• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Mode of Operation for Modification,Insertion,and Deletion of Encrypted Data

    2022-11-10 02:28:18TaekYoungYounandNamSuJho
    Computers Materials&Continua 2022年10期

    Taek-Young Youn and Nam-Su Jho

    1Dankook University,Yongin,Gyeonggi,16890,Korea

    2Electronics and Telecommunications Research Institute,Daejeon,34129,Korea

    Abstract:Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services that were difficult to provide in the past.One of the services made possible through this change is cloud-based collaboration.In order to support secure collaboration over cloud,encryption technology to securely manage dynamic data is essential.However,since the existing encryption technology is not suitable for encryption of dynamic data,a new technology that can provide encryption for dynamic data is required for secure cloudbased collaboration.In this paper,we propose a new encryption technology to support secure collaboration for dynamic data in the cloud.Specifically,we propose an encryption operation mode which can support data updates such as modification,addition,and deletion of encrypted data in an encrypted state.To support the dynamic update of encrypted data,we invent a new mode of operation technique named linked-block cipher (LBC).Basic idea of our work is to use an updatable random value so-called link to link two encrypted blocks.Due to the use of updatable random link values,we can modify,insert,and delete an encrypted data without decrypt it.

    Keywords:Data encryption;cloud-based collaboration;dynamic data update

    1 Introduction

    Cloud is a technology that can provide various additional services by allowing users to store data in remote storage and use it anywhere[1,2].With the outbreak of COVID-19,the way of life has changed dramatically.Many of the activities that were conducted face-to-face have been converted to non-faceto-face methods,and accordingly,the demand for technologies suitable for the new environment has increased.Cloud service is a technology specialized for such a non-face-to-face environment,enabling data sharing and collaboration between physically separated users.Until now,a number of researches have been done for the security of cloud-based services[1,2].Moreover,a number of works focus on the confidentiality,integrity,and availability of data stored in remote cloud storages[3-6].Some works tried to support users to entrusted some important operations to a cloud server[7].

    Many services are being provided in the cloud environment,and services for providing collaboration between users in the cloud environment are also increasing.For example,some service such as the overleaf provides collaborative paper work between researchers online.In particular,papers written or edited by users are reflected in real time and shared between users,so the service enables stable real-time collaboration.For detailed explanation regarding the service,refer to the web-site “www.overleaf.com”.

    While the importance of collaboration provided in the cloud environment is growing,technology for providing secure collaboration in current services has not been sufficiently researched and developed.The security technology,currently being applied to the cloud-based collaboration service,stores plaintext data in the server,and each client establishes a secure channel with the server to share update information with other collaborators.The current strategy for secure collaboration over cloud server with encryption can be seen in Fig.1.

    Figure 1:Secure collaboration over cloud server with encrypted channel

    As seen in Fig.1,collaborators can share the same data by the help of the cloud server.Since all communication channels between the server and collaborators are protected by encrypting communicating messages,we can expect secure collaboration if we consider outside adversaries who only can see encrypted communicating messages.But,if we consider the existence of inside adversaries who can see stored data,the current countermeasure cannot guarantee the security of the collaboration.For example,the cloud server could be a malicious-but-curious adversary,which means that the server can exploit high-value collaboration data for its own benefit.

    To solve the above described threat against collaboration over cloud environment,it seems inevitable to encrypt data stored in the cloud.So,for secure collaboration,we need a way to encrypt a data for collaboration.For collaboration,an encryption technique should support dynamic data updates,and it is the main goal of this work to give a possible candidate that can permit us to perform secure collaboration by supporting dynamic data updates.Though a number of studies aimed to support dynamic data update operations[8-10],they are not interested in the dynamic update of encrypted data.In this work,we will give a new encryption method for secure collaboration with encrypted dynamic data stored in the remote cloud storage.Specific goal of our research is to design a mode of operation suitable for dynamic data so that the mode can support data updates such as modification,addition,and deletion in an encrypted form.Our strategy to achieve the goal is to use random values.Each random value is used to link two adjacent encrypted blocks.In our construction,the random values are updatable,and so we can update encrypted data by updating link values.Concrete construction can be seen in the following sections.Note that the main contribution of our study is to propose a new mode of operation which can support update operations for encrypted data,and our work is the first approach for secure collaboration with updatable encrypted data,in the literature.

    2 Related Works

    In cryptography,to design secure mode of operations is one of fundamental research topic.In this research direction,it is the most important requirement how to repeatedly apply a cipher’s singleblock operation to securely encrypt data which are larger than a block.Though a number of mode of operations have been studied,none of them are designed to encrypt dynamic data.

    For security and functionality,error propagation properties of encryption modes have been studied considering various scenarios of data modification.However,the use of dynamic data is not included in the scenarios.Recently,many modes of operation techniques are newly devised,they focus on the way of supporting confidentiality and authenticity in an efficient way,and are known as authenticated encryption modes.

    Though a number of techniques have been to support stronger security and better efficiency,none of them are interested in the encryption of dynamic data.By using existing mode of operations,we may support dynamic data by decrypting an encrypted data,updating the data according to required modifications,and encrypting it again.However,it requires cost operations when the data is frequently modified.So,based on the above (brief) remind about related works,we can say that there is no encryption scheme supporting dynamic update in an encrypted form.

    From now on,we will briefly review existing mode of operations in terms of dynamic update of encrypted data.Three main functions required for dynamic data are modification,insertion,and deletion.So,we will analyze existing techniques in the viewpoint of the encryption of dynamic data,i.e.,the possibility of supporting update operations will be the main goal of our analysis.

