亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Mode of Operation for Modification,Insertion,and Deletion of Encrypted Data

        2022-11-10 02:28:18TaekYoungYounandNamSuJho
        Computers Materials&Continua 2022年10期

        Taek-Young Youn and Nam-Su Jho

        1Dankook University,Yongin,Gyeonggi,16890,Korea

        2Electronics and Telecommunications Research Institute,Daejeon,34129,Korea

        Abstract:Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services that were difficult to provide in the past.One of the services made possible through this change is cloud-based collaboration.In order to support secure collaboration over cloud,encryption technology to securely manage dynamic data is essential.However,since the existing encryption technology is not suitable for encryption of dynamic data,a new technology that can provide encryption for dynamic data is required for secure cloudbased collaboration.In this paper,we propose a new encryption technology to support secure collaboration for dynamic data in the cloud.Specifically,we propose an encryption operation mode which can support data updates such as modification,addition,and deletion of encrypted data in an encrypted state.To support the dynamic update of encrypted data,we invent a new mode of operation technique named linked-block cipher (LBC).Basic idea of our work is to use an updatable random value so-called link to link two encrypted blocks.Due to the use of updatable random link values,we can modify,insert,and delete an encrypted data without decrypt it.

        Keywords:Data encryption;cloud-based collaboration;dynamic data update

        1 Introduction

        Cloud is a technology that can provide various additional services by allowing users to store data in remote storage and use it anywhere[1,2].With the outbreak of COVID-19,the way of life has changed dramatically.Many of the activities that were conducted face-to-face have been converted to non-faceto-face methods,and accordingly,the demand for technologies suitable for the new environment has increased.Cloud service is a technology specialized for such a non-face-to-face environment,enabling data sharing and collaboration between physically separated users.Until now,a number of researches have been done for the security of cloud-based services[1,2].Moreover,a number of works focus on the confidentiality,integrity,and availability of data stored in remote cloud storages[3-6].Some works tried to support users to entrusted some important operations to a cloud server[7].

        Many services are being provided in the cloud environment,and services for providing collaboration between users in the cloud environment are also increasing.For example,some service such as the overleaf provides collaborative paper work between researchers online.In particular,papers written or edited by users are reflected in real time and shared between users,so the service enables stable real-time collaboration.For detailed explanation regarding the service,refer to the web-site “www.overleaf.com”.

        While the importance of collaboration provided in the cloud environment is growing,technology for providing secure collaboration in current services has not been sufficiently researched and developed.The security technology,currently being applied to the cloud-based collaboration service,stores plaintext data in the server,and each client establishes a secure channel with the server to share update information with other collaborators.The current strategy for secure collaboration over cloud server with encryption can be seen in Fig.1.

        Figure 1:Secure collaboration over cloud server with encrypted channel

        As seen in Fig.1,collaborators can share the same data by the help of the cloud server.Since all communication channels between the server and collaborators are protected by encrypting communicating messages,we can expect secure collaboration if we consider outside adversaries who only can see encrypted communicating messages.But,if we consider the existence of inside adversaries who can see stored data,the current countermeasure cannot guarantee the security of the collaboration.For example,the cloud server could be a malicious-but-curious adversary,which means that the server can exploit high-value collaboration data for its own benefit.

        To solve the above described threat against collaboration over cloud environment,it seems inevitable to encrypt data stored in the cloud.So,for secure collaboration,we need a way to encrypt a data for collaboration.For collaboration,an encryption technique should support dynamic data updates,and it is the main goal of this work to give a possible candidate that can permit us to perform secure collaboration by supporting dynamic data updates.Though a number of studies aimed to support dynamic data update operations[8-10],they are not interested in the dynamic update of encrypted data.In this work,we will give a new encryption method for secure collaboration with encrypted dynamic data stored in the remote cloud storage.Specific goal of our research is to design a mode of operation suitable for dynamic data so that the mode can support data updates such as modification,addition,and deletion in an encrypted form.Our strategy to achieve the goal is to use random values.Each random value is used to link two adjacent encrypted blocks.In our construction,the random values are updatable,and so we can update encrypted data by updating link values.Concrete construction can be seen in the following sections.Note that the main contribution of our study is to propose a new mode of operation which can support update operations for encrypted data,and our work is the first approach for secure collaboration with updatable encrypted data,in the literature.

