Funding for this research was provided by:
National Key Research and Development Program of China (2017YFB0802300)
Natural Science Foundation of China (61602240)
Natural Science Foundation of Jiangsu Province of China (BK20150760)
Guangxi Key Laboratory of Cryptography and Information Security (GCIS201723)
Postgraduate Research & Practice Innovation Program of Jiangsu Province (KYCX18_0305)
Article History
First Online: 4 October 2019
Compliance with ethical standards
:
: The authors declare that they have no conflict of interest.
: This article does not contain any studies with human participants or animals performed by any of the authors.
: Informed consent was obtained from all individual participants included in the study.