    There are two kinds of mode of operations.In the first case,mode of operations can support blockwise encryption in the sense that the encryption of a block is not influenced by any other plaintext or ciphertext.Two modes,electronic codebook(ECB)mode and counter(CTR)mode which can be seen in Fig.2,belong to the first case.The other case includes many mode of operations in which encryption(or decryption)of a plaintext block(or a ciphertext block)is influenced by other blocks.One of representative mode of operation belong to the second case is the cipher block chaining(CBC)mode which works as seen in Fig.2.Mode of operations belong to the second case are not suitable for dynamic update since the update of single block influence on many blocks.As seen in Fig.3,two ciphertext blocks should be updated to update one plaintext block.The property is also known as error-propagation though it was not defined to describe the change for updates.It is easy to see that block-wise encryption methods are suitable for dynamic updates since the modification of one block influences on many blocks in the second case.

    Figure 2:Existing mode of operations

    Figure 3:Impact of update in CBC mode

    3 Preliminaries

    In this section,we describe some basic concepts and definitions.

    3.1 System Model

    In order to provide secure collaboration on encrypted data in a cloud environment,key management technology for securely distributing and managing the secret key shared by collaborators or access right management technology for identifying legitimate users is also required.This may require additional system members.However,in this paper,we focus on the problem of storing encrypted data in a cloud server and providing dynamic data update operations for the stored data.

    Since we are considering a cloud-based collaboration scenario,the system model consists of a cloud server Srv and a number of collaborators Clts.Each system member has the following roles:

    ?Server.In order to provide continuous collaboration in an online environment,the server Srv must have the latest version of the data.The update status of data generated through collaboration should always be shared through the server.For secure data access right management,the server must have information that can verify users who are allowed to access data.Since the issue of access control of legitimate users is not dealt with,we assume that secure access control is provided by the server.

    ?User.Users participating in a collaboration are considered to be sharing a secret key to access the data they collaborate on.Data stored in the cloud must be encrypted,and assuming a shared key among collaborators is an essential part in order to be able to access encrypted data.Users must download the latest version stored in the cloud server at the time of participating in collaboration,and data updates that occur in the middle must be shared to the cloud server in real time.All updates are delivered by the server to collaborating users in real time.Each user proceeds according to the latest version delivered by the server.

    3.2 Requirements

    From now,we will summarize functional requirements and security requirements for our technique.Before describing the requirements,I would like to note that the technique proposed in this paper is designed to support collaboration with dynamically updated data based on a cloud environment.

    3.2.1 Functional Requirements

    In order to support real-time collaboration in a cloud environment,it should be possible to update data stored in the cloud and provided to collaboration participants.The most important factor is to provide data updates in an environment where data is stored in an encrypted form for security.That is,technically,it is the most important requirement to provide data encryption technology that can support all update operations for an encrypted data without decryption.

    3.2.2 Security Requirements

    Since the goal of the proposed technique is to support dynamic update for encrypted data,we assume that a data is stored in a remote storage server in an encrypted form.So,basically,the main security requirement for our scheme is the confidentiality.Differently from ordinary encryption techniques,our technique designed to support dynamic modifications,and so we expect reliability for update operations.

    3.3 Security Model

    Differently from existing mode of operations for block ciphers,our scheme considers dynamic data which should be changed according to users’modifications.In ordinary block cipher operation modes,static data is encrypted which means that an adversary cannot obtain two different ciphertexts for similar plaintexts.On the contrary,for dynamic data,an adversary can obtain two different ciphertexts of two similar plaintexts.For example,suppose that one block of a file F is modified to F′such that

    F =m1||...||mi||...||mnand F′=m1||...||mi′||...||mn

    where miis not equal to mi′.Then,the adversary can obtain two different ciphertexts C =DyEnc(F)and C′=DyEnc(F′)where DyEnc is an encryption function for dynamic data.

    To give formal definition for the security of the proposed scheme,we define an encryption scheme supporting dynamic encryption.From now,we call the encryption scheme as dynamic encryption scheme.

    Definition 1.(Dynamic Encryption Scheme)A dynamic encryption scheme is a collection of four polynomial-time algorithms DyEnc={KeyGen,DyEnc,DyDec,Update}such that,

    - KeyGen(λ):For given a security parameter λ,the key generation algorithm returns a secret key sk.Some case,the secret key is a set of secret values.

    - DyEnc(sk,M):Let M be a message which is given for encryption.Then the algorithm encrypts M using a secret key sk and returns C as the corresponding ciphertext.

    - DyDec(sk,C):For given a ciphertext C,the decryption algorithm uses a secret key sk to recover the message M from the ciphertext.

    - Update(sk,C,Q):According to the update query Q,the algorithm modifies the ciphertext C in an encrypted form.i.e.,the algorithm updates the ciphertext without decrypting the full ciphertext.

    In the above definition,Update is the most important algorithm for dynamic encryption schemes since managing dynamically modified file is the main goal of dynamic encryption schemes.In the definition of Update,the query Q includes the type of update query,required data for update,and(optional)state information such as the version of the file.

    The confidentiality is a traditional requirement for encryption schemes since to prevent any adversary from extracting meaningful information from a target ciphertext.The integrity considered in this paper is slightly different from ordinary integrity.We are interested in‘version integrity’of our scheme in the sense that an adversary may try to generate a valid encrypted data even if the adversary cannot extract any information from the encrypted data.So,we will call the feature as the versionintegrity.The security notion is needed since our scheme support dynamic update of encrypted data without decrypting it.Based on the above reasons,formally,we can define the security of our mode of operation supporting dynamic update as following.The first definition captures the confidentiality of a dynamic encryption.

