• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

    2021-11-26 03:46:16YuetingYngFzhiHeSoonhungHnYqinLingYunCheng
    Engineering 2021年6期

    Yueting Yng, Fzhi He,b,*, Soonhung Hn, Yqin Ling, Yun Cheng

    a School of Computer Science, Wuhan University, Wuhan 430072, China

    b State Key Laboratory of Digital Manufacturing Equipment and Technology, Huazhong University of Science and Technology, Wuhan 430074, China

    c Division of Ocean Engineering, Korea Advanced Institute of Science and Technology, Daejeon 34141, Republic of Korea

    d School of Information Management, Wuhan University, Wuhan 430072, China

    Keywords:

    ABSTRACT Cloud manufacturing is one of the three key technologies that enable intelligent manufacturing. This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)assembly models to effectively support hierarchical access control,integrity verification,and deformation protection for co-design scenarios in cloud manufacturing. An assembly hierarchy access tree (AHAT) is designed as the hierarchical access structure.Attribute-related ciphertext elements,which are contained in an assembly ciphertext (ACT)file,are adapted for content keys decryption instead of CAD component files.We modify the original Merkle tree(MT)and reconstruct an assembly MT.The proposed ABE framework has the ability to combine the deformation protection method with a content privacy of CAD models. The proposed encryption scheme is demonstrated to be secure under the standard assumption.Experimental simulation on typical CAD assembly models demonstrates that the proposed approach is feasible in applications.

    1. Introduction

    As investigated in a survey paper published in Engineering [1],intelligent manufacturing is the state-of-the-art product development philosophy, and comprises intelligent manufacturing technology, Internet of Things (IoT)-enabled manufacturing, and cloud manufacturing [1,2]. With the development and application of cloud computing [3–5], traditional computer-aided design(CAD), computer-aided engineering (CAE), and computer-aided manufacturing (CAM) systems are moving to cloud-based design and manufacturing(CBDM)[6–8],raising new information security problems for enterprises, especially for small and medium-sized enterprises (SMEs) [9].

    Due to limitations of funds and resources, SMEs cannot build private clouds as large companies do. Well-known public cloud service providers (CSPs) have experienced various security problems;thus,semi-trusted or untrustworthy public clouds challenge the information security of SMEs in cloud-based co-design processes [10–13]. As a core ingredient of collaborative product development [14–18], CAD models contain abundant intellectual properties and therefore encounter security problems.Information security depends on the reliability of the industrial cloud[19,20].A vital security issue for CBDM is how to avoid illegal access to the confidential information contained in CAD models within codesign environments [21–23].

    One typical access-control method is to apply a standard encryption technique, such as attribute-based encryption (ABE)[24]. But a simple introduction of ABE access-control into CAD assembly models is inefficient and inflexible. Some flexible access-control approaches have been reported for cloud computing[25–28].Therefore,how to develop an efficient and flexible accesscontrol approach to protect outsourced and co-designed CAD assembly models remains a challenge in CBDM.

    This paper proposes a novel ABE approach with integrity verification for CAD assembly models.In contrast to existing ciphertext policy ABE (CP-ABE) and related methods [24–28], a hierarchical access-control encryption scheme that enables flexible authentication for users with different privilege levels is proposed for legitimate access to CAD assembly models.

    The rest of this paper is organized as follows. In Section 2,related work is reviewed.In Section 3,we discuss our design goals and declare the problem formulation. In Section 4, we present a cloud-based sharing architecture for assembly models.In Section 5,we elaborate details of the encryption scheme for the proposed approach and illustrate its security proof and theoretical analysis.In Section 6, we demonstrate the performance of the proposed encryption scheme. Finally, the paper is concluded in Section 7.

    2. Related work

    2.1. Access control

    Access control,which originated from the concept of the access matrix, is an important way of protecting data confidentiality and privacy [29–33]. A framework for access control in CAD environments (FACADE) has been presented to protect CAD models [34],and a data-security model for collaborative design and data management systems has been proposed to combine multiple security technologies with access control[35].Chang et al.[36]reported an access-control system based on multiple methods for use in sharing CAD design drawings.Speier et al.[37]used hybrid access control for product data-security processing.

    Roles-based access control is a mainstream approach for codesign[38,39].However,with the expansion of complex processes,co-design users, and product models, ‘‘role explosion” problems can occur.Furthermore,existing access-control methods are based on a single model file and are thus inflexible.

    2.2. Encryption approaches

    Encryption has been extensively applied in multimedia data[40]. Nishchal and Naughton [41] proposed a multi-level encryption architecture based on optical principles, which can be used to handle three-dimensional (3D) holograms with parallax and multitude sharing.Huang et al.[42]reported an encryption method based on virtual holography for 3D cube data. This method was used to generate holographic images of a 3D cube for computersimulated holography, based on which the proposed encryption process was carried out. Kim and Yoo [43] and Chen and Tsai [44]proposed a hierarchical encryption method for assembly entity models,in which different users could gain access to data from different parts of an assembly model file. Each level of the file was encrypted with different keys, and each key was only authorized for the use of the designated user.Researchers have also extended the concept of encryption to shape deformation[45–48].

    2.3. Attribute-based encryption

    Fuzzy identity-based encryption (i.e., ABE) is the most promising encryption primitive for supporting fine-grained access control[24].At present,ABE is mainly divided into two categories:CP-ABE[28] and key policy ABE (KP-ABE) [49]. In CP-ABE, ciphertext is associated with an access structure defined by the data owner,while keys are associated with attributes. On the contrary, in KPABE,ciphertext is associated with attributes while keys are associated with an access structure defined by the data owner. Both schemes are constructed in a single-file scenario.

    Hierarchical attribute-based solutions have been studied for multi-file scenarios. Miao et al. [25] introduced the idea of hierarchical data into attribute-based key searching in cloud computing.Wan et al.[26]proposed a hierarchical attribute-set-based encryption (HASBE) scheme built upon an attribute-set-based scheme in order to realize a more precise attributes-satisfaction policy in a multi-file scenario. However, the hierarchical access structure was too complex to apply the scheme for huge CAD models.Wang et al. [27] presented a file hierarchical CP-ABE (FH-CP-ABE), in which a loophole in the recursive formula for ciphertext components might lead to illegal access.