        2 Related Works

        In cryptography,to design secure mode of operations is one of fundamental research topic.In this research direction,it is the most important requirement how to repeatedly apply a cipher’s singleblock operation to securely encrypt data which are larger than a block.Though a number of mode of operations have been studied,none of them are designed to encrypt dynamic data.

        For security and functionality,error propagation properties of encryption modes have been studied considering various scenarios of data modification.However,the use of dynamic data is not included in the scenarios.Recently,many modes of operation techniques are newly devised,they focus on the way of supporting confidentiality and authenticity in an efficient way,and are known as authenticated encryption modes.

        Though a number of techniques have been to support stronger security and better efficiency,none of them are interested in the encryption of dynamic data.By using existing mode of operations,we may support dynamic data by decrypting an encrypted data,updating the data according to required modifications,and encrypting it again.However,it requires cost operations when the data is frequently modified.So,based on the above (brief) remind about related works,we can say that there is no encryption scheme supporting dynamic update in an encrypted form.

        From now on,we will briefly review existing mode of operations in terms of dynamic update of encrypted data.Three main functions required for dynamic data are modification,insertion,and deletion.So,we will analyze existing techniques in the viewpoint of the encryption of dynamic data,i.e.,the possibility of supporting update operations will be the main goal of our analysis.

        There are two kinds of mode of operations.In the first case,mode of operations can support blockwise encryption in the sense that the encryption of a block is not influenced by any other plaintext or ciphertext.Two modes,electronic codebook(ECB)mode and counter(CTR)mode which can be seen in Fig.2,belong to the first case.The other case includes many mode of operations in which encryption(or decryption)of a plaintext block(or a ciphertext block)is influenced by other blocks.One of representative mode of operation belong to the second case is the cipher block chaining(CBC)mode which works as seen in Fig.2.Mode of operations belong to the second case are not suitable for dynamic update since the update of single block influence on many blocks.As seen in Fig.3,two ciphertext blocks should be updated to update one plaintext block.The property is also known as error-propagation though it was not defined to describe the change for updates.It is easy to see that block-wise encryption methods are suitable for dynamic updates since the modification of one block influences on many blocks in the second case.

        Figure 2:Existing mode of operations

        Figure 3:Impact of update in CBC mode

        3 Preliminaries

        In this section,we describe some basic concepts and definitions.

        3.1 System Model

        In order to provide secure collaboration on encrypted data in a cloud environment,key management technology for securely distributing and managing the secret key shared by collaborators or access right management technology for identifying legitimate users is also required.This may require additional system members.However,in this paper,we focus on the problem of storing encrypted data in a cloud server and providing dynamic data update operations for the stored data.

        Since we are considering a cloud-based collaboration scenario,the system model consists of a cloud server Srv and a number of collaborators Clts.Each system member has the following roles:

        ?Server.In order to provide continuous collaboration in an online environment,the server Srv must have the latest version of the data.The update status of data generated through collaboration should always be shared through the server.For secure data access right management,the server must have information that can verify users who are allowed to access data.Since the issue of access control of legitimate users is not dealt with,we assume that secure access control is provided by the server.

        ?User.Users participating in a collaboration are considered to be sharing a secret key to access the data they collaborate on.Data stored in the cloud must be encrypted,and assuming a shared key among collaborators is an essential part in order to be able to access encrypted data.Users must download the latest version stored in the cloud server at the time of participating in collaboration,and data updates that occur in the middle must be shared to the cloud server in real time.All updates are delivered by the server to collaborating users in real time.Each user proceeds according to the latest version delivered by the server.