    Definition 2.(Confidentiality of Dynamic Encryption) Let DyEnc(sk,M) be an encryption algorithm supporting dynamic updates.We define the confidentiality for dynamic encryption as similar to the confidentiality of traditional encryption algorithms.For details we consider the following game:

    Ind-CCA-DyEnc(sk,A,λ)

    - (M0,M1)←A1OE(sk),OD(sk),OU(sk)(λ),where|M0|=|M1|

    - i ←random coin toss

    - C=DyEnc(sk,Mi)

    - i′=A2OE(sk),OD(sk),OU(sk)(C,M0,M1,λ)

    - if i=i′then output 1(the adversary wins the game)

    Here the adversary is defined as a tuple of polynomial-time algorithms(A1,A2).A1is an algorithm that chooses target plaintexts by viewing several sample plaintext-ciphertext pairs which are generated by DyEnc and the secret key sk.We denote encryption oracle,decryption oracle,and update oracle with the secret key sk as OE(sk),OD(sk),OU(sk),respectively.And the second algorithm A2is an algorithm that determines which plaintext is corresponding to the given ciphertext.Finally,we define the advantage of the adversary as

    AdvA=(A1,A2)=Pr[Ind-CCA-DyEnc(sk,λ)=1]-1/2,

    where sk is a randomly chosen secret key on uniformly distributed key space.Without loss of generality,DyEnc satisfies the confidentiality if there is no polynomial-time algorithm A=(A1,A2),of which the advantage is negligible.

    Definition 3.(Integrity of Dynamic Encryption)We define the integrity of our scheme considering the usage that there are multiple users collaborating on the same file.With the integrity,we need to guarantee that the file is not modified by an unprivileged user,the adversary.Therefore,we define the integrity as the following:If there is no polynomial-time adversary which can modify or create proper ciphertexts without a secret key,then the dynamic encryption algorithm satisfies the integrity.

    4 Proposed Method

    4.1 Basic Idea

    The basic idea of our construction is inspired by chains used in everyday life,and the intuitive concept of the idea is described in Fig.4.Compared with existing techniques,our technique is designed to provide encryption for dynamic data instead of supporting the optimal ratio of ciphertext to plaintext.In existing encryption techniques,one ciphertext block is generated for one plaintext block,but in our construction,we need redundant value for making link between two blocks as seen in Fig.4.The redundant value is named Link in the figure.In other words,lb-lLis the size of a plaintext in a block where lbis the size of block for the underlying encryption scheme and lLis the size of a

    Link.

    For update,we can change encrypted data as seen in Fig.4.For modification,deletion,and insertion,refer B-1,B-2,and B-3 in Fig.4.For example,when a data block,Data 3,is modified to Data 7,two links for the block are updated as seen in the figure.It will be easy to understand how the data and links are changed by looking at the specific encryption procedure in the following section.

    4.2 Description

    Here,we will describe detailed algorithms for our dynamic encryption scheme.According to formal definition of a dynamic encryption,we have the following four algorithms:KeyGen,DyEnc,DyDec,and Update.

    4.2.1 Key Generation

    For encryption,we choose and use a secret key sk.We use the following parameters for our construction.Let lbbe the size of a block defined by the underlying block cipher.Let lLbe the size of link values used for linking two data blocks.

    Figure 4:Update operations

    4.2.2 Encryption

    Note that,for our dynamic encryption scheme,we use a secure encryption algorithmEnc(k,m)as an underlying scheme,which takes a secret keykand a messagemto generate the corresponding ciphertextc.LetMbe the message to be encrypted.We assume that the size of the message is a multiple oflb-lL.Let|M|=n(lb-lL)which means thatMcomposed withnblocks of length(lb-lL)-bits.Then,the encryption algorithmDyEncworks as followings:

    1.Divide the messageMinto small blocks of lengthlb-lL-bits.When,we can see that

    M=m1||m2||...||mnwhere |mi|=lb-lL.

    2.Choosenrandom valuesR0,R1,...,andRn-1,and setIV=R0where all values arelL-bits

    such thatIV=iv||ivandRi =ri||rifori=1,...,n-1.

    3.Encoded dataM′is computed as

    M′=iv||m1||R1||m2||R2||...||mn-1||Rn-1||iv.

    4.Encryption functionEncis applied to

    mi′=ri-1||mi||rifor all i=1,...,n.

    Fori=1andn,we have

    m1

    ′=iv||m1||r1andmn

    ′=rn-1||mn||iv.

    5.Ciphertext is computed as

    C=c1||...||cn

    whereci =Enc(sk,m1′)andskis the encryption key.

    In Fig.5,we give an example for the encryption procedure.In the example,we consider a messageMwhich can be divided into six blocks such that

    M=m1||m2||m3||m4||m5||m6.

    Then,we choose six valuesIV,R1,R2,R3,R4,andR5where all values arelL-bits such that

    IV=iv||iv,R1=r1||r1,R2=r2||r2,R3=r3||r3,R4=r4||r4,andR5=r5||r5.

    Then,an encoded dataM′is computed as

    M′=IV||m1||R1||m2||R2||m3||R3||m4||R4||m5||R5||m6||IV.

    An encryption functionEncis applied to

    mi′=ri-1||||ri.

    Fori=1and6,we have

    m1

    ′=iv||m1||r1andm6′=r5||m6||iv.

    Finally,the ciphertext is computed as

    C=c1||c2||c3||c4||c5||c6

    whereci=Enc(sk,mi′)andkis the encryption key.

    Figure 5:Procedure for proposed encryption technique

    4.2.3 Decryption

    To decrypt a ciphertextC,we can use the decryption algorithmDec(k,c)of the underlying encryption scheme,which returns the corresponding messagemfor given ciphertextcby using the secret keyk.

    We can easily recover the data from the ciphertextCby applying block-wise decryption as following steps:

    1.Apply the decryption algorithm to each ciphertext block cifor all i=1,...,n.Then,we can obtain mi′=Dec(k,ci)for i=1,...,n.

    2.Note that

    mi′=ri-1||mi||rifor all i=2,...,n-1

    and

    m1

    ′=iv||m1||r1and mn′=rn-1||mn||iv

    for i=1 and n.Remove noise values iv and ris and get the plaintext as

    M =m1||...||mn.

    4.2.4 Modification

    Let mibe the message to be updated to m*.To perform update operation,we prepare two new random link values RL=rL||rLand RR=rR||rR.Then,cithe ciphertext of mi′=ri-1||mi||riis replaced by

    c*=Enc(sk,rL||m*||rR).

