
tain
s
th
e
o
r
d
er
o
f
th
e
p
lain
te
x
ts
in
th
e
cip
h
er
tex
ts
;
it
is
v
u
ln
e
r
ab
le
to
in
f
e
r
en
ce
attac
k
s
.
I
t
leak
s
in
f
o
r
m
atio
n
ab
o
u
t
th
e
r
elativ
e
r
an
k
in
g
o
f
th
e
d
ata.
F
o
r
e
x
am
p
le,
if
t
h
e
attac
k
e
r
k
n
o
ws
th
at
(
)
<
(
)
,
h
e
ca
n
in
f
er
th
at
<
.
3
.
3
.
I
nte
g
rit
y
v
er
if
ica
t
io
n a
l
g
o
rit
hm
s
Ver
if
y
in
g
d
ata
i
n
teg
r
ity
is
c
r
u
cial
f
o
r
m
ain
tain
in
g
t
h
e
ac
cu
r
ac
y
,
c
o
n
s
is
ten
cy
,
an
d
c
r
e
d
ib
ilit
y
o
f
in
f
o
r
m
atio
n
.
T
h
e
p
r
o
p
o
s
ed
in
teg
r
ity
v
er
if
icatio
n
,
co
m
b
i
n
es
h
ash
in
g
to
en
s
u
r
e
d
ata
in
te
g
r
ity
an
d
a
n
XOR
o
p
er
atio
n
to
d
etec
t
ch
an
g
es.
T
h
e
f
o
llo
win
g
is
Alg
o
r
ith
m
5
,
wh
ich
o
u
tlin
es
th
e
s
tep
s
f
o
r
in
s
er
tin
g
a
d
o
cu
m
e
n
t
with
in
teg
r
ity
v
er
if
icatio
n
:
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
E
n
h
a
n
ci
n
g
p
r
iva
cy
i
n
d
o
c
u
me
n
t
-
o
r
ien
ted
d
a
ta
b
a
s
es u
s
in
g
s
e
a
r
ch
a
b
le
en
cryp
tio
n
…
(
A
b
d
el
ila
h
B
elh
a
j
)
1667
Alg
o
r
ith
m
5
.
T
o
in
s
er
t
d
o
cu
m
en
t w
ith
in
teg
r
ity
v
e
r
if
icatio
n
Input
Document
Output
xorResult = 0 // Convert data fields to a byte representation and perform XOR
FOR each fie
ld IN data
xorResult = xorResult XOR ConvertToByte(field)
END FOR
hmac_result = HMAC_SHA256(SECRET_KEY, xor_result).
Document.AddField (integrity_HMAC)= hmac_result
Db.mycollection.insert(Document)
Alg
o
r
ith
m
6
is
p
r
o
v
id
e
d
b
elo
w,
d
em
o
n
s
tr
atin
g
th
e
p
r
o
ce
d
u
r
e
f
o
r
v
er
if
y
in
g
d
o
cu
m
en
t i
n
teg
r
ity
:
Alg
o
r
ith
m
6
t
o
v
er
if
y
d
o
cu
m
e
n
t in
teg
r
ity
Input : Query to retrieve the document.
Output : A Boolean Value
xorResult = 0
FOR each field IN data
xorResult = xorResult XOR ConvertToB
yte(field)
END FOR
hmac_result = HMAC_SHA256(SECRET_KEY, xor_result).
If document [
‘
hash integrity]
≠
hmac_result
Return False
Else return True
4.
RE
SU
L
T
S
AND
D
I
SCU
SS
I
O
N
T
h
e
p
r
o
p
o
s
al
alg
o
r
ith
m
h
as b
e
en
test
ed
b
y
c
o
n
s
id
er
in
g
n
u
m
b
er
s
o
f
d
o
cu
m
en
ts
r
a
n
g
in
g
f
r
o
m
1
,
0
0
0
to
5
,
0
0
0
.
T
h
e
tim
e
tak
en
b
y
a
q
u
er
y
in
a
p
r
o
x
y
s
y
s
tem
u
s
es
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
an
d
F
HE
.
I
t
is
cr
u
cial
to
co
n
s
id
er
all
r
elev
a
n
t
co
m
p
o
n
en
ts
o
f
th
e
q
u
er
y
p
r
o
ce
s
s
.
Firstl
y
,
Data
b
ase
R
esp
o
n
s
e
T
im
e
wh
ich
is
th
e
tim
e
tak
en
b
y
th
e
No
SQL
d
atab
as
e
s
er
v
er
to
ex
e
cu
te
a
q
u
er
y
a
n
d
r
etu
r
n
th
e
r
esu
lts
.