        3.2 Requirements

        From now,we will summarize functional requirements and security requirements for our technique.Before describing the requirements,I would like to note that the technique proposed in this paper is designed to support collaboration with dynamically updated data based on a cloud environment.

        3.2.1 Functional Requirements

        In order to support real-time collaboration in a cloud environment,it should be possible to update data stored in the cloud and provided to collaboration participants.The most important factor is to provide data updates in an environment where data is stored in an encrypted form for security.That is,technically,it is the most important requirement to provide data encryption technology that can support all update operations for an encrypted data without decryption.

        3.2.2 Security Requirements

        Since the goal of the proposed technique is to support dynamic update for encrypted data,we assume that a data is stored in a remote storage server in an encrypted form.So,basically,the main security requirement for our scheme is the confidentiality.Differently from ordinary encryption techniques,our technique designed to support dynamic modifications,and so we expect reliability for update operations.

        3.3 Security Model

        Differently from existing mode of operations for block ciphers,our scheme considers dynamic data which should be changed according to users’modifications.In ordinary block cipher operation modes,static data is encrypted which means that an adversary cannot obtain two different ciphertexts for similar plaintexts.On the contrary,for dynamic data,an adversary can obtain two different ciphertexts of two similar plaintexts.For example,suppose that one block of a file F is modified to F′such that

        F =m1||...||mi||...||mnand F′=m1||...||mi′||...||mn

        where miis not equal to mi′.Then,the adversary can obtain two different ciphertexts C =DyEnc(F)and C′=DyEnc(F′)where DyEnc is an encryption function for dynamic data.

        To give formal definition for the security of the proposed scheme,we define an encryption scheme supporting dynamic encryption.From now,we call the encryption scheme as dynamic encryption scheme.

        Definition 1.(Dynamic Encryption Scheme)A dynamic encryption scheme is a collection of four polynomial-time algorithms DyEnc={KeyGen,DyEnc,DyDec,Update}such that,

        - KeyGen(λ):For given a security parameter λ,the key generation algorithm returns a secret key sk.Some case,the secret key is a set of secret values.

        - DyEnc(sk,M):Let M be a message which is given for encryption.Then the algorithm encrypts M using a secret key sk and returns C as the corresponding ciphertext.

        - DyDec(sk,C):For given a ciphertext C,the decryption algorithm uses a secret key sk to recover the message M from the ciphertext.

        - Update(sk,C,Q):According to the update query Q,the algorithm modifies the ciphertext C in an encrypted form.i.e.,the algorithm updates the ciphertext without decrypting the full ciphertext.

        In the above definition,Update is the most important algorithm for dynamic encryption schemes since managing dynamically modified file is the main goal of dynamic encryption schemes.In the definition of Update,the query Q includes the type of update query,required data for update,and(optional)state information such as the version of the file.

        The confidentiality is a traditional requirement for encryption schemes since to prevent any adversary from extracting meaningful information from a target ciphertext.The integrity considered in this paper is slightly different from ordinary integrity.We are interested in‘version integrity’of our scheme in the sense that an adversary may try to generate a valid encrypted data even if the adversary cannot extract any information from the encrypted data.So,we will call the feature as the versionintegrity.The security notion is needed since our scheme support dynamic update of encrypted data without decrypting it.Based on the above reasons,formally,we can define the security of our mode of operation supporting dynamic update as following.The first definition captures the confidentiality of a dynamic encryption.