    We also have to modify two more ciphertext blocks ci-1and ci+1.Let

    ci-1=Enc(sk,ri-2||mi-1||ri-1)and ci+1=Enc(sk,ri||mi+1||ri+1).

    Then,two additional blocks are changed to different ciphertexts

    ci-1*=Enc(sk,ri-2||mi-1||rL) and ci+1*=Enc(sk,rR||mi+1||ri+1).

    According to the above description,it seems that the proposed technique requires two more additional operation for single modification.However,in general,a number of blocks are modified at once.So,we can see that the additional cost for one modification operation is the modification of two blocks,but the cost is not required for each block.In other words,we need to update lm+2 message blocks to update lmconsecutive message blocks.In other words,two more ciphertext blocks are updated for each modification query.A concrete example can be seen in Fig.4.

    4.2.5 Deletion

    Let mibe the message to be deleted.Recall that,encryption of mi-1and mi+1are appended at the left and right side of the encryption of mias

    C =c1||...||ci-1||ci||ci+1||...||cn

    where

    ci-1=Enc(sk,ri-2||mi-1||ri-1),ci=Enc(sk,ri-1||mi||ri)and ci+1=Enc(sk,ri||mi+1||ri+1).

    To perform update operation,we prepare a new random link value R*= r*||r*.Then,cithe ciphertext of miis removed from encrypted data,and two ciphertexts ci-1′and ci+1′are computed to change link values in two ciphertext ci-1and ci+1so that we have the followings:

    ci-1′=Enc(sk,ri-2||mi-1||r*)and ci+1′=Enc(sk,r*||mi+1||ri+1).

    Then,the encrypted data C is changed to C*as following:

    C =c1||...||ci-2||ci-1′||ci+1′||ci+2||...||cn.

    Recall that,two ciphertext blocks are linked when they have the same link values as in the above equation.So,we can see that the messagemiis deleted and two ciphertexts are linked as defined.As in the description for modification,the additional cost for one deletion operation is the modification of two blocks.To deletelmconsecutive message blocks,we need to update only2ciphertext blocks.Refer Fig.4 for a concrete example.

    4.2.6 Insertion

    Letmbe the message to be inserted betweenmiandmi+1,andciandci+1are encryption of two messages such that

    To perform insertion operation,we prepare two new random link valuesRL=rL||rLandRR=rR||rR.Then,cthe ciphertext ofm′=rL||m||rRis inserted betweenciandci+1.We also modify two ciphertextciandci+1to update link values.Two ciphertext are computed as

    Then,we can see that the message is inserted in the ciphertextCas

    To insertlmconsecutive message blocks,we need to update only2more blocks.Refer Fig.4 for a concrete example.

    4.3 Analysis

    To compare our technique with existing techniques,we give the following table.As seen in Tab.1,existing techniques cannot support all update operations.Though the ECB mode can support dynamic update operations,it is well known that the scheme is not secure since two adjacent blocks are not linked.Two mode of operations,CBC mode and CTR mode,are not suitable for dynamic update.The CTR mode can partially support the modification of a block,but we need somewhat strong assumption that the adversary cannot find two different plaintext blocks for the same position.If an adversary can figure out two different data blocks,the secret encryption key for the position may revealed to the adversary.

    Table 1:Comparison with existing techniques

    In the above,we examine the functionality of our scheme by comparing with existing technique.From now,we will discuss the security of our scheme.The proposed technique is designed based on a secure encryption functionEnc,and the security of the proposed technique is guaranteed by the security of the underlying scheme such as the advanced encryption standard(AES)[11].Extract any information from a ciphertext block is intractable since the underlying scheme is secure under standard security notion which guarantee the hardness of extract any information of encrypted data.

    In Section 2.4,we describe a definition for the security of dynamic encryption.As we in Def.2 and Def.3,the security of a dynamic encryption is slightly different from ordinary encryption techniques in the sense that any encrypted data are not updated in existing techniques.So,to verify the security of our scheme,we need to prove that it is still hard to guess an encrypted data even if number of update queries can be made by an adversary.From now,we will prove the security of our scheme.

    Theorem 1.The proposed dynamic encryption scheme is secure if the underlying block cipher is secure.

    Sketch of proof) Assume that our scheme is implemented using a secure block cipher such as AES.Then,we can guarantee the security of encrypted block-sized messages.The goal of the proof is to reduce the security of our scheme to the security of the underlying block cipher.For the goal,we will design an algorithm that can break the security of the underlying scheme using an adversary who can break the security of the proposed scheme.

    Proof of Confidentiality)For the proof about the confidentiality,we remind the definition 2.By the definition 2,we need to guarantee there is no adversary that has non-negligible advantage against the ind-CCA-DyEnc game.Suppose that there exists a polynomial-time adversary A=(A1,A2)that Pr[Ind-CCA-DyEnc(sk,A,λ)=1]>1/2.

    It means that the adversarial algorithm A2can find out correct i for given C=Enc(sk,ri1||Mi||ri2),M0,and M1with meaningful probability.For simplicity,we can assume that

    where Enc is an embedded encryption algorithm.From the semantic secure property of Enc algorithm,no polynomial-time algorithm can obtain any information about plaintext from a given ciphertext.In other words,Pr[i=i′|i′=A2OE(sk),OD(sk),OU(sk)(ct,m0t,m1t,λ),ct=Enc(sk,rL||mit||rR)]-1/2 is negligible.

    Proof of Integrity)To prove the integrity of dynamic encryption,it is needed to guarantee there is no adversary that can construct a proper new cipher block without having the secret key.Without loss of generality,we assume that the adversary’s goal is to construct t-th cipher block.The first strategy of the adversary is to insert a random cipher block into the location of t-th block.However,decrypting the random ciphertext yields a random plaintext,so that links of the resulting plaintext(rL||mt||rR)are random information.It means that rLrtand rRrt+1,and it is easy to find out the t-th block is not proper with high probability.