    2.4. Contributions

    For access-control authentication, this manuscript presents a novel ABE scheme for CAD assembly models, named the CAD assembly hierarchy file CP-ABE (CAD-CP-ABE) scheme. In the proposed technical method, a symmetrical encryption algorithm is utilized for plaintext encryption, and the CAD-CP-ABE scheme is used for content keys (CKs) management.

    Unlike existing CP-ABE techniques, the access structure of the upper nodes in the proposed scheme is more concise than that of the lower nodes.Thus,we redefine the node definition and submit a new set of generation rules in order to avoid excessive redundant nodes. In this way, the proposed method makes the hierarchical access structure assembly hierarchy access tree (AHAT)applicable to CAD assembly models. The AHAT contains file nodes, attribute nodes, and threshold nodes. The assembly ciphertext (ACT) file contains the AHAT and all ciphertext elements, and will be used by co-design users with legitimate access rights.

    For integrity verification, we propose an assembly Merkle tree(MT) technique after modification of the original MT, which can prevent CAD files from being illegally removed from or added to the cloud service. We also adopt a deformation-based technique to protect shape information. These two methods are combined together to enhance our approach.

    3. Problem formulation

    Before presenting our architecture(Section 4),we analyze information security problems regarding design chain management(DCM) and collaborative design [38,50–52]. A typical DCM collaboration model is discussed in Ref.[50].The model establishes six levels for collaboration. Collaboration problems include trusting communication, negotiation, and authority distribution.

    In a cloud-based collaboration process, collaborators not only have to negotiate with others, but also have to deal with security problems. Therefore, authentication, integrity, and information privacy are key aspects of information sharing.

    Based on the above analysis, we formally define our problems and then indicate our design goals.

    3.1. Threat model

    The proposed architecture involves four entities: the data owner, data users, authority, and CSP. The data owner is trusted,and the data users are authorized by the authority and are collaborated. The authority is a completely trusted entity that is in charge of generating and distributing public and secret keys(SKs). The CSP is a semi-trusted outsourcing entity in cloud systems; therefore, ①the data could be illegally accessed, and/or②the cloud services may deviate from the prescribed protocols and mount a data integrity attack. To enforce the confidentiality of information and hierarchy access control, the data owner first deforms the private features of the CAD models and then encrypts the data files with an attribute-based access policy before outsourcing the data files into the CSP.To decrypt the data files shared from various data owners,a data user submits her attributes to the authority in order to obtain her SK.

    3.2. Design goals

    The proposed approach aims to achieve the following functions and security goals:

    ?Authentication.Each CAD model data file should be accessed through valid access privileges. Our approach ensures that plaintext data cannot be revealed. An adversary cannot learn any useful information from the ACT file. In addition to achieving authorization, we ensure that upper-level privileged users have access to all their lower level privileged user files.

    ? Integrity. A CAD assembly model is usually composed of a group of data files. It is necessary to ensure that none of the files of the model are tampered with,added,or deleted.With ABE, the plaintext of files can be completely hidden. This integrity ensures that the fixed-tree structure of the CAD model is not tampered with by the CSP or by malicious visitors through assembly MT technology.

    ?Confidentiality.Since confidential information is shared with the collaborators,who may be potential competitors,information leakage may occur. This problem is solved by deforming the sketches of CAD models before sharing them.

    3.3. Preliminaries

    Bilinear maps:Let p be a prime number,G0and GTbe two multiplicative groups of integers modulo p. The generator of G0is g.

    Bilinear mapping e: G0× G0→GTsatisfies the following properties:

    ? Bilinearity: For any u,v ∈G0and a,b ∈Zp, Zp= {0, 1, 2, ...,p–1}, it has e(ua,vb)=e(u,v)ab.

    ? Non-degeneracy: There exist u,v ∈G0, such that e(u,v)≠1.

    ?Computability:For all u,v ∈G0,there is an efficient computation e(u,v).

    Definition 1: Bilinear Diffie-Hellman (BDH) generator. For a random algorithm Γ with a security parameter k (k > 0) as input,the BDH generator outputs the description of two groups, G0and GT,and common prime order p.Furthermore,if a bilinear mapping e, G0× G0→GT, can be effectively calculated in the polynomial time of k, the algorithm is called as a BDH parameter generator.

    Definition 2:Determinant BDH(DBDH)problem.Let G0,GT,and e be the outputs of the parameter generator Γ in Definition 1, and then let g be the generator of group G0. The DBDH problem is defined as follows: Given (in which the random elements a,b,c ∈Zp,T ∈GT), determine whether the equation e(g,g)abc=T established is valid.

    MT: In computer science, a hash tree is a tree-like data structure, also known as an MT [53]. As shown in Fig. 1, each leaf node uses the hash of itself as its label (e.g., H3 = hash(A)), while the non-leaf node uses the encrypted hashes of its sub-node labels as its label. An MT can validate the content of a large data structure with the following characteristics:

    ?The MT is a tree structure that possesses all the tree structure features.

    ? Without checking all the entire dataset, it can be concisely proved whether a datum belongs to a data group or not.

    ? The hash of each node in the MT will prove the integrity and correctness of the data content.

    4. Overview of the proposed approach

    4.1. System architecture

    Fig. 2 illustrates the system architecture of our approach for CBDM.

    Authority:The authority is a completely trusted entity that can verify the identity attributes of the users.

    Data owner:The data owner will store and share a CAD assembly model through CSP. This entity is in charge of creating an assembly MT and an AHAT, deforming sketches, and executing encryption functions. It uploads one model’s encrypted files, an ACT file, and an assembly MT to the CSP.

    User: The user will download the ACT file and all or parts of encrypted files from one cloud server (B). Cloud server B executes decryption functions.The user will verify the structural integrity of the downloaded files with another cloud server (A).

    CSP:The CSP is a semi-trusted outsourcing entity that provides ciphertext storage and transmission services.

    4.2. The building blocks of the proposed approach

    A secure co-design for CAD assembly models involves three building blocks: the assembly MT, deform-based protection, and the CAD-CP-ABE scheme.

    As shown in Figs. 3(a) and (b), an assembly, Assem02, has a fixed structure that can be presented abstractly as a tree graph.Each component (a collective name for the parts and assemblies)becomes a node of this tree graph.