I
t
in
clu
d
es
all
th
e
in
ter
n
al
p
r
o
ce
s
s
in
g
with
in
th
e
d
atab
as
e,
in
clu
d
in
g
s
ea
r
ch
i
n
g
,
f
ilter
i
n
g
,
an
d
a
g
g
r
e
g
atin
g
d
ata.
Se
co
n
d
ly
,
E
n
cr
y
p
tio
n
/Dec
r
y
p
tio
n
T
im
e
wh
ich
is
th
e
tim
e
tak
e
n
b
y
th
e
p
r
o
x
y
s
er
v
er
to
e
n
cr
y
p
t
th
e
s
en
s
itiv
e
f
ield
s
u
s
in
g
t
h
eir
co
r
r
esp
o
n
d
in
g
s
ch
em
e
b
e
f
o
r
e
s
en
d
in
g
th
em
to
th
e
d
atab
as
e
an
d
to
d
ec
r
y
p
t
th
e
r
esu
lts
r
ec
eiv
ed
f
r
o
m
th
e
d
atab
ase.
B
esid
es,
all
th
e
ex
p
er
im
en
tal
p
r
o
ce
d
u
r
es
ar
e
p
er
f
o
r
m
ed
o
n
an
I
n
tel(
R
)
C
o
r
e
(
T
M)
i5
-
1
0
3
5
G1
C
PU
@
1
.
0
0
GHz
,
1
1
9
0
MH
z,
4
co
r
es,
8
p
r
o
ce
s
s
o
r
s
.
Fig
u
r
e
3
illu
s
tr
ates
th
e
co
m
p
ar
is
o
n
o
f
q
u
er
y
tim
es
f
o
r
s
ea
r
ch
in
g
a
d
o
cu
m
en
t
in
two
s
ce
n
ar
io
s
:
o
n
e
wh
er
e
th
e
d
ata
b
ase
is
u
n
e
n
cr
y
p
ted
a
n
d
th
e
r
em
ain
in
g
o
n
e
wh
er
e
it is
en
cr
y
p
ted
u
s
in
g
a
s
ea
r
ch
a
b
le
en
cr
y
p
tio
n
s
ch
em
e.
Fig
u
r
e
3
.
Sear
ch
q
u
e
r
ies u
s
in
g
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
Fig
u
r
e
4
.
co
m
p
ar
es
th
e
tim
e
r
eq
u
ir
ed
f
o
r
ag
g
r
eg
ate
o
p
er
atio
n
s
in
two
s
ce
n
ar
io
s
:
o
n
e
wh
er
e
th
e
d
atab
ase
is
u
n
en
cr
y
p
ted
an
d
o
n
e
wh
er
e
it
is
en
cr
y
p
ted
u
s
in
g
a
B
FV
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
s
ch
em
e.
I
t
s
h
o
ws
th
at
th
e
tim
e
r
eq
u
ir
ed
to
p
er
f
o
r
m
ag
g
r
e
g
atio
n
q
u
er
ies
o
n
en
cr
y
p
ted
d
ata
is
s
ig
n
if
ican
tly
lo
n
g
er
th
an
p
er
f
o
r
m
in
g
th
ese
o
p
er
atio
n
s
o
n
p
lain
tex
t d
ata
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
6
6
1
-
1
6
7
2
1668
Fig
u
r
e
4
.
Ag
g
r
eg
ate
q
u
er
y
ex
e
cu
tio
n
T
im
e
with
B
FV sch
em
e
Fig
u
r
e
5
p
r
esen
ts
th
e
s
to
r
ag
e
im
p
ac
t
o
f
t
h
e
B
FV
s
ch
em
e.
I
n
p
ar
t
Fig
u
r
e
5
(
a)
,
th
e
s
to
r
ag
e
o
v
er
h
ea
d
f
o
r
a
d
ataset
with
1
,
0
0
0
d
o
c
u
m
en
t
s
is
s
h
o
wn
,
h
ig
h
lig
h
tin
g
th
e
ef
f
ec
t
o
f
ag
g
r
eg
atin
g
d
o
cu
m
e
n
ts
o
n
th
e
r
eq
u
ir
e
d
s
to
r
ag
e
s
p
ac
e.
I
n
p
a
r
t
Fig
u
r
e
5
(
b
)
,
th
e
s
to
r
a
g
e
o
v
er
h
ea
d
with
in
a
s
in
g
le
d
o
cu
m
en
t
is
d
etai
led
,
illu
s
tr
atin
g
th
e
in
f
lu
en
ce
o
f
ad
d
itio
n
al
elem
en
ts
s
u
ch
as
m
etad
ata
an
d
e
n
cr
y
p
tio
n
k
ey
s
o
n
th
e
s
to
r
a
g
e
o
f
an
e
n
cr
y
p
ted
d
o
cu
m
e
n
t.