    The other way to generate a valid ciphertext can be re-arranging existing valid ciphertexts.In an adversary’s viewpoint,a new valid ciphertext can be made from an existing valid ciphertext only if an inserted block has valid link values.If the adversary has no information about the secret key,then the only possible strategy of an adversary is random guessing of link value.In this case,a randomly chosen link value is valid with probability 1/2lL.Therefore,if we use link values with enough length to obtain the expected security level.For example,we can see that 40-bits link values are enough for our scheme.

    Since we use block-wise encryption,the computational complexity of our scheme is almost identical with existing encryption modes since one block-sized message requires one block-encryption.Only the difference is the ciphertext expansion.In existing techniques,the size of ciphertext is almost identical with the data except small-sized padding values.However,our technique requires link values to support dynamic updates.Since we use 40-bits link value,we need one block to encrypt lb-40 bits where lbis the size of a block.Thought the space efficiency is reduced due to the use of link values,our technique is the first encryption mode in the literature,which can support dynamic encryption.

    5 Conclusion

    With the development of communication technologies such as 5G and social demands,the importance of cloud-based collaboration is growing.However,since the existing technology is not possible to provide encryption for dynamic data,it is difficult to provide secure cloud-based collaboration.In this paper,we proposed a dynamic encryption technology that can overcome the limitations of these existing technologies.We also proved the security of the proposed technique.

    Recall that,in this work,we gave a technique that support dynamic update of encrypted data.One of fundamental requirements for the technique is a way of maintaining the correct version.Since a stored data is frequently updated,collaborators may want to check the version of the data.To guarantee the version of stored data,we need a new authenticating method for dynamically updated data.So,we thought that the most important future work is to design an efficient and effective way to prove the version of a dynamically updated data in an encrypted form.We are also interested in designing efficient technique for collaboration of multimedia data using dedicated encryption technique such as image encryption scheme[12].