    We build an assembly MT to support integrity verification, as shown in Fig. 3. There are two kinds of nodes in the assembly MT.Part(leaf)nodes are represented as[identity(Id),value]pairs,where the value is the hash of the leaf file calculated by a collisionresistant hash function (e.g., message digest algorithm 5 (MD5)and secure hash algorithm (SHA)). Assembly (non-leaf) nodes are represented as [Id, value1, value2] pairs, where value1 is equal to its hash value and value2 is equal to the hash value of the string that is sequentially connected by all the children’s hashes.

    Fig. 1. An example of an MT. A, B, C, and D are four files needed to be encrypted by MT; H0, H1, H2, H3, H4, H5, and H6 are labels of nodes in MT.

    Fig.2. The architecture of the proposed approach for a CBDM assembly MT.A,B,C,D,and R are five files of M.M0:original CAD assembly model;M:deformed CAD assembly model; M′: ciphertext for M; Id: identity of each file node in assembly MT.

    Fig.3. An illustrative example of Assem02.(a)An assembly structure of Assem02 in SolidWorks;(b)an abstract structure tree of Assem02;(c)the assembly MT of Assem02.

    When a user can access all the files of Assem6 with privilege and submits the Id Assem6-1 to the CSP,the contents of the correct hash value file produced by the cloud should be: [Assen6-1, H4,hash(H1 + H2)]; [Part004-1, H1]; and [Part003-1, H2], as shown in Fig. 3(c). The user will compute the hashes of the downloaded files and compare them with the received hashes. If the files have been modified or the structure has been destroyed,these problems can easily be found by the user.

    4.2.1. Deformation-based protection

    Typical CAD models consist of various features {Fi} (a set of model features), as shown in Fig. 4(a). Features are created based on a series of constraints and sketches {Si} (a set of sketches of model features), both of which determine the model shapes. If the deformation method is applied to both the features and the benchmarks, the validity of the CAD models will be affected. We adopt a sketch-based deformation method to hide the confidential information of the CAD models. A sketch Siis composed of sketch elements and constraint elements.Each sketch Sihas sketch points denoted as (xi,1, xi,2) or (xi,1, xi,2, xi,3) and will be synthesized into a sketch matrix SM.

    We use a transformation matrix TMto realize parametric deformation. After choosing the parameters of matrix TM, we gradually increase the value of n from 0 until the sketches’ deformation by TMwill not destroy the model constraints. A new sketch matrix,SM′, is obtained by multiplying SMby TM, as shown in Eq. (1).

    This deformation method is robust and flexible for CAD models,because sketches can be restored to the original shapes according to the encryption matrix TM, and CAD models can also be easily restored to their original states.

    The transformation matrixes for two-dimensional (2D) and 3D features are defined as follows:

    where ai,jmeans a decimal randomly selected between 0.9 and 1.1,η and λ are two coefficient satisfied 0 <η, λ < 1, and n is an integer increasing from 0.The deformation is explained in Fig.4.As shown in Fig. 4(a), Cyt-Extrude1 is a private feature that cannot be shared with others.We modify its Sketch4 with the transformation matrix to obtain a deformed Part003, as shown in Fig. 4(c).

    4.2.2. The CAD-CP-ABE scheme

    The proposed scheme for CKs management is based on the bilinear maps definition and a CP-ABE encryption policy.It consists of four functions: Setup, KeyGen, Encrypt, and Decrypt.

    (1) (PK, MSK) ←Setup(1k). This function inputs a security parameter k and a prime number p, and outputs public key (PK)and master SK (MSK).

    (2) (SK) ←KeyGen(PK, MSK, S). This function inputs PK, MSK,and a set of attributes of one user S,and generates a SK for the attributes set S.

    (3) (ACT) ←Encrypt(PK, CK, AT). This function inputs PK, the CKs, and a set of all attributes AT, and outputs ACT for CKs.

    (4) (cki(i ∈[1,num]))←Derypt(PK, ACT, SK). This function inputs PK, an ACT file, and the SK file of the user. SK is described by S. If S satisfies the access structure of the AHAT, some or all of the CKs,cki(i ∈[1,num]),can be decrypted.Then,the corresponding files mi(i ∈[1,num])will be decrypted with the corresponding CKs, cki, where num represents the number of all the CKs.

    4.3. System secure co-design process

    The secure co-design process comprises the following steps:

    (1) Deform private features: For a CAD assembly model M0owned by the data owner (D), the private shape features (Fi) of the components inside the assembly will be hidden using a deformation-based method. M0is transferred into a new CAD assembly model M before sharing.

    (2) Construct an assembly MT: The D will build an assembly MT, as shown in Fig. 3.

    (4)Share data files:The D will upload the assembly MT,the M′,and the CKs ACT file to the CSP. The assembly MT is stored separately on cloud server A. M′and ACT are stored on cloud server B.

    (5)Verify structural integrity:The co-design user(U)can send a set of files to the CSP,which stores the assembly MT in the cloud server with other shared files. This server will return a set of hash values for integrity verification.

    Fig. 4. An example of feature sketch deformation for Part003. (a) The FeatureManager of Part003 in SolidWorks; (b) the original Part003; (c) the deformed Part003.

    (6) Obtain plaintext: The U will send its identity attributes to the trusted authority to retrieve the SKs. Ciphertext elements in the ACT file are combined with SKs to evaluate the CK. Then the encrypted model files M′are decrypted with the CKs.

    5. Detailed process of the CAD-CP-ABE scheme

    5.1. Hierarchy access structure construction for the CAD-AP-ABE scheme

    The access structure T1 in Fig. 5(a) is based on a CP-ABE scheme to decrypt the source file m1. Each non-leaf node is a threshold node, and each leaf node is associated with attributes.The root node represents a source file. The threshold value is num1/num2, where num1 represents ‘‘the number of nodes that need to satisfy conditions” and num2 represents ‘‘the total number of children.”

    For a CAD assembly model structure, as shown in Fig. 5(b),nodes on a higher level would be accessed by fewer users. If attribute nodes are inserted into the model structure, repeated attribute nodes will increase the unnecessary overhead, as shown in Fig. 5(b). At the same time, a duplicate component node will also add overhead.

