Shen, Jian
Yang, Huijie
Wang, Anxi
Zhou, Tianqi
Wang, Chen
Funding for this research was provided by:
State Key Laboratory of Information Security (2017-MS-10)
PAPD (PAPD)
Guangxi Key Laboratory of Cryptography and Information Security under Grant (No. GCIS201715)
The National Natural Science Foundation of China under Grant (No. 61672295, No. 61672290, and No. 61772280)
CICAEET (CICAEET)
Article History
Received: 4 July 2018
Accepted: 16 October 2018
First Online: 26 October 2018