    Funding Statement:This work was partly supported by Institute of Information &communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2021-0-00779,Development of high-speed encryption data processing technology that guarantees privacy based hardware,50%) and National R&D Program through the National Research Foundation of Korea(NRF)funded by Ministry of Science and ICT(NRF-2021R1F1A1056115,50%).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜激情欧美在线| 好男人在线观看高清免费视频| 丝袜美腿在线中文| 成人亚洲精品av一区二区| 日日夜夜操网爽| 国产成人一区二区在线| 色在线成人网| 精品一区二区免费观看| 99久久无色码亚洲精品果冻| 免费黄网站久久成人精品| 波多野结衣巨乳人妻| 久久精品91蜜桃| 精品国产三级普通话版| 中文字幕熟女人妻在线| 很黄的视频免费| 欧美最黄视频在线播放免费| 国产免费一级a男人的天堂| 他把我摸到了高潮在线观看| 色精品久久人妻99蜜桃| 国产精品永久免费网站| 国产精品一区二区三区四区免费观看 | 成人鲁丝片一二三区免费| 久久久精品大字幕| 日本黄大片高清| 国产私拍福利视频在线观看| 免费观看的影片在线观看| 国产精品永久免费网站| 一级黄色大片毛片| 色吧在线观看| 亚洲欧美日韩高清专用| 日日夜夜操网爽| 两个人的视频大全免费| 琪琪午夜伦伦电影理论片6080| 久久九九热精品免费| 久久人妻av系列| 免费av不卡在线播放| avwww免费| 一区二区三区四区激情视频 | 亚洲av免费高清在线观看| 精品人妻一区二区三区麻豆 | 国内精品美女久久久久久| 亚洲一级一片aⅴ在线观看| 欧美成人一区二区免费高清观看| 国内久久婷婷六月综合欲色啪| 欧美日韩瑟瑟在线播放| 国产主播在线观看一区二区| 国产成人影院久久av| 别揉我奶头 嗯啊视频| 成人国产综合亚洲| 国产主播在线观看一区二区| 最后的刺客免费高清国语| 嫩草影院入口| 真实男女啪啪啪动态图| 悠悠久久av| 少妇的逼好多水| 亚洲国产色片| 日日摸夜夜添夜夜添av毛片 | 国产亚洲欧美98| 九色国产91popny在线| 国产午夜精品论理片| 国产激情偷乱视频一区二区| 婷婷精品国产亚洲av在线| 99热网站在线观看| 亚洲av熟女| 亚洲成人久久爱视频| 精品人妻一区二区三区麻豆 | 国产久久久一区二区三区| 黄色欧美视频在线观看| 亚洲色图av天堂| 国产三级在线视频| 日韩强制内射视频| 岛国在线免费视频观看| 久久久国产成人精品二区| 久久久精品大字幕| 麻豆成人av在线观看| 午夜福利高清视频| 日日撸夜夜添| 欧美在线一区亚洲| 久久天躁狠狠躁夜夜2o2o| 桃色一区二区三区在线观看| 日韩欧美在线乱码| 97碰自拍视频| 九九热线精品视视频播放| 国产精华一区二区三区| 赤兔流量卡办理| 精品人妻偷拍中文字幕| 天美传媒精品一区二区| 欧美3d第一页| 亚洲中文日韩欧美视频| 国产精品一区二区三区四区免费观看 | 国产精品久久电影中文字幕| 人妻丰满熟妇av一区二区三区| 小说图片视频综合网站| 久久精品夜夜夜夜夜久久蜜豆| 欧美一区二区国产精品久久精品| 精品久久久久久久末码| 国产色爽女视频免费观看| h日本视频在线播放| 久久人人精品亚洲av| 久久人人爽人人爽人人片va| 成年人黄色毛片网站| 亚洲男人的天堂狠狠| 波多野结衣巨乳人妻| 三级国产精品欧美在线观看| 久久人人爽人人爽人人片va| 99riav亚洲国产免费| 国产69精品久久久久777片| 黄色欧美视频在线观看| 日本免费一区二区三区高清不卡| 亚洲一级一片aⅴ在线观看| 夜夜爽天天搞| 亚洲欧美精品综合久久99| 国产亚洲精品综合一区在线观看| 国产高潮美女av| 久久中文看片网| 欧美色视频一区免费| 久久久久久久久久久丰满 | 身体一侧抽搐| 久久精品国产自在天天线| 欧美成人a在线观看| 色av中文字幕| 亚洲色图av天堂| 成人三级黄色视频| 亚洲精品影视一区二区三区av| 国产视频内射| 欧美日韩瑟瑟在线播放| 热99在线观看视频| 男人的好看免费观看在线视频| 老司机福利观看| av在线亚洲专区| 人人妻,人人澡人人爽秒播| 午夜亚洲福利在线播放| 亚洲av不卡在线观看| 少妇高潮的动态图| 91av网一区二区| 亚洲av熟女| 好男人在线观看高清免费视频| 国产亚洲av嫩草精品影院| 日韩av在线大香蕉| 午夜亚洲福利在线播放| 搡老妇女老女人老熟妇| 天美传媒精品一区二区| 一区二区三区四区激情视频 | 黄色视频,在线免费观看| 免费观看人在逋| 成人午夜高清在线视频| 日日干狠狠操夜夜爽| 色精品久久人妻99蜜桃| 久久国内精品自在自线图片| bbb黄色大片| 尤物成人国产欧美一区二区三区| 亚洲性久久影院| 嫩草影视91久久| 欧美精品国产亚洲| 18禁黄网站禁片午夜丰满| 日日夜夜操网爽| 老熟妇仑乱视频hdxx| 国产高清视频在线观看网站| 亚洲av免费高清在线观看| 最近最新中文字幕大全电影3| 欧美激情久久久久久爽电影| 国产精品久久久久久精品电影| 一区二区三区四区激情视频 | 俄罗斯特黄特色一大片| 免费看av在线观看网站| 伊人久久精品亚洲午夜| 99久久精品热视频| 亚洲欧美日韩高清专用| 成人一区二区视频在线观看| 久久欧美精品欧美久久欧美| 欧美性感艳星| 久久久国产成人精品二区| 精品不卡国产一区二区三区| 精品午夜福利在线看| 最近在线观看免费完整版| 精品一区二区三区av网在线观看| 国产精品久久久久久久电影| 亚洲精品色激情综合| 国内精品宾馆在线| 免费av观看视频| 国内揄拍国产精品人妻在线| 一区二区三区免费毛片| 中文资源天堂在线| 精品午夜福利在线看| 