    Therefore, we specify the following rules to generate the AHAT in our scheme:

    (1) Extract the integrated assembly model structure for AHAT generation.

    (2) Divide the structure into component nodes and hidden nodes. As node 2 and node 3 represent the same attribute, if they have the same parent node 1, or if the parent of node 2 is the ancestor of node 3, set node 2 and its descendant nodes to be hidden nodes in the AHAT.

    (3)Insert attribute nodes and/or threshold nodes for each component from the assembly to construct the AHAT. In order to decrease the complexity of the AHAT, it is necessary to prune the attribute structures. If any component node has the same access attribute structures as its parent/ancestor nodes, these attributes are cut off and the access structure is changed.

    The identity attributes are defined hierarchically, as follows:chief engineer, deputy chief engineer, project engineer,engineer,and assistant engineer.The corresponding attributes coll ection AT= {1,2,3,4,5}. For example, we list the three companies C1, C2, and C3 as company attributes and define their values as 6, 7, and 8, respectively. The total attributes set AT= {1,2,3,4,5,6,7,8}.

    As shown in Fig. 6, there is an AHAT that describes an access structure and contains several access levels. The terms and functions of the AHAT and nodes are as follows:

    (x, y): This binary denotes a non-hidden node in AHAT. The symbol x represents the node’s row (from the top to bottom),and y represents the node’s column (from left to right). For example, the binary of node Assem02 is (1, 1), the binary of node Part005-1 is (2, 1), and the binary of attribute 3 on level three is(3, 5) in Fig. 6.

    num(x,y): This denotes the number of non-hidden nodes in the children set of(x,y)in the AHAT.For example,num(2,2)=2 in Fig.6.

    k(x,y):This denotes the threshold value of a non-hidden node(x,y), where 0 < k(x,y)≤num(x,y). If (x, y) is a leaf node, k(x,y)= 1. For example, k(1,1)= k(2,2)= 2.

    parent(x, y): This represents the parent of node (x, y) in the AHAT. For example, parent(5, 1) = (4, 3) in Fig. 6.

    att(x,y):This denotes an attribute associated with the leaf node(x, y) in the AHAT.

    index(x, y): This returns a unique value associated with the node (x, y). The index values are uniquely assigned to the nodes in the AHAT in an arbitrary manner for a given key.

    Fig.5. An example of access structures in the CP-ABE scheme.(a)An example of an access structure tree.T1 is the access structure of m1.(b)The hierarchical access structure for Assem02 and Part004. Attri: attribute node.

    Fig.6. The AHAT that is the integrated hierarchical access structure of the assembly model.

    5.2. Encryption and decryption process of CKs

    For each component node that has component nodes as children, the data owner computes C(x,y),l, as shown in Eq. (7), where

    Decrypt(PK,ACT,SK).A user needs the PK and the SK described by S to decrypt ACT.

    For the leaf node (x, y), we define DecryptNode(ACT, SK, (x, y))as Eq. (9), where j = att(x, y), and if j ?S, DecryptNode(ACT, SK,(x, y)) = null.

    Because the random number siof component(x,y)is irrelevant with its parent’s random number,z cannot be the component node.

    Next,e(g,g)αsican be computed by means of Eq.(11),where i is the number of the component node (x, y).

    Because the parent file needs to use all the children files, (x, y)has access to decrypt all the children files.The F(x,y),lis the intermediate parameter of the decryption. We can compute F(x,y),lof component child l for component node(x,y)in the AHAT using Eq.(12).

    Finally, ckiis used to decrypt the corresponding file.

    5.3. Security proof for the CAD-CP-ABE scheme

    5.3.1. Security model

    In the proposed scheme, the SK for the user is associated with an attribute set, and the ACT is associated with the access structure. The security model of our scheme should resist the CPA.The CPA security game between the adversary, A1, and the challenger, B1, requires that A1 select the challenging structure AT*and can require all SK where SK does not satisfy AT*.

    (1) Initialization. A1 selects a challenging structure AT* and delivers it to B1.

    (2) Setup. B1 runs the Setup(1k) algorithm and sends PK to A1.

    (3) Query Phase 1. A1 selects a series of attribute sets S1,...,Sw, ?i ∈[1,w],Si?AT*to repeatedly query B1 for the SK. B1 answers these queries by running the KeyGen(PK, MSK, Si)algorithm.

    (4)Challenge.A1 selects two messages,m0and m1,which are of equal length, to be challenged. Then B1 randomly selects a bit μ ∈ {0,1} and encrypts mμ with access structure AT*. Finally, B1 gives the ciphertext ACT* to A1.

    (5) Query Phase 2. This is the same as Query Phase 1.

    Definition 3.The CAD-CP-ABE scheme is secure against the CPA if no probabilistic polynomial-time adversary A1 can win the security game.

    5.3.2. Security proof for the proposed scheme

    Theorem 1:Suppose the DBDH assumption holds in,then no polynomial adversary can selectively break the proposed scheme.

    5.4. Theoretical analysis

    Let Cebe the e operation (bilinear pairing). Suppose that |Aa| is the number of attribute nodes, Acis the set of component nodes that have component nodes as children, and Auis the attributes set of user U.

    There are k CKs, and each node in Accontains n component nodes as children. In the CAD-CP-ABE scheme, some attribute nodes of lower level component nodes are cut off in generating the AHAT. Thus, when the number of CKs is fixed, the encryption time is related to k, n|Ac|, and |Aa|.

    In our approach, |Au=2| is constant, which makes the decryption time independent of the leaf nodes. Suppose user U has privileges to access the root node. Because the minimum number of interior nodes satisfying a root access structure is two,there are just two attribute nodes.The root node is calculated as shown in Eq. (9). The decryption time is related to k and n|Ac|.

    Moreover, the size of the ACT can be obtained by Eq. (8), as shown in Table 1, where L is the length of elements Gi,i ∈{0,T}.

    6. Experiments

    6.1. Experimental simulation

    This approach executes two encryption processes: plaintext encryption and CKs encryption. For plaintext encryption, we use the advanced encryption system (AES) algorithm to encrypt and decrypt the assembly files. For CKs encryption, we implement the CAD-CP-ABE scheme of the CKs based on a Java pairing-based cryptography(JPBC)library[54].We use a Type A bilinear map.Type A pairings are constructed on the curve y2=x3+x over the field of Fq.This pairing is symmetrical,and the order r is some prime factor of q + 1. Type A needs two parameters rBits = 160. All results are the averages of 20 experiments.

