Funding for this research was provided by:
National Key R&D Program of China (2017YFB0802000)
Cryptography Theoretical Research of National Cryptography Development Fund (MMJJ20170109)
Open Research Fund of State Key Laboratory of Cryptology (MMKFKT201613)
Article History
Received: 25 April 2018
Accepted: 17 June 2018
First Online: 4 July 2018
Compliance with ethical standards
:
: The authors declare that they have no conflict of interest concerning the publication of this manuscript.