午夜精品久久久久久毛片777| 午夜视频国产福利| 日韩欧美国产一区二区入口| 两个人视频免费观看高清| 老司机午夜福利在线观看视频| 亚洲精品一卡2卡三卡4卡5卡| 美女免费视频网站| 日韩欧美精品免费久久| 又爽又黄无遮挡网站| 亚洲最大成人中文| 国产精品国产三级国产av玫瑰| 1024手机看黄色片| 赤兔流量卡办理| 国产三级在线视频| 亚洲七黄色美女视频| 国产高清三级在线| 亚洲精品亚洲一区二区| 两个人视频免费观看高清| 国产色婷婷99| 色在线成人网| 色精品久久人妻99蜜桃| 久久精品国产亚洲av涩爱 | 国产精品亚洲美女久久久| 午夜免费成人在线视频| 午夜精品在线福利| 啦啦啦观看免费观看视频高清| 99久久久亚洲精品蜜臀av| 男女边吃奶边做爰视频| 蜜桃久久精品国产亚洲av| 波野结衣二区三区在线| 国产精品三级大全| 久久久久久久久久久丰满 | 亚洲欧美日韩无卡精品| 男人和女人高潮做爰伦理| 亚洲av中文字字幕乱码综合| 午夜福利欧美成人| 欧美色欧美亚洲另类二区| 久久久久免费精品人妻一区二区| 精品国产三级普通话版| 51国产日韩欧美| 91狼人影院| 亚洲国产高清在线一区二区三| 美女黄网站色视频| 如何舔出高潮| 日本黄大片高清| 午夜亚洲福利在线播放| 九色国产91popny在线| 国产精品综合久久久久久久免费| 亚洲内射少妇av| 色av中文字幕| 91久久精品电影网| 日韩欧美精品免费久久| 国产精品不卡视频一区二区| 3wmmmm亚洲av在线观看| 国内精品久久久久久久电影| 伊人久久精品亚洲午夜| 成人特级av手机在线观看| 美女高潮的动态| 欧美日韩瑟瑟在线播放| 国产精品日韩av在线免费观看| 一进一出抽搐动态| 成人特级黄色片久久久久久久| 免费不卡的大黄色大毛片视频在线观看 | av在线老鸭窝| 国产av在哪里看| 亚洲最大成人手机在线| 久久久久久久久中文| 欧美日韩精品成人综合77777| 在现免费观看毛片| 伊人久久精品亚洲午夜| 国产精品精品国产色婷婷| 欧美成人免费av一区二区三区| 欧美+日韩+精品| 日韩国内少妇激情av| 日韩人妻高清精品专区| 国内毛片毛片毛片毛片毛片| 国产激情偷乱视频一区二区| 色吧在线观看| 夜夜夜夜夜久久久久| 亚洲第一区二区三区不卡| 一区二区三区四区激情视频 | 最近最新免费中文字幕在线| 国产探花在线观看一区二区| 精品久久久久久久久亚洲 | 亚洲四区av| 九色成人免费人妻av| av在线天堂中文字幕| 毛片女人毛片| 一卡2卡三卡四卡精品乱码亚洲| 18+在线观看网站| 夜夜看夜夜爽夜夜摸| 国内揄拍国产精品人妻在线| 99九九线精品视频在线观看视频| 真人一进一出gif抽搐免费| 亚洲图色成人| 久久久久国产精品人妻aⅴ院| 久久久久久九九精品二区国产| 成人国产麻豆网| 中文字幕熟女人妻在线| 国产精品一区www在线观看 | 91在线精品国自产拍蜜月| 99久久中文字幕三级久久日本| 婷婷色综合大香蕉| 久久久精品欧美日韩精品| 欧美成人一区二区免费高清观看| 热99re8久久精品国产| 国产在线精品亚洲第一网站| 一级黄色大片毛片| eeuss影院久久| 国产一区二区亚洲精品在线观看| 男女视频在线观看网站免费| 久久国产精品人妻蜜桃| 国产老妇女一区| 国产精品av视频在线免费观看| 男女视频在线观看网站免费| 婷婷丁香在线五月| 91狼人影院| 午夜福利18| 日韩欧美三级三区| 久久精品国产亚洲网站| 日日摸夜夜添夜夜添小说| 婷婷色综合大香蕉| 欧美xxxx性猛交bbbb| 国内精品美女久久久久久| 18禁在线播放成人免费| 亚洲在线观看片| 国产免费av片在线观看野外av| 国内精品宾馆在线| 国产黄片美女视频| 日日干狠狠操夜夜爽| 免费一级毛片在线播放高清视频| 日韩中字成人| 欧美中文日本在线观看视频| 色哟哟哟哟哟哟| 偷拍熟女少妇极品色| 午夜视频国产福利| 亚洲精品色激情综合| 亚洲天堂国产精品一区在线| 五月伊人婷婷丁香| 成人av在线播放网站| 精品一区二区三区视频在线观看免费| 日韩欧美免费精品| 中文字幕久久专区| 88av欧美| 九九爱精品视频在线观看| 麻豆久久精品国产亚洲av| 国产成人影院久久av| 伊人久久精品亚洲午夜| 麻豆国产97在线/欧美| 人妻丰满熟妇av一区二区三区| 村上凉子中文字幕在线| 亚洲欧美激情综合另类| 悠悠久久av| 色播亚洲综合网| 国内精品一区二区在线观看| 国产一区二区激情短视频| 久久99热6这里只有精品| 成人特级黄色片久久久久久久| 国产主播在线观看一区二区| 人妻久久中文字幕网| 91久久精品电影网| 嫁个100分男人电影在线观看| 看免费成人av毛片| 亚洲无线在线观看| 久久久久免费精品人妻一区二区| 国产精品国产三级国产av玫瑰| 狂野欧美白嫩少妇大欣赏| 国产精品综合久久久久久久免费| av视频在线观看入口| 美女被艹到高潮喷水动态| 99在线人妻在线中文字幕| 内地一区二区视频在线| 国产 一区精品| 亚洲一区高清亚洲精品| 欧美+亚洲+日韩+国产| 91av网一区二区| 免费在线观看成人毛片| 免费看a级黄色片| 欧美色欧美亚洲另类二区| 国产女主播在线喷水免费视频网站 | 又黄又爽又免费观看的视频| 九九热线精品视视频播放| 波多野结衣巨乳人妻| 色吧在线观看| 欧美另类亚洲清纯唯美| 成人三级黄色视频| 国产成人aa在线观看| 成人综合一区亚洲| 色吧在线观看| 国产精品久久久久久av不卡| 搡老熟女国产l中国老女人| 国产蜜桃级精品一区二区三区| 老司机福利观看| 日韩欧美国产一区二区入口| 成人性生交大片免费视频hd| 大型黄色视频在线免费观看| 亚洲四区av| 亚洲精华国产精华液的使用体验 | 国产白丝娇喘喷水9色精品| 综合色av麻豆| 日日摸夜夜添夜夜添小说| 欧美一区二区国产精品久久精品| 成人美女网站在线观看视频| 久久人人爽人人爽人人片va| 老女人水多毛片| 亚洲自拍偷在线| 99久国产av精品| 午夜福利在线在线| 男人狂女人下面高潮的视频| 人人妻,人人澡人人爽秒播| 久久久久性生活片| 亚洲 国产 在线| 日本欧美国产在线视频| 12—13女人毛片做爰片一| 一边摸一边抽搐一进一小说| 黄色一级大片看看| 亚洲精品影视一区二区三区av| 在线观看舔阴道视频| 