Hou, Huiying
Yu, Jia
Zhang, Hanlin
Xu, Yan
Hao, Rong
Funding for this research was provided by:
National Natural Science Foundation of China (61