T
h
is
f
ig
u
r
e
s
h
e
d
s
lig
h
t
o
n
th
e
c
h
allen
g
es
ass
o
ciate
d
with
in
cr
ea
s
in
g
cip
h
er
tex
t
s
ize
in
en
cr
y
p
tio
n
s
ch
em
es,
wh
ich
ca
n
lead
t
o
ad
d
itio
n
al
s
to
r
ag
e
an
d
d
ata
m
a
n
a
g
em
en
t c
o
s
ts
.
(
a)
(
b
)
Fig
u
r
e
5
.
S
to
r
a
g
e
im
p
ac
t
o
f
th
e
B
FV
(
a)
Sto
r
ag
e
o
v
er
h
ea
d
f
o
r
a
d
ataset
with
1
,
0
0
0
d
o
cu
m
en
ts
an
d
(
b
)
Sto
r
ag
e
o
v
er
h
ea
d
in
s
id
e
a
d
o
cu
m
e
n
t
T
h
is
s
tu
d
y
h
as
in
tr
o
d
u
ce
d
a
n
o
v
el
s
ec
u
r
e
p
r
o
x
y
en
s
u
r
in
g
p
r
i
v
ac
y
-
p
r
eser
v
in
g
th
at
i
n
teg
r
ates
a
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
s
ch
em
e
with
B
F
V
FHE
to
en
ab
le
s
ec
u
r
e
s
ea
r
ch
an
d
ag
g
r
eg
ate
q
u
er
ies
in
d
o
cu
m
en
t
-
o
r
ien
ted
d
ata
b
ases
.
Ou
r
r
esu
lts
d
em
o
n
s
tr
ate
th
at
th
e
p
r
o
p
o
s
ed
a
p
p
r
o
ac
h
ef
f
ec
tiv
e
ly
m
ain
tain
s
d
ata
co
n
f
id
en
tiality
wh
ile
allo
win
g
f
o
r
ef
f
icien
t
q
u
er
y
p
r
o
ce
s
s
in
g
.
Ou
r
ap
p
r
o
ac
h
b
ased
o
n
th
e
in
teg
r
atio
n
o
f
s
ea
r
ch
ab
le
en
cr
y
p
tio
n
with
B
FV
p
r
o
v
id
es
r
o
b
u
s
t
p
r
iv
ac
y
g
u
ar
an
tees.
T
h
e
s
ec
u
r
e
p
r
o
x
y
e
n
s
u
r
es
th
at
b
o
t
h
th
e
q
u
er
y
an
d
t
h
e
d
ata
r
em
ain
e
n
cr
y
p
ted
.
I
t
s
ig
n
if
ican
tly
en
h
an
ce
s
p
r
iv
ac
y
p
r
o
tectio
n
co
m
p
ar
ed
to
e
x
is
tin
g
s
o
lu
tio
n
s
,
wh
ich
t
y
p
ically
r
el
y
o
n
eith
er
s
ea
r
ch
ab
le
e
n
cr
y
p
tio
n
o
r
p
a
r
tial
h
o
m
o
m
o
r
p
h
i
c
en
cr
y
p
tio
n
alo
n
e
.
W
h
ile
th
e
p
r
iv
ac
y
b
en
ef
its
ar
e
im
p
o
r
tan
t,
th
e
p
er
f
o
r
m
an
ce
m
etr
ics
in
d
icate
a
tr
ad
e
-
o
f
f
b
e
twee
n
s
ec
u
r
ity
an
d
ef
f
icien
cy
.
Ou
r
im
p
le
m
en
tatio
n
s
h
o
ws
th
at
th
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es
i
n
tr
o
d
u
ce
a
d
d
itio
n
a
l
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
.
Sp
ec
if
ically
,
th
e
q
u
er
y
ex
ec
u
tio
n
tim
e
is
s
ig
n
if
ican
tly
lo
n
g
er
th
an
n
o
n
-
en
cr
y
p
te
d
q
u
er
ies
ex
ec
u
tio
n
tim
e
.
Acc
eler
atin
g
th
e
B
FV
s
ch
em
e
in
v
o
lv
es
a
co
m
b
in
atio
n
o
f
c
h
o
o
s
in
g
th
e
r
ig
h
t
p
a
r
a
m
e
t
e
r
s
,
o
p
t
i
m
i
z
i
n
g
a
l
g
o
r
i
t
h
m
s
,
u
s
i
n
g
e
f
f
i
c
i
e
n
t
l
i
b
r
a
r
i
e
s
[
2
8
]
a
n
d
u
t
i
l
i
z
i
n
g
h
a
r
d
w
a
r
e
a
c
c
e
l
e
r
a
t
i
o
n
s
[
2
9
]
-
[
3
3
]
.