    6.2. Experimental results

    As shown in Fig. 7, we use the AES algorithm to encrypt and transform an assembly format to a text format,and the decryption process is the reverse procedure of encryption. This experiment confirms the practicability of an encryption algorithm on the assembly files,where the encryption and decryption processes will not destroy the content integrity.

    As shown in Fig. 8(a), the generation time of SKs is approximately linear. Because some parameters of each experiment are newly selected, a slight computation error is caused in a linear relationship. We use method newElement() for Object Pairing to generate a SK. The time of this process is less than 2 s, and allprocesses are not greater than 50 s. We choose to use the method newRandomElement()to strengthen security in this process,which results in extra time cost.

    Table 1 Features of CAD-CP-ABE (CK= {ck1,...,ckk }).

    The encryption and decryption experimental results are presented in Figs. 8(b)–(d). As shown in Fig. 8(b), we assume that there are various leaf nodes with two hierarchy files. Based on the rules of AHAT generation, the number of leaf nodes in CADCP-ABE is equal to |Aa2| in CP-ABE. As shown in Fig. 8(c), there are various hierarchy files with fixed leaf nodes (N = 30). Figs.8(b) and (c) show that the results increasingly and approximately follow a linear relationship. Obviously, the number of leaf nodes has a greater impact on the time cost in CAD-CP-ABE.

    The decryption time of the CKs is counted from the root node.In our approach, just two leaf nodes need to be satisfied for the root node in CAD-CP-ABE and for each component node in CP-ABE.When a user U obtains its CK for file A, then U can derive CKs for all other component nodes under A layer by layer within the ACT file. The decryption time cost is only related to the number CKs,as shown in Fig. 8(d).

    The experiments demonstrate that the proposed scheme improves the encryption and decryption efficiency.

    7. Conclusion

    In this paper,we proposed a hierarchical assembly files-sharing approach to protect CAD models for outsourcing and co-design in the era of cloud-based design and manufacture. This approach combines an ABE scheme, structural integrity checking, and deformation-based shape protection for CAD assembly models.The simulation experiments demonstrated that the approach is feasible in terms of computation efficiency and flexibility.

    For future works, the first direction is to determine how to extend the shape encryption from sketch-based CAD part deformation to CAD assembly deformation.The second direction is to adopt multi-core computing techniques and optimization approaches[55–61] in order to accelerate the encryption and decryption for CAD big data. The third direction is to extend the proposed approach to other multimedia data [62–67]. Finally, we will integrate a searchable encryption scheme into the proposed approach [68,69].

    Fig. 7. An example of assembly file encryption and decryption with the AES algorithm.

    Fig.8. Experimental results of CKs encryption and decryption.(a)SKs generation time and all number of attributes;(b)encryption time cost for two CKs;(c)encryption time cost for 30 leaf nodes; (d) decryption time cost of all CKs from the root node.

    Acknowledgments

    The work is supported by the National Natural Science Foundation of China (62072348) and the Science and Technology Major Project of Hubei Province (Next-Generation AI Technologies;2019AEA170).

    Compliance with ethics guidelines

    Yueting Yang,Fazhi He,Soonhung Han,Yaqian Liang,and Yuan Cheng declare that they have no conflict of interest or financial conflicts to disclose.