        Definition 2.(Confidentiality of Dynamic Encryption) Let DyEnc(sk,M) be an encryption algorithm supporting dynamic updates.We define the confidentiality for dynamic encryption as similar to the confidentiality of traditional encryption algorithms.For details we consider the following game:

        Ind-CCA-DyEnc(sk,A,λ)

        - (M0,M1)←A1OE(sk),OD(sk),OU(sk)(λ),where|M0|=|M1|

        - i ←random coin toss

        - C=DyEnc(sk,Mi)

        - i′=A2OE(sk),OD(sk),OU(sk)(C,M0,M1,λ)

        - if i=i′then output 1(the adversary wins the game)

        Here the adversary is defined as a tuple of polynomial-time algorithms(A1,A2).A1is an algorithm that chooses target plaintexts by viewing several sample plaintext-ciphertext pairs which are generated by DyEnc and the secret key sk.We denote encryption oracle,decryption oracle,and update oracle with the secret key sk as OE(sk),OD(sk),OU(sk),respectively.And the second algorithm A2is an algorithm that determines which plaintext is corresponding to the given ciphertext.Finally,we define the advantage of the adversary as

        AdvA=(A1,A2)=Pr[Ind-CCA-DyEnc(sk,λ)=1]-1/2,

        where sk is a randomly chosen secret key on uniformly distributed key space.Without loss of generality,DyEnc satisfies the confidentiality if there is no polynomial-time algorithm A=(A1,A2),of which the advantage is negligible.

        Definition 3.(Integrity of Dynamic Encryption)We define the integrity of our scheme considering the usage that there are multiple users collaborating on the same file.With the integrity,we need to guarantee that the file is not modified by an unprivileged user,the adversary.Therefore,we define the integrity as the following:If there is no polynomial-time adversary which can modify or create proper ciphertexts without a secret key,then the dynamic encryption algorithm satisfies the integrity.

        4 Proposed Method

        4.1 Basic Idea

        The basic idea of our construction is inspired by chains used in everyday life,and the intuitive concept of the idea is described in Fig.4.Compared with existing techniques,our technique is designed to provide encryption for dynamic data instead of supporting the optimal ratio of ciphertext to plaintext.In existing encryption techniques,one ciphertext block is generated for one plaintext block,but in our construction,we need redundant value for making link between two blocks as seen in Fig.4.The redundant value is named Link in the figure.In other words,lb-lLis the size of a plaintext in a block where lbis the size of block for the underlying encryption scheme and lLis the size of a

        Link.

        For update,we can change encrypted data as seen in Fig.4.For modification,deletion,and insertion,refer B-1,B-2,and B-3 in Fig.4.For example,when a data block,Data 3,is modified to Data 7,two links for the block are updated as seen in the figure.It will be easy to understand how the data and links are changed by looking at the specific encryption procedure in the following section.

        4.2 Description

        Here,we will describe detailed algorithms for our dynamic encryption scheme.According to formal definition of a dynamic encryption,we have the following four algorithms:KeyGen,DyEnc,DyDec,and Update.

        4.2.1 Key Generation

        For encryption,we choose and use a secret key sk.We use the following parameters for our construction.Let lbbe the size of a block defined by the underlying block cipher.Let lLbe the size of link values used for linking two data blocks.

        Figure 4:Update operations

        4.2.2 Encryption

        Note that,for our dynamic encryption scheme,we use a secure encryption algorithmEnc(k,m)as an underlying scheme,which takes a secret keykand a messagemto generate the corresponding ciphertextc.LetMbe the message to be encrypted.We assume that the size of the message is a multiple oflb-lL.Let|M|=n(lb-lL)which means thatMcomposed withnblocks of length(lb-lL)-bits.Then,the encryption algorithmDyEncworks as followings:

        1.Divide the messageMinto small blocks of lengthlb-lL-bits.When,we can see that

        M=m1||m2||...||mnwhere |mi|=lb-lL.

        2.Choosenrandom valuesR0,R1,...,andRn-1,and setIV=R0where all values arelL-bits

        such thatIV=iv||ivandRi =ri||rifori=1,...,n-1.

        3.Encoded dataM′is computed as

        M′=iv||m1||R1||m2||R2||...||mn-1||Rn-1||iv.

        4.Encryption functionEncis applied to

        mi′=ri-1||mi||rifor all i=1,...,n.

        Fori=1andn,we have

        m1

        ′=iv||m1||r1andmn

        ′=rn-1||mn||iv.