As
s
h
o
wn
in
T
ab
le
1
,
e
x
is
tin
g
ac
ce
ler
ato
r
s
f
o
r
th
e
B
FV
s
ch
em
e,
in
clu
d
in
g
b
o
t
h
h
ar
d
war
e
ac
ce
ler
ato
r
s
an
d
s
o
f
twar
e
lib
r
a
r
ies th
at
o
p
tim
ize
its
p
er
f
o
r
m
a
n
ce
ar
e
lis
ted
with
th
eir
k
e
y
f
e
atu
r
es.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
E
n
h
a
n
ci
n
g
p
r
iva
cy
i
n
d
o
c
u
me
n
t
-
o
r
ien
ted
d
a
ta
b
a
s
es u
s
in
g
s
e
a
r
ch
a
b
le
en
cryp
tio
n
…
(
A
b
d
el
ila
h
B
elh
a
j
)
1669
T
ab
le
1
.
E
x
is
tin
g
B
FV a
cc
eler
ato
r
s
A
c
c
e
l
e
r
a
t
o
r
Ex
a
m
p
l
e
s
K
e
y
f
e
a
t
u
r
e
s
a
c
c
e
l
e
r
a
t
e
d
G
P
U
a
c
c
e
l
e
r
a
t
o
r
s
N
V
I
D
I
A
G
P
U
s,
c
u
F
H
E
P
o
l
y
n
o
m
i
a
l
m
u
l
t
i
p
l
i
c
a
t
i
o
n
,
N
TT,
mo
d
u
l
a
r
a
r
i
t
h
me
t
i
c
F
P
G
A
A
c
c
e
l
e
r
a
t
o
r
s
H
EA
X
(
H
o
mo
m
o
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
a
c
c
e
l
e
r
a
t
o
r
)
,
c
u
s
t
o
m FP
G
A
d
e
si
g
n
s
C
u
s
t
o
m
p
i
p
e
l
i
n
e
s f
o
r
p
o
l
y
n
o
mi
a
l
o
p
e
r
a
t
i
o
n
s
A
S
I
C
a
c
c
e
l
e
r
a
t
o
r
s
M
i
c
r
o
s
o
f
t
F
1
,
c
u
st
o
m A
S
I
C
d
e
si
g
n
s
F
u
l
l
y
c
u
st
o
m
B
F
V
o
p
e
r
a
t
i
o
n
a
c
c
e
l
e
r
a
t
i
o
n
(
l
o
w
l
a
t
e
n
c
y
)
S
o
f
t
w
a
r
e
l
i
b
r
a
r
i
e
s
M
i
c
r
o
s
o
f
t
S
EA
L,
P
A
LI
S
A
D
E,
H
El
i
b
O
p
t
i
mi
z
e
d
p
o
l
y
n
o
mi
a
l
a
r
i
t
h
m
e
t
i
c
,
m
u
l
t
i
-
t
h
r
e
a
d
i
n
g
,
b
a
t
c
h
i
n
g
C
l
o
u
d
s
o
l
u
t
i
o
n
s
M
i
c
r
o
s
o
f
t
A
z
u
r
e
,
I
B
M
c
l
o
u
d
O
f
f
l
o
a
d
i
n
g
F
H
E
o
p
e
r
a
t
i
o
n
s
t
o
o
p
t
i
mi
z
e
d
c
l
o
u
d
h
a
r
d
w
a
r
e
T
h
e
u
s
e
o
f
ac
ce
ler
ato
r
s
f
o
r
FHE
B
FV
s
ch
em
e
i
s
cr
u
cial
f
o
r
en
h
an
cin
g
p
er
f
o
r
m
an
ce
co
m
p
u
tatio
n
al
task
s
,
im
p
r
o
v
in
g
e
f
f
icien
cy
an
d
en
s
u
r
i
n
g
th
at
o
r
g
an
iz
atio
n
s
ca
n
h
an
d
le
s
en
s
itiv
e
d
ata
s
ec
u
r
ely
an
d
ef
f
ec
tiv
ely
.
Fig
u
r
e
6
illu
s
tr
ates th
e
s
ig
n
if
ican
t r
ed
u
ctio
n
o
f
ex
ec
u
tio
n
af
ter
u
s
in
g
B
FV a
cc
ele
r
ato
r
s
.
