Funding for this research was provided by:
National Key Research and Development Program of China (2017YFB0802000, 2017YFB0802000)
National Natural Science Foundation of China (61772326)
National Natural Science Foundation of China (61572303)
NSFC Research Fund for International Young Scientists (61750110528)
National Cryptography Development Fund during the 13th Five-year Plan Period, P.R.China (MMJJ20170216)
the Foundation of State Key Laboratory of Information Security, P.R.China (2017-MS-03)
the Fundamental Research Funds for the Central Universities, P.R.China (GK201603092, GK201702004)
the Fundamental Research Funds for the Central Universities, P.R.China (GK201603084)
Fund of Key Laboratory of Modern Teaching Technology, Ministry of Education, P.R.China (2015kfkt3)
Article History
First Online: 27 April 2018
Compliance with ethical standards
:
: The authors declare that there is no conflict of interests regarding the publication of this paper.
: This article does not contain any studies with human participants or animals performed by any of the authors.