        5.Ciphertext is computed as

        C=c1||...||cn

        whereci =Enc(sk,m1′)andskis the encryption key.

        In Fig.5,we give an example for the encryption procedure.In the example,we consider a messageMwhich can be divided into six blocks such that

        M=m1||m2||m3||m4||m5||m6.

        Then,we choose six valuesIV,R1,R2,R3,R4,andR5where all values arelL-bits such that

        IV=iv||iv,R1=r1||r1,R2=r2||r2,R3=r3||r3,R4=r4||r4,andR5=r5||r5.

        Then,an encoded dataM′is computed as

        M′=IV||m1||R1||m2||R2||m3||R3||m4||R4||m5||R5||m6||IV.

        An encryption functionEncis applied to

        mi′=ri-1||||ri.

        Fori=1and6,we have

        m1

        ′=iv||m1||r1andm6′=r5||m6||iv.

        Finally,the ciphertext is computed as

        C=c1||c2||c3||c4||c5||c6

        whereci=Enc(sk,mi′)andkis the encryption key.

        Figure 5:Procedure for proposed encryption technique

        4.2.3 Decryption

        To decrypt a ciphertextC,we can use the decryption algorithmDec(k,c)of the underlying encryption scheme,which returns the corresponding messagemfor given ciphertextcby using the secret keyk.

        We can easily recover the data from the ciphertextCby applying block-wise decryption as following steps:

        1.Apply the decryption algorithm to each ciphertext block cifor all i=1,...,n.Then,we can obtain mi′=Dec(k,ci)for i=1,...,n.

        2.Note that

        mi′=ri-1||mi||rifor all i=2,...,n-1

        and

        m1

        ′=iv||m1||r1and mn′=rn-1||mn||iv

        for i=1 and n.Remove noise values iv and ris and get the plaintext as

        M =m1||...||mn.

        4.2.4 Modification

        Let mibe the message to be updated to m*.To perform update operation,we prepare two new random link values RL=rL||rLand RR=rR||rR.Then,cithe ciphertext of mi′=ri-1||mi||riis replaced by

        c*=Enc(sk,rL||m*||rR).

        We also have to modify two more ciphertext blocks ci-1and ci+1.Let

        ci-1=Enc(sk,ri-2||mi-1||ri-1)and ci+1=Enc(sk,ri||mi+1||ri+1).

        Then,two additional blocks are changed to different ciphertexts

        ci-1*=Enc(sk,ri-2||mi-1||rL) and ci+1*=Enc(sk,rR||mi+1||ri+1).

        According to the above description,it seems that the proposed technique requires two more additional operation for single modification.However,in general,a number of blocks are modified at once.So,we can see that the additional cost for one modification operation is the modification of two blocks,but the cost is not required for each block.In other words,we need to update lm+2 message blocks to update lmconsecutive message blocks.In other words,two more ciphertext blocks are updated for each modification query.A concrete example can be seen in Fig.4.

        4.2.5 Deletion

        Let mibe the message to be deleted.Recall that,encryption of mi-1and mi+1are appended at the left and right side of the encryption of mias

        C =c1||...||ci-1||ci||ci+1||...||cn

        where

        ci-1=Enc(sk,ri-2||mi-1||ri-1),ci=Enc(sk,ri-1||mi||ri)and ci+1=Enc(sk,ri||mi+1||ri+1).

        To perform update operation,we prepare a new random link value R*= r*||r*.Then,cithe ciphertext of miis removed from encrypted data,and two ciphertexts ci-1′and ci+1′are computed to change link values in two ciphertext ci-1and ci+1so that we have the followings:

        ci-1′=Enc(sk,ri-2||mi-1||r*)and ci+1′=Enc(sk,r*||mi+1||ri+1).

        Then,the encrypted data C is changed to C*as following:

        C =c1||...||ci-2||ci-1′||ci+1′||ci+2||...||cn.