Fig
u
r
e
6
.
Ag
g
r
eg
ate
q
u
er
y
ex
e
cu
tio
n
t
im
e
with
B
FV sch
em
e
b
ef
o
r
e
a
n
d
af
te
r
u
s
in
g
ac
ce
ler
a
to
r
s
Ou
r
r
esu
lts
ar
e
co
n
s
is
ten
t
w
ith
an
d
b
u
ild
u
p
o
n
th
e
f
in
d
in
g
s
o
f
ea
r
lier
r
esear
ch
o
n
p
r
iv
ac
y
-
p
r
eser
v
in
g
q
u
er
y
p
r
o
ce
s
s
in
g
.
Fo
r
in
s
tan
ce
,
s
im
ilar
wo
r
k
b
y
SDDB
an
d
C
r
y
p
tMDB
p
r
o
p
o
s
e
a
p
r
ac
tical
en
cr
y
p
ted
Mo
n
g
o
DB
to
ac
h
iev
e
p
r
iv
ac
y
-
p
r
eser
v
in
g
u
tili
zin
g
an
ad
d
iti
v
e
h
o
m
o
m
o
r
p
h
ic
en
cr
y
p
tio
n
b
u
t
d
id
n
o
t
ad
d
r
ess
th
e
ag
g
r
eg
ate
q
u
e
r
y
lim
itatio
n
.
C
o
n
v
er
s
ely
,
o
u
r
ap
p
r
o
ac
h
b
r
id
g
es
th
is
g
ap
b
y
in
teg
r
atin
g
B
FV
FHE,
wh
ich
p
er
m
its
co
m
p
lex
a
g
g
r
e
g
ate
o
p
er
atio
n
s
to
b
e
p
e
r
f
o
r
m
ed
with
o
u
t
d
ec
r
y
p
tin
g
t
h
e
d
ata.
W
h
ile
th
e
p
r
o
p
o
s
a
l
m
o
d
el
o
f
f
er
s
s
ig
n
if
ican
t
ad
v
a
n
ce
m
en
ts
,
o
n
e
lim
itatio
n
o
f
o
u
r
ap
p
r
o
ac
h
m
u
s
t
b
e
ac
k
n
o
wled
g
ed
w
h
ich
is
th
e
in
cr
ea
s
ed
co
m
p
u
tatio
n
al
r
eso
u
r
ce
r
eq
u
i
r
em
en
t.
Ad
d
itio
n
ally
,
its
p
er
f
o
r
m
a
n
ce
ca
n
b
e
im
p
ac
ted
b
y
th
e
s
ize
o
f
th
e
cip
h
er
tex
t a
n
d
th
e
co
m
p
le
x
ity
o
f
th
e
ag
g
r
eg
ate
q
u
er
ies.
Fu
tu
r
e
wo
r
k
s
co
u
l
d
f
o
cu
s
o
n
o
p
tim
izin
g
th
e
en
c
r
y
p
tio
n
s
ch
em
es
to
r
ed
u
ce
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
.
Fu
r
th
er
m
o
r
e
,
ap
p
ly
in
g
o
u
r
m
o
d
el
to
d
if
f
er
e
n
t
ty
p
es
o
f
d
atab
ases
an
d
q
u
er
y
s
itu
atio
n
s
m
ay
o
f
f
er
a
d
d
itio
n
a
l
in
s
ig
h
ts
in
to
its
f
lex
ib
ilit
y
an
d
s
ca
lab
ilit
y
.
5.
CO
NCLU
SI
O
N
T
h
e
p
r
o
p
o
s
ed
p
r
o
x
y
-
b
ased
s
o
lu
tio
n
f
o
r
d
o
cu
m
e
n
t
-
o
r
ie
n
ted
d
atab
ases
en
h
an
ce
s
p
r
eser
v
in
g
p
r
iv
ac
y
an
d
in
teg
r
ity
in
clo
u
d
No
SQL
d
atab
ases
.
Ou
r
s
y
s
tem
ef
f
ec
tiv
ely
h
as
g
u
ar
d
ed
ag
ai
n
s
t
in
s
id
er
attac
k
s
,
en
s
u
r
in
g
th
at
s
en
s
itiv
e
in
f
o
r
m
atio
n
r
e
m
ain
s
p
r
o
tecte
d
ev
en
i
n
th
e
p
r
esen
ce
o
f
p
o
ten
tial
th
r
ea
t
s
f
r
o
m
with
in
th
e
o
r
g
an
izatio
n
.