    av有码第一页| 色视频在线一区二区三区| 捣出白浆h1v1| 亚洲精品国产av蜜桃| 男男h啪啪无遮挡| 七月丁香在线播放| 亚洲中文av在线| 国产日韩欧美在线精品| 国产爽快片一区二区三区| 免费在线观看日本一区| 爱豆传媒免费全集在线观看| 亚洲黑人精品在线| 97在线人人人人妻| 国产精品久久久久成人av| 丝袜人妻中文字幕| 熟女av电影| 97精品久久久久久久久久精品| 别揉我奶头~嗯~啊~动态视频 | 一级毛片女人18水好多 | 国产片特级美女逼逼视频| 国产男人的电影天堂91| 只有这里有精品99| 国产一区二区三区综合在线观看| 一级黄色大片毛片| 日日夜夜操网爽| 国产精品偷伦视频观看了| 欧美人与善性xxx| 九色亚洲精品在线播放| www.精华液| 18禁黄网站禁片午夜丰满| 久久av网站| 999久久久国产精品视频| 色视频在线一区二区三区| 美女主播在线视频| 久久人妻熟女aⅴ| 日韩精品免费视频一区二区三区| 亚洲精品一区蜜桃| 侵犯人妻中文字幕一二三四区| 天天躁日日躁夜夜躁夜夜| 高潮久久久久久久久久久不卡| 七月丁香在线播放| 欧美精品人与动牲交sv欧美| 赤兔流量卡办理| 在线观看免费高清a一片| 久久精品国产亚洲av涩爱| 91字幕亚洲| 精品一区二区三区av网在线观看 | 日韩熟女老妇一区二区性免费视频| 97在线人人人人妻| 一边摸一边抽搐一进一出视频| 国产视频首页在线观看| 熟女av电影| 国产欧美日韩一区二区三区在线| 欧美日韩视频精品一区| 啦啦啦啦在线视频资源| 亚洲色图综合在线观看| e午夜精品久久久久久久| 国产有黄有色有爽视频| 男人添女人高潮全过程视频| 自线自在国产av| 黑人欧美特级aaaaaa片| 制服诱惑二区| 大香蕉久久网| 老汉色∧v一级毛片| 久久 成人 亚洲| 1024视频免费在线观看| 精品亚洲成国产av| 色视频在线一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | 亚洲一码二码三码区别大吗| 亚洲成人国产一区在线观看 | 欧美xxⅹ黑人| www.自偷自拍.com| 亚洲五月色婷婷综合| 亚洲精品国产av成人精品| 大码成人一级视频| 又大又爽又粗| 欧美成人精品欧美一级黄| 秋霞在线观看毛片| 天堂8中文在线网| 国产国语露脸激情在线看| 亚洲精品一二三| 亚洲av在线观看美女高潮| 婷婷色综合www| 美女福利国产在线| av一本久久久久| 日本vs欧美在线观看视频| 久久性视频一级片| 婷婷色麻豆天堂久久| 亚洲专区中文字幕在线| 丰满少妇做爰视频| 精品一区二区三区av网在线观看 | 免费不卡黄色视频| 免费高清在线观看视频在线观看| 亚洲国产精品一区二区三区在线| 看免费成人av毛片| 1024香蕉在线观看| 成年动漫av网址| 啦啦啦啦在线视频资源| 妹子高潮喷水视频| 777久久人妻少妇嫩草av网站| 欧美日韩av久久| 天天躁日日躁夜夜躁夜夜| 黄色毛片三级朝国网站| 制服人妻中文乱码| 日韩伦理黄色片| 久久久国产精品麻豆| 涩涩av久久男人的天堂| 啦啦啦中文免费视频观看日本| 99精品久久久久人妻精品| 国产精品久久久人人做人人爽| 国产在视频线精品| 99久久99久久久精品蜜桃| 91老司机精品| 亚洲国产精品一区三区| 亚洲av电影在线观看一区二区三区| 两人在一起打扑克的视频| 亚洲人成电影免费在线| 最黄视频免费看| 一级片免费观看大全| 欧美精品一区二区大全| 大型av网站在线播放| 精品少妇黑人巨大在线播放| 精品一区二区三卡| 国产深夜福利视频在线观看| 精品亚洲成国产av| 老司机影院成人| 丰满人妻熟妇乱又伦精品不卡| 又大又黄又爽视频免费| 欧美精品人与动牲交sv欧美| 99国产综合亚洲精品| 国产熟女欧美一区二区| 18禁国产床啪视频网站| 麻豆乱淫一区二区| 91精品三级在线观看| 亚洲国产欧美日韩在线播放| 免费av中文字幕在线| 国产视频首页在线观看| 日日爽夜夜爽网站| 久久国产亚洲av麻豆专区| 色播在线永久视频| 50天的宝宝边吃奶边哭怎么回事| 国产成人啪精品午夜网站| 一级毛片电影观看| 一级片'在线观看视频| 久久午夜综合久久蜜桃| xxx大片免费视频| 黄片播放在线免费| 国产一区二区三区av在线| 黑丝袜美女国产一区| 久久鲁丝午夜福利片| 一二三四社区在线视频社区8| 免费在线观看完整版高清| videosex国产| 少妇被粗大的猛进出69影院| 999久久久国产精品视频| 亚洲国产欧美日韩在线播放| 国产精品国产三级国产专区5o| 中文乱码字字幕精品一区二区三区| 亚洲情色 制服丝袜| 日韩av免费高清视频| 欧美久久黑人一区二区| 高清不卡的av网站| 亚洲精品久久午夜乱码| 国产成人啪精品午夜网站| 国产精品欧美亚洲77777| 欧美久久黑人一区二区| 啦啦啦中文免费视频观看日本| 丰满迷人的少妇在线观看| 国产av国产精品国产| 国产精品一国产av| 国产免费现黄频在线看| 国产在线免费精品| 国产精品.久久久| 香蕉丝袜av| 亚洲av日韩在线播放| 最近中文字幕2019免费版| 精品国产一区二区三区久久久樱花| 午夜福利在线免费观看网站| 国产福利在线免费观看视频| 免费观看人在逋| a级毛片在线看网站| 欧美日韩视频精品一区| 国产成人欧美在线观看 | 欧美成狂野欧美在线观看| 后天国语完整版免费观看| 日本色播在线视频| 国产精品一区二区在线观看99| 免费女性裸体啪啪无遮挡网站| 国产成人系列免费观看| 亚洲欧美色中文字幕在线| 亚洲国产毛片av蜜桃av| 亚洲国产看品久久| 捣出白浆h1v1| 电影成人av| 亚洲av男天堂| 亚洲国产av影院在线观看| 一边亲一边摸免费视频| 国产人伦9x9x在线观看| 可以免费在线观看a视频的电影网站| 亚洲精品国产色婷婷电影| 国产一区二区 视频在线| 真人做人爱边吃奶动态| 国语对白做爰xxxⅹ性视频网站| 亚洲欧美清纯卡通| 