        Recall that,two ciphertext blocks are linked when they have the same link values as in the above equation.So,we can see that the messagemiis deleted and two ciphertexts are linked as defined.As in the description for modification,the additional cost for one deletion operation is the modification of two blocks.To deletelmconsecutive message blocks,we need to update only2ciphertext blocks.Refer Fig.4 for a concrete example.

        4.2.6 Insertion

        Letmbe the message to be inserted betweenmiandmi+1,andciandci+1are encryption of two messages such that

        To perform insertion operation,we prepare two new random link valuesRL=rL||rLandRR=rR||rR.Then,cthe ciphertext ofm′=rL||m||rRis inserted betweenciandci+1.We also modify two ciphertextciandci+1to update link values.Two ciphertext are computed as

        Then,we can see that the message is inserted in the ciphertextCas

        To insertlmconsecutive message blocks,we need to update only2more blocks.Refer Fig.4 for a concrete example.

        4.3 Analysis

        To compare our technique with existing techniques,we give the following table.As seen in Tab.1,existing techniques cannot support all update operations.Though the ECB mode can support dynamic update operations,it is well known that the scheme is not secure since two adjacent blocks are not linked.Two mode of operations,CBC mode and CTR mode,are not suitable for dynamic update.The CTR mode can partially support the modification of a block,but we need somewhat strong assumption that the adversary cannot find two different plaintext blocks for the same position.If an adversary can figure out two different data blocks,the secret encryption key for the position may revealed to the adversary.

        Table 1:Comparison with existing techniques

        In the above,we examine the functionality of our scheme by comparing with existing technique.From now,we will discuss the security of our scheme.The proposed technique is designed based on a secure encryption functionEnc,and the security of the proposed technique is guaranteed by the security of the underlying scheme such as the advanced encryption standard(AES)[11].Extract any information from a ciphertext block is intractable since the underlying scheme is secure under standard security notion which guarantee the hardness of extract any information of encrypted data.

        In Section 2.4,we describe a definition for the security of dynamic encryption.As we in Def.2 and Def.3,the security of a dynamic encryption is slightly different from ordinary encryption techniques in the sense that any encrypted data are not updated in existing techniques.So,to verify the security of our scheme,we need to prove that it is still hard to guess an encrypted data even if number of update queries can be made by an adversary.From now,we will prove the security of our scheme.

        Theorem 1.The proposed dynamic encryption scheme is secure if the underlying block cipher is secure.

        Sketch of proof) Assume that our scheme is implemented using a secure block cipher such as AES.Then,we can guarantee the security of encrypted block-sized messages.The goal of the proof is to reduce the security of our scheme to the security of the underlying block cipher.For the goal,we will design an algorithm that can break the security of the underlying scheme using an adversary who can break the security of the proposed scheme.

        Proof of Confidentiality)For the proof about the confidentiality,we remind the definition 2.By the definition 2,we need to guarantee there is no adversary that has non-negligible advantage against the ind-CCA-DyEnc game.Suppose that there exists a polynomial-time adversary A=(A1,A2)that Pr[Ind-CCA-DyEnc(sk,A,λ)=1]>1/2.

        It means that the adversarial algorithm A2can find out correct i for given C=Enc(sk,ri1||Mi||ri2),M0,and M1with meaningful probability.For simplicity,we can assume that

        where Enc is an embedded encryption algorithm.From the semantic secure property of Enc algorithm,no polynomial-time algorithm can obtain any information about plaintext from a given ciphertext.In other words,Pr[i=i′|i′=A2OE(sk),OD(sk),OU(sk)(ct,m0t,m1t,λ),ct=Enc(sk,rL||mit||rR)]-1/2 is negligible.

        Proof of Integrity)To prove the integrity of dynamic encryption,it is needed to guarantee there is no adversary that can construct a proper new cipher block without having the secret key.Without loss of generality,we assume that the adversary’s goal is to construct t-th cipher block.The first strategy of the adversary is to insert a random cipher block into the location of t-th block.However,decrypting the random ciphertext yields a random plaintext,so that links of the resulting plaintext(rL||mt||rR)are random information.It means that rLrtand rRrt+1,and it is easy to find out the t-th block is not proper with high probability.