T
h
is
h
y
b
r
id
e
n
cr
y
p
tio
n
ap
p
r
o
ac
h
en
ab
les
s
ec
u
r
e
s
ea
r
ch
a
n
d
ag
g
r
eg
ate
q
u
er
y
ex
ec
u
tio
n
in
d
o
cu
m
e
n
t
-
o
r
ien
te
d
d
atab
ases
u
s
in
g
a
c
o
m
b
in
atio
n
o
f
s
ea
r
ch
ab
le
en
c
r
y
p
tio
n
an
d
B
FV
FHE
.
Fu
tu
r
e
en
h
an
ce
m
e
n
ts
will
f
o
cu
s
o
n
o
p
tim
izin
g
p
er
f
o
r
m
an
ce
,
im
p
r
o
v
in
g
s
ca
lab
ilit
y
,
b
y
ex
am
in
in
g
wid
er
ap
p
licatio
n
s
to
f
u
r
th
e
r
en
h
a
n
ce
an
d
co
n
f
ir
m
th
e
s
y
s
tem
ef
f
ec
tiv
en
ess
ac
r
o
s
s
v
ar
io
u
s
r
ea
l
-
wo
r
ld
s
itu
atio
n
s
.
ACK
NO
WL
E
DG
M
E
N
T
S
T
h
e
au
th
o
r
s
th
an
k
s
A.
Ab
o
u
o
u
ar
d
f
o
r
s
cien
tific
h
elp
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
9
,
No
.
3
,
Sep
tem
b
er
20
25
:
1
6
6
1
-
1
6
7
2
1670
F
UNDING
I
NF
O
R
M
A
T
I
O
N
Au
th
o
r
s
s
tate
n
o
f
u
n
d
in
g
in
v
o
lv
ed
.
AUTHO
R
CO
NT
RI
B
UT
I
O
NS ST
A
T
E
M
E
N
T
T
h
is
jo
u
r
n
al
u
s
es
th
e
C
o
n
tr
ib
u
to
r
R
o
les
T
ax
o
n
o
m
y
(
C
R
ed
iT)
to
r
ec
o
g
n
ize
in
d
iv
id
u
al
au
th
o
r
co
n
tr
ib
u
tio
n
s
,
r
ed
u
ce
au
th
o
r
s
h
ip
d
is
p
u
tes,
an
d
f
ac
ilit
ate
co
llab
o
r
atio
n
.
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Ab
d
elilah
B
elh
aj
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
So
u
m
ia
Z
iti
✓
✓
✓
✓
✓
✓
✓
So
u
ad
Najo
u
a
L
a
g
m
ir
i
✓
✓
✓
✓
✓
✓
✓
✓
Kar
im
E
l Bo
u
ch
ti
✓
✓
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
Au
th
o
r
s
s
tate
n
o
co
n
f
lict o
f
in
t
er
est.
I
NF
O
RM
E
D
CO
NS
E
N
T
W
e
h
av
e
o
b
tain
ed
in
f
o
r
m
ed
c
o
n
s
en
t f
r
o
m
all
in
d
iv
id
u
als in
c
lu
d
ed
in
t
h
is
s
tu
d
y
.
E
T
H
I
CAL AP
P
RO
V
AL
All
p
ar
ticip
an
ts
p
r
o
v
id
ed
in
f
o
r
m
ed
c
o
n
s
en
t
b
ef
o
r
e
p
ar
tici
p
atin
g
in
th
e
s
tu
d
y
,
a
n
d
th
e
s
tu
d
y
was
co
n
d
u
cte
d
in
ac
co
r
d
an
ce
with
th
e
Dec
lar
atio
n
o
f
Helsin
k
i.
DATA AV
AI
L
AB
I
L
I
T
Y
D
ata
av
ailab
ilit
y
is
n
o
t
ap
p
licab
le
to
th
is
p
ap
er
as
n
o
n
e
w
d
ata
wer
e
cr
ea
ted
o
r
a
n
aly
ze
d
in
th
is
s
tu
d
y
.
RE
F
E
R
E
NC
E
S
[
1
]
K
.
E
l
d
a
h
sh
a
n
,
A
.
A
l
h
a
b
sh
y
,
a
n
d
G
.
A
b
u
t
a
l
e
b
,
“
A
c
o
m
p
a
r
a
t
i
v
e
s
t
u
d
y
a
m
o
n
g
t
h
e
ma
i
n
c
a
t
e
g
o
r
i
e
s
o
f
N
o
S
Q
L
d
a
t
a
b
a
ses,
”
Al
-
Az
h
a
r
Bu
l
l
e
t
i
n
o
f
S
c
i
e
n
c
e
,
v
o
l
.
3
1
,
n
o
.
2
,
p
p
.