国产亚洲av高清不卡| 国产精品免费视频内射| 美女国产高潮福利片在线看| 少妇 在线观看| 建设人人有责人人尽责人人享有的| 国产亚洲av片在线观看秒播厂| 91麻豆精品激情在线观看国产 | 黄色怎么调成土黄色| 国产成人精品久久二区二区免费| a级毛片黄视频| 亚洲一区中文字幕在线| 亚洲成人免费电影在线观看 | 90打野战视频偷拍视频| 亚洲av欧美aⅴ国产| 亚洲欧洲国产日韩| 在线av久久热| 啦啦啦中文免费视频观看日本| 美女国产高潮福利片在线看| 亚洲,欧美,日韩| netflix在线观看网站| 亚洲精品av麻豆狂野| 中文乱码字字幕精品一区二区三区| 丁香六月天网| 在线精品无人区一区二区三| 一级毛片黄色毛片免费观看视频| 国产福利在线免费观看视频| 免费高清在线观看视频在线观看| 女人精品久久久久毛片| 天堂8中文在线网| 2021少妇久久久久久久久久久| 亚洲欧美日韩另类电影网站| videos熟女内射| 久久亚洲精品不卡| 看十八女毛片水多多多| 男的添女的下面高潮视频| 一级,二级,三级黄色视频| 成年人黄色毛片网站| 欧美日韩精品网址| 国产成人影院久久av| 欧美黄色淫秽网站| www.熟女人妻精品国产| 欧美日韩视频高清一区二区三区二| 少妇猛男粗大的猛烈进出视频| 一本综合久久免费| 亚洲欧美中文字幕日韩二区| 亚洲精品国产av蜜桃| 国产一卡二卡三卡精品| 国产男女超爽视频在线观看| 欧美日韩国产mv在线观看视频| 国语对白做爰xxxⅹ性视频网站| 国产精品久久久久久精品古装| 亚洲精品久久成人aⅴ小说| 女性生殖器流出的白浆| 天天躁夜夜躁狠狠久久av| 中文字幕人妻熟女乱码| 搡老乐熟女国产| 一级毛片我不卡| 午夜福利视频精品| 欧美日韩黄片免| 久久狼人影院| 美女脱内裤让男人舔精品视频| 久9热在线精品视频| √禁漫天堂资源中文www| 婷婷色综合www| av线在线观看网站| 久久亚洲国产成人精品v| 国产免费福利视频在线观看| 中文字幕亚洲精品专区| 国产成人系列免费观看| 免费久久久久久久精品成人欧美视频| 国产成人一区二区三区免费视频网站 | 亚洲av在线观看美女高潮| 久久鲁丝午夜福利片| 国产精品一国产av| 亚洲激情五月婷婷啪啪| 色综合欧美亚洲国产小说| 91精品伊人久久大香线蕉| 亚洲图色成人| 亚洲中文av在线| 亚洲激情五月婷婷啪啪| 国产精品 欧美亚洲| 不卡av一区二区三区| 国产在线一区二区三区精| 亚洲av电影在线进入| 91国产中文字幕| 黑人猛操日本美女一级片| 国产片特级美女逼逼视频| 中文字幕亚洲精品专区| 欧美激情 高清一区二区三区| 色精品久久人妻99蜜桃| 国产精品免费大片| 欧美精品亚洲一区二区| 久久国产精品男人的天堂亚洲| 大话2 男鬼变身卡| 亚洲av男天堂| 欧美 亚洲 国产 日韩一| 日本91视频免费播放| 99精国产麻豆久久婷婷| 国产麻豆69| 国产av国产精品国产| 97人妻天天添夜夜摸| 少妇粗大呻吟视频| 国产精品久久久av美女十八| 免费在线观看完整版高清| 亚洲九九香蕉| 国产精品成人在线| 精品久久久久久电影网| 搡老乐熟女国产| 免费日韩欧美在线观看| 妹子高潮喷水视频| 午夜福利视频在线观看免费| a级片在线免费高清观看视频| 女人久久www免费人成看片| 99精国产麻豆久久婷婷| 最黄视频免费看| 男女国产视频网站| 午夜两性在线视频| 人人妻人人爽人人添夜夜欢视频| 国产精品成人在线| 色播在线永久视频| 丁香六月天网| 免费女性裸体啪啪无遮挡网站| 麻豆国产av国片精品| 国产一区二区 视频在线| 在线亚洲精品国产二区图片欧美| 亚洲人成77777在线视频| 免费在线观看黄色视频的| 啦啦啦在线免费观看视频4| 91字幕亚洲| 看免费成人av毛片| 嫁个100分男人电影在线观看 | a级毛片黄视频| 国产淫语在线视频| 国产精品久久久久久人妻精品电影 | 久久精品久久久久久久性| 一二三四社区在线视频社区8| 99热国产这里只有精品6| 色播在线永久视频| 精品亚洲乱码少妇综合久久| 国产女主播在线喷水免费视频网站| 亚洲成国产人片在线观看| 日日爽夜夜爽网站| 亚洲欧美激情在线| 国产人伦9x9x在线观看| 午夜日韩欧美国产| 女人高潮潮喷娇喘18禁视频| 成年人免费黄色播放视频| 人人妻人人澡人人看| netflix在线观看网站| 国产精品久久久av美女十八| 国产亚洲精品久久久久5区| 国产精品 欧美亚洲| 国产黄色视频一区二区在线观看| 成人午夜精彩视频在线观看| 人成视频在线观看免费观看| 婷婷丁香在线五月| 欧美性长视频在线观看| 国产真人三级小视频在线观看| 99国产精品一区二区蜜桃av | 日韩制服骚丝袜av| 亚洲精品久久午夜乱码| 韩国高清视频一区二区三区| 欧美老熟妇乱子伦牲交| 国产成人影院久久av| 国产成人免费无遮挡视频| 国产精品麻豆人妻色哟哟久久| 亚洲精品美女久久久久99蜜臀 | 欧美精品亚洲一区二区| 极品少妇高潮喷水抽搐| 久久鲁丝午夜福利片| 欧美亚洲 丝袜 人妻 在线| 桃花免费在线播放| 久久精品久久精品一区二区三区| 2021少妇久久久久久久久久久| 亚洲视频免费观看视频| 丝袜美腿诱惑在线| 自拍欧美九色日韩亚洲蝌蚪91| 女性被躁到高潮视频| 午夜免费男女啪啪视频观看| 狠狠婷婷综合久久久久久88av| 国产成人啪精品午夜网站| 秋霞在线观看毛片| 亚洲精品美女久久av网站| 最黄视频免费看| 少妇猛男粗大的猛烈进出视频| 新久久久久国产一级毛片| 一级毛片黄色毛片免费观看视频| 精品久久蜜臀av无| 亚洲精品一卡2卡三卡4卡5卡 | 欧美日韩av久久| 人妻一区二区av| 99香蕉大伊视频| 在线 av 中文字幕| 国产欧美日韩一区二区三 | 99re6热这里在线精品视频| 欧美黄色淫秽网站| 亚洲情色 制服丝袜| 成人三级做爰电影| 又紧又爽又黄一区二区| 黄色视频不卡| av一本久久久久| 女人高潮潮喷娇喘18禁视频| 欧美日韩成人在线一区二区| 