        The other way to generate a valid ciphertext can be re-arranging existing valid ciphertexts.In an adversary’s viewpoint,a new valid ciphertext can be made from an existing valid ciphertext only if an inserted block has valid link values.If the adversary has no information about the secret key,then the only possible strategy of an adversary is random guessing of link value.In this case,a randomly chosen link value is valid with probability 1/2lL.Therefore,if we use link values with enough length to obtain the expected security level.For example,we can see that 40-bits link values are enough for our scheme.

        Since we use block-wise encryption,the computational complexity of our scheme is almost identical with existing encryption modes since one block-sized message requires one block-encryption.Only the difference is the ciphertext expansion.In existing techniques,the size of ciphertext is almost identical with the data except small-sized padding values.However,our technique requires link values to support dynamic updates.Since we use 40-bits link value,we need one block to encrypt lb-40 bits where lbis the size of a block.Thought the space efficiency is reduced due to the use of link values,our technique is the first encryption mode in the literature,which can support dynamic encryption.

        5 Conclusion

        With the development of communication technologies such as 5G and social demands,the importance of cloud-based collaboration is growing.However,since the existing technology is not possible to provide encryption for dynamic data,it is difficult to provide secure cloud-based collaboration.In this paper,we proposed a dynamic encryption technology that can overcome the limitations of these existing technologies.We also proved the security of the proposed technique.

        Recall that,in this work,we gave a technique that support dynamic update of encrypted data.One of fundamental requirements for the technique is a way of maintaining the correct version.Since a stored data is frequently updated,collaborators may want to check the version of the data.To guarantee the version of stored data,we need a new authenticating method for dynamically updated data.So,we thought that the most important future work is to design an efficient and effective way to prove the version of a dynamically updated data in an encrypted form.We are also interested in designing efficient technique for collaboration of multimedia data using dedicated encryption technique such as image encryption scheme[12].

        Funding Statement:This work was partly supported by Institute of Information &communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2021-0-00779,Development of high-speed encryption data processing technology that guarantees privacy based hardware,50%) and National R&D Program through the National Research Foundation of Korea(NRF)funded by Ministry of Science and ICT(NRF-2021R1F1A1056115,50%).

        Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

        久久久久无码精品国| www插插插无码视频网站| 亚洲 欧美 激情 小说 另类 | 综合久久久久6亚洲综合| 一本色道久久88加勒比—综合| 欧美xxxx做受欧美88| 亚洲欧洲∨国产一区二区三区| 色窝窝无码一区二区三区2022| 伊人久久综合狼伊人久久| 欧美午夜理伦三级在线观看| 久久久久亚洲av片无码v| 亚洲欧洲精品成人久久曰影片| 国产精品不卡免费版在线观看| 视频在线观看一区二区三区| 亚洲综合久久精品无码色欲| Y111111国产精品久久久 | 中文字幕av熟女中文av| 国产精品美女久久久久av福利| 国产精品亚洲五月天高清| 日本高清中文一区二区三区| 女人av天堂国产在线| 亚洲av无码一区二区三区观看| 97人妻视频妓女网| 麻豆国产精品伦理视频| 亚洲中文字幕无码av永久| 亚洲av无码乱观看明星换脸va| 好爽~又到高潮了毛片视频| 亚洲国产天堂久久综合网| 成人美女黄网站色大免费的| 精品少妇大屁股白浆无码| 国产成人亚洲精品一区二区三区| 色偷偷偷在线视频播放| 亚洲免费人成在线视频观看| 中文字幕偷拍亚洲九色| 国产香蕉一区二区三区在线视频 | 免费大片黄在线观看| 一区二区三区中文字幕有码| 亚洲综合日韩精品一区二区| 色八区人妻在线视频免费 | 国产三级精品视频2021| 久久亚洲私人国产精品|