5
1
–
6
0
,
D
e
c
.
2
0
2
0
,
d
o
i
:
1
0
.
2
1
6
0
8
/
a
b
sb
.
2
0
2
0
.
2
1
0
3
7
4
.
[
2
]
A
.
S
h
a
r
ma
,
P
.
Jh
a
,
a
n
d
S
.
S
i
n
g
h
,
“
D
a
t
a
c
o
n
t
r
o
l
i
n
p
u
b
l
i
c
c
l
o
u
d
c
o
mp
u
t
i
n
g
:
i
ssu
e
s
a
n
d
c
h
a
l
l
e
n
g
e
s,”
Re
c
e
n
t
A
d
v
a
n
c
e
s
i
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
4
,
n
o
.
2
,
p
p
.
5
6
4
–
5
7
9
,
M
a
y
2
0
1
9
,
d
o
i
:
1
0
.
2
1
7
4
/
2
2
1
3
2
7
5
9
1
2
6
6
6
1
9
0
6
1
7
1
6
4
5
5
0
.
[
3
]
A
.
P
u
r
n
i
ma,
D
e
v
e
n
d
r
a
n
,
a
n
d
R
a
j
a
v
a
r
man
,
“
S
e
c
u
r
i
t
y
i
ss
u
e
s
a
n
d
c
h
a
l
l
e
n
g
e
s
i
n
c
l
o
u
d
c
o
m
p
u
t
i
n
g
,
”
T
u
i
j
i
n
J
i
s
h
u
/
J
o
u
rn
a
l
o
f
Pro
p
u
l
si
o
n
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
4
4
,
n
o
.
3
,
p
p
.
3
1
7
3
–
3
1
7
8
,
O
c
t
.
2
0
2
3
,
d
o
i
:
1
0
.
5
2
7
8
3
/
t
j
j
p
t
.
v
4
4
.
i
3
.
1
4
2
8
.
[
4
]
S
.
A
.
E
l
-
S
e
o
u
d
,
H
.
F
.
E
l
-
S
o
f
a
n
y
,
M
.
A
b
d
e
l
f
a
t
t
a
h
,
a
n
d
R
.
M
o
h
a
me
d
,
“
B
i
g
d
a
t
a
a
n
d
c
l
o
u
d
c
o
mp
u
t
i
n
g
:
t
r
e
n
d
s
a
n
d
c
h
a
l
l
e
n
g
e
s,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
I
n
t
e
r
a
c
t
i
v
e
M
o
b
i
l
e
T
e
c
h
n
o
l
o
g
i
e
s
,
v
o
l
.
1
1
,
n
o
.
2
,
p
p
.
3
4
–
5
2
,
A
p
r
.
2
0
1
7
,
d
o
i
:
1
0
.
3
9
9
1
/
i
j
i
m.
v
1
1
i
2
.
6
5
6
1
.
[
5
]
P
.
A
t
z
e
n
i
,
F
.
B
u
g
i
o
t
t
i
,
L.
C
a
b
i
b
b
o
,
a
n
d
R
.
T
o
r
l
o
n
e
,
“
D
a
t
a
m
o
d
e
l
i
n
g
i
n
t
h
e
N
o
S
Q
L
w
o
r
l
d
,
”
C
o
m
p
u
t
e
r
S
t
a
n
d
a
r
d
s
a
n
d
I
n
t
e
rf
a
c
e
s
,
v
o
l
.
6
7
,
p
.
1
0
3
1
4
9
,
J
a
n
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
s
i
.
2
0
1
6
.
1
0
.
0
0
3
.
[
6
]
W
.
K
.
W
o
n
g
,
B
.
K
a
o
,
D
.
W
.
L
.
C
h
e
u
n
g
,
R
.
Li
,
a
n
d
S
.
M
.
Y
i
u
,
“
S
e
c
u
r
e
q
u
e
r
y
p
r
o
c
e
ss
i
n
g
w
i
t
h
d
a
t
a
i
n
t
e
r
o
p
e
r
a
b
i
l
i
t
y
i
n
a
c
l
o
u
d
d
a
t
a
b
a
se
e
n
v
i
r
o
n
me
n
t
,
”
i
n
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
A
C
M
S
I
G
MOD
I
n
t
e
rn
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
M
a
n
a
g
e
m
e
n
t
o
f
D
a
t
a
,
J
u
n
.
2
0
1
4
,
p
p
.
1
3
9
5
–
1
4
0
6
,
d
o
i
:
1
0
.
1
1
4
5
/
2
5
8
8
5
5
5
.
2
5
8
8
5
7
2
.
[
7
]
R
.
A
.
P
o
p
a
,
C
.