美女xxoo啪啪120秒动态图| 国产欧美日韩精品一区二区| 国产成年人精品一区二区| 欧美一级a爱片免费观看看| 国产伦精品一区二区三区视频9| 亚洲欧美清纯卡通| 三级国产精品欧美在线观看| 久久国内精品自在自线图片| 99久久久亚洲精品蜜臀av| 桃红色精品国产亚洲av| 22中文网久久字幕| 成人av在线播放网站| 亚洲av中文av极速乱 | 可以在线观看毛片的网站| 国产伦精品一区二区三区视频9| 狠狠狠狠99中文字幕| 无遮挡黄片免费观看| av在线天堂中文字幕| 色av中文字幕| 日本-黄色视频高清免费观看| 亚洲精品色激情综合| x7x7x7水蜜桃| 成人国产综合亚洲| 久久这里只有精品中国| 成年免费大片在线观看| 成人高潮视频无遮挡免费网站| 久久精品国产自在天天线| 美女cb高潮喷水在线观看| 日日夜夜操网爽| 香蕉av资源在线| 国产成人av教育| 日韩,欧美,国产一区二区三区 | 女生性感内裤真人,穿戴方法视频| 午夜福利成人在线免费观看| 久久中文看片网| 精品久久久久久久久久久久久| 国产真实伦视频高清在线观看 | 1000部很黄的大片| 天天躁日日操中文字幕| 老师上课跳d突然被开到最大视频| 久久精品夜夜夜夜夜久久蜜豆| 一级黄片播放器| 国内精品一区二区在线观看| 午夜福利18| 国产午夜精品久久久久久一区二区三区 | 色综合色国产| 国产精品一区二区三区四区久久| 日本a在线网址| 亚洲不卡免费看| 1000部很黄的大片| 观看美女的网站| 尤物成人国产欧美一区二区三区| 成人高潮视频无遮挡免费网站| 亚洲中文字幕一区二区三区有码在线看| 床上黄色一级片| 一本精品99久久精品77| 我的女老师完整版在线观看| av黄色大香蕉| 日本 av在线| 午夜福利成人在线免费观看| 美女免费视频网站| 乱码一卡2卡4卡精品| 亚洲美女视频黄频| 蜜桃久久精品国产亚洲av| avwww免费| 一级av片app| 草草在线视频免费看| 午夜福利成人在线免费观看| 色噜噜av男人的天堂激情| 免费看日本二区| 国产三级在线视频| 精品久久久久久久久久久久久| 欧美日韩精品成人综合77777| 免费在线观看成人毛片| 久久久午夜欧美精品| 一卡2卡三卡四卡精品乱码亚洲| 色综合亚洲欧美另类图片| 免费在线观看日本一区| 一级毛片久久久久久久久女| 免费av不卡在线播放| 99精品久久久久人妻精品| 深夜a级毛片| 一本精品99久久精品77| 丰满乱子伦码专区| 人人妻人人看人人澡| 少妇裸体淫交视频免费看高清| 色综合色国产| 一区二区三区免费毛片| 日韩人妻高清精品专区| 亚洲欧美激情综合另类| 亚洲美女视频黄频| 久久精品国产鲁丝片午夜精品 | 91久久精品国产一区二区三区| 蜜桃久久精品国产亚洲av| 高清日韩中文字幕在线| 级片在线观看| 亚洲狠狠婷婷综合久久图片| 老司机深夜福利视频在线观看| 一级毛片久久久久久久久女| 亚洲无线观看免费| 天美传媒精品一区二区| 99久久九九国产精品国产免费| 亚洲av第一区精品v没综合| 亚洲,欧美,日韩| 亚洲精品久久国产高清桃花| 精品一区二区三区视频在线观看免费| 性色avwww在线观看| 国产视频一区二区在线看| 国产中年淑女户外野战色| 亚洲欧美日韩无卡精品| 精品99又大又爽又粗少妇毛片 | 亚洲va在线va天堂va国产| 久久香蕉精品热| 日本欧美国产在线视频| 日本免费一区二区三区高清不卡| 国内精品宾馆在线| 在线观看66精品国产| 狂野欧美白嫩少妇大欣赏| av中文乱码字幕在线| 亚洲一区高清亚洲精品| 日本与韩国留学比较| 亚洲美女搞黄在线观看 | 国产伦精品一区二区三区视频9| 日韩大尺度精品在线看网址| 日本a在线网址| 亚洲第一区二区三区不卡| 三级毛片av免费| 日本与韩国留学比较| 男人狂女人下面高潮的视频| 免费不卡的大黄色大毛片视频在线观看 | 亚洲一区二区三区色噜噜| 麻豆国产av国片精品| 精品一区二区三区人妻视频| 国产精品一区www在线观看 | 在线免费观看不下载黄p国产 | 97热精品久久久久久| 欧美日韩综合久久久久久 | 国产 一区 欧美 日韩| 香蕉av资源在线| 国产又黄又爽又无遮挡在线| 久久精品夜夜夜夜夜久久蜜豆| 久久久久久久久久久丰满 | 九九爱精品视频在线观看| 有码 亚洲区| 亚洲精华国产精华液的使用体验 | 成熟少妇高潮喷水视频| 国产一区二区在线观看日韩| 日本在线视频免费播放| 美女黄网站色视频| 亚洲欧美日韩高清在线视频| 狠狠狠狠99中文字幕| 黄色日韩在线| 狠狠狠狠99中文字幕| 国产在线男女| 久久人人爽人人爽人人片va| 嫩草影院入口| 真人做人爱边吃奶动态| 国产精品久久久久久精品电影| 国产精品一区www在线观看 | 成年女人看的毛片在线观看| 亚洲av熟女| 搡老熟女国产l中国老女人| 99在线人妻在线中文字幕| 尤物成人国产欧美一区二区三区| 免费看a级黄色片| 日韩 亚洲 欧美在线| 亚洲第一区二区三区不卡| 毛片一级片免费看久久久久 | netflix在线观看网站| 美女黄网站色视频| 婷婷丁香在线五月| 嫩草影视91久久| 欧美成人一区二区免费高清观看| 国产在线男女| 亚洲自偷自拍三级| 天堂影院成人在线观看| 久久国产乱子免费精品| 一级黄片播放器| 日本免费一区二区三区高清不卡| 国产精品久久久久久av不卡| 国产免费男女视频| 亚洲自偷自拍三级| 精品久久国产蜜桃| 国产成人aa在线观看| 在线天堂最新版资源| 亚洲av熟女| 欧美日本视频| 九九热线精品视视频播放| av专区在线播放| 亚洲av美国av| 亚洲人成网站高清观看| 亚洲一区二区三区色噜噜| 在线观看午夜福利视频| 免费av不卡在线播放| 69av精品久久久久久| 久久久久国产精品人妻aⅴ院| 国产黄a三级三级三级人| 国产综合懂色| 香蕉av资源在线| 国产aⅴ精品一区二区三区波| 日本色播在线视频| 极品教师在线视频| 无遮挡黄片免费观看| 最新在线观看一区二区三区| 日韩欧美国产一区二区入口| 97超级碰碰碰精品色视频在线观看| 精品一区二区三区视频在线观看免费| 一区二区三区免费毛片| 亚洲专区国产一区二区| 99久久无色码亚洲精品果冻| 国产精品国产高清国产av| 一个人观看的视频www高清免费观看| 欧美激情国产日韩精品一区|