丁香六月欧美| 国产淫语在线视频| 日本vs欧美在线观看视频| 麻豆乱淫一区二区| 波多野结衣av一区二区av| 国产不卡av网站在线观看| 国产黄色免费在线视频| 精品国产国语对白av| 国产欧美日韩一区二区三 | 丝袜喷水一区| 欧美成狂野欧美在线观看| av不卡在线播放| 91精品三级在线观看| 大片电影免费在线观看免费| 国产成人欧美| 你懂的网址亚洲精品在线观看| 一级毛片电影观看| 好男人电影高清在线观看| 纵有疾风起免费观看全集完整版| 丰满迷人的少妇在线观看| av天堂在线播放| 婷婷色麻豆天堂久久| 真人做人爱边吃奶动态| 久久久欧美国产精品| 桃花免费在线播放| 国产精品国产三级国产专区5o| 国产高清不卡午夜福利| 欧美日韩视频高清一区二区三区二| 亚洲国产毛片av蜜桃av| 久久精品久久久久久噜噜老黄| 欧美乱码精品一区二区三区| 97在线人人人人妻| 久久久亚洲精品成人影院| 国产成人免费无遮挡视频| 国产成人系列免费观看| 日韩大码丰满熟妇| 十分钟在线观看高清视频www| a级毛片黄视频| 波多野结衣av一区二区av| 一级毛片黄色毛片免费观看视频| 在线观看国产h片| 亚洲国产精品国产精品| 老鸭窝网址在线观看| 久久久久久久久免费视频了| 国产精品麻豆人妻色哟哟久久| 亚洲一区中文字幕在线| av在线app专区| 母亲3免费完整高清在线观看| 搡老乐熟女国产| 乱人伦中国视频| 中国美女看黄片| 婷婷色综合www| 亚洲国产日韩一区二区| 婷婷丁香在线五月| 久久人人97超碰香蕉20202| 18在线观看网站| 我要看黄色一级片免费的| 日韩,欧美,国产一区二区三区| 啦啦啦在线观看免费高清www| 国产精品久久久久久人妻精品电影 | 丝袜美足系列| tube8黄色片| 午夜av观看不卡| 又黄又粗又硬又大视频| 亚洲,欧美,日韩| 爱豆传媒免费全集在线观看| 久久久精品区二区三区| 成在线人永久免费视频| 久久ye,这里只有精品| 乱人伦中国视频| 最新的欧美精品一区二区| 午夜日韩欧美国产| 十八禁网站网址无遮挡| 在线观看国产h片| h视频一区二区三区| 少妇人妻久久综合中文| 狠狠精品人妻久久久久久综合| 麻豆av在线久日| 咕卡用的链子| 成年人免费黄色播放视频| 久久久久国产一级毛片高清牌| 亚洲中文字幕日韩| 国产熟女欧美一区二区| 久久久久精品国产欧美久久久 | 亚洲欧洲日产国产| 亚洲专区中文字幕在线| 亚洲国产精品一区二区三区在线| 精品第一国产精品| av在线老鸭窝| 青草久久国产| 又黄又粗又硬又大视频| 国产欧美日韩精品亚洲av| 少妇的丰满在线观看| 蜜桃国产av成人99| 欧美在线一区亚洲| 国产1区2区3区精品| 国产真人三级小视频在线观看| 国产熟女午夜一区二区三区| 99国产精品一区二区三区| 日韩,欧美,国产一区二区三区| av网站在线播放免费| 男人舔女人的私密视频| 婷婷色麻豆天堂久久| 一本综合久久免费| 久久亚洲国产成人精品v| 国产成人91sexporn| 激情视频va一区二区三区| 亚洲国产精品一区二区三区在线| 欧美国产精品va在线观看不卡| 日韩,欧美,国产一区二区三区| 日本猛色少妇xxxxx猛交久久| 亚洲专区中文字幕在线| 亚洲一区二区三区欧美精品| 欧美日韩国产mv在线观看视频| 久久亚洲国产成人精品v| 91麻豆av在线| 18禁观看日本| 制服诱惑二区| 午夜两性在线视频| 日韩人妻精品一区2区三区| 女人爽到高潮嗷嗷叫在线视频| 19禁男女啪啪无遮挡网站| 天堂8中文在线网| 赤兔流量卡办理| 日韩中文字幕视频在线看片| 老司机靠b影院| 色精品久久人妻99蜜桃| 99国产精品一区二区三区| 最近中文字幕2019免费版| 亚洲色图综合在线观看| 人人妻人人爽人人添夜夜欢视频| 欧美大码av| 男女无遮挡免费网站观看| 成人三级做爰电影| 日韩 欧美 亚洲 中文字幕| 少妇的丰满在线观看| 天天影视国产精品| 国产麻豆69| 999久久久国产精品视频| 亚洲精品日韩在线中文字幕| 亚洲欧美一区二区三区国产| 亚洲一码二码三码区别大吗| 国产精品熟女久久久久浪| 性高湖久久久久久久久免费观看| 国精品久久久久久国模美| 91精品三级在线观看| 男女国产视频网站| 久久亚洲精品不卡| 国产亚洲午夜精品一区二区久久| videos熟女内射| 七月丁香在线播放| 丝瓜视频免费看黄片| 国产精品偷伦视频观看了| 亚洲自偷自拍图片 自拍| 成在线人永久免费视频| 午夜免费鲁丝| 亚洲精品一二三| 少妇的丰满在线观看| 免费黄频网站在线观看国产| 欧美日韩视频精品一区| 国产高清视频在线播放一区 | 久久天躁狠狠躁夜夜2o2o | 国产熟女欧美一区二区| 一本久久精品| 九草在线视频观看| 两个人看的免费小视频| 免费看不卡的av| 搡老乐熟女国产| 熟女av电影| 50天的宝宝边吃奶边哭怎么回事| 亚洲久久久国产精品| 搡老乐熟女国产| 欧美老熟妇乱子伦牲交| 久久久久精品国产欧美久久久 | 手机成人av网站| 精品福利永久在线观看| 久久久久国产精品人妻一区二区| 国产黄色免费在线视频| 欧美亚洲日本最大视频资源| 如日韩欧美国产精品一区二区三区| 黄网站色视频无遮挡免费观看| 这个男人来自地球电影免费观看| 欧美性长视频在线观看| 美女脱内裤让男人舔精品视频| 欧美日韩国产mv在线观看视频| 男女之事视频高清在线观看 | 丝袜喷水一区| 国产一区亚洲一区在线观看| 国产淫语在线视频| 男女国产视频网站| 亚洲第一青青草原| 黄片播放在线免费| 国产伦理片在线播放av一区| 国产人伦9x9x在线观看| 国产不卡av网站在线观看| 欧美大码av| 午夜福利,免费看| 精品一区二区三区av网在线观看 | 久久99精品国语久久久| 亚洲欧美精品综合一区二区三区| 天天躁夜夜躁狠狠久久av| 97精品久久久久久久久久精品| 国产福利在线免费观看视频| 少妇 在线观看| 成人手机av| 狠狠精品人妻久久久久久综合| 极品人妻少妇av视频|