M
.
S
.
R
e
d
f
i
e
l
d
,
N
.
Z
e
l
d
o
v
i
c
h
,
a
n
d
H
.
B
a
l
a
k
r
i
s
h
n
a
n
,
“
C
r
y
p
t
D
B
:
p
r
o
t
e
c
t
i
n
g
c
o
n
f
i
d
e
n
t
i
a
l
i
t
y
w
i
t
h
e
n
c
r
y
p
t
e
d
q
u
e
r
y
p
r
o
c
e
ss
i
n
g
,
”
i
n
S
O
S
P
’
11
-
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
2
3
rd
A
C
M
S
y
m
p
o
si
u
m
o
n
O
p
e
r
a
t
i
n
g
S
y
st
e
m
s
Pr
i
n
c
i
p
l
e
s
,
O
c
t
.
2
0
1
1
,
p
p
.
8
5
–
1
0
0
,
d
o
i
:
1
0
.
1
1
4
5
/
2
0
4
3
5
5
6
.
2
0
4
3
5
6
6
.
[
8
]
S
.
T
u
,
M
.
F
.
K
a
a
sh
o
e
k
,
S
.
M
a
d
d
e
n
,
a
n
d
N
.
Ze
l
d
o
v
i
c
h
,
“
P
r
o
c
e
ssi
n
g
a
n
a
l
y
t
i
c
a
l
q
u
e
r
i
e
s
o
v
e
r
e
n
c
r
y
p
t
e
d
d
a
t
a
,
”
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
VLD
B
E
n
d
o
w
m
e
n
t
,
v
o
l
.
6
,
n
o
.
5
,
p
p
.
2
8
9
–
3
0
0
,
M
a
r
.
2
0
1
3
,
d
o
i
:
1
0
.
1
4
7
7
8
/
2
5
3
5
5
7
3
.
2
4
8
8
3
3
6
.
[
9
]
K
.
E
l
B
o
u
c
h
t
i
,
S
.
Z
i
t
i
,
F
.
O
mar
y
,
a
n
d
N
.
K
h
a
r
m
o
u
m
,
“
N
e
w
s
o
l
u
t
i
o
n
i
mp
l
e
men
t
a
t
i
o
n
t
o
p
r
o
t
e
c
t
e
n
c
r
y
p
t
i
o
n
k
e
y
s i
n
si
d
e
t
h
e
d
a
t
a
b
a
s
e
man
a
g
e
me
n
t
s
y
st
e
m,
”
A
d
v
a
n
c
e
s
i
n
S
c
i
e
n
c
e
,
T
e
c
h
n
o
l
o
g
y
a
n
d
E
n
g
i
n
e
e
ri
n
g
S
y
st
e
m
s
,
v
o
l
.
5
,
n
o
.
2
,
p
p
.
8
7
–
9
4
,
2
0
2
0
,
d
o
i
:
1
0
.
2
5
0
4
6
/
a
j
0
5
0
2
1
1
.
[
1
0
]
G
.
X
u
,
Y
.
R
e
n
,
H
.
Li
,
D
.
L
i
u
,
Y
.
D
a
i
,
a
n
d
K
.
Y
a
n
g
,
“
C
r
y
p
t
M
D
B
:
a
p
r
a
c
t
i
c
a
l
e
n
c
r
y
p
t
e
d
M
o
n
g
o
D
B
o
v
e
r
b
i
g
d
a
t
a
,
”
i
n
I
EE
E
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
M
a
y
2
0
1
7
,
p
p
.
1
–
6
,
d
o
i
:
1
0
.
1
1
0
9
/
I
C
C
.
2
0
1
7
.
7
9
9
7
1
0
5
.
[
1
1
]
M
.
A
l
m
a
r
w
a
n
i
,
B
.
K
o
n
e
v
,
a
n
d
A
.
Li
s
i
t
sa,
“
F
i
n
e
-
g
r
a
i
n
e
d
a
c
c
e
ss
c
o
n
t
r
o
l
f
o
r
q
u
e
r
y
i
n
g
o
v
e
r
e
n
c
r
y
p
t
e
d
d
o
c
u
m
e
n
t
-
o
r
i
e
n
t
e
d
d
a
t
a
b
a
s
e
,
”
i
n
C
o
m
m
u
n
i
c
a
t
i
o
n
s i
n
C
o
m
p
u
t
e
r
a
n
d
I
n
f
o
rm
a
t
i
o
n
S
c
i
e
n
c
e
,
v
o
l
.
1
2
2
1
C
C
I
S
,
2
0
2
0
,
p
p
.
4
0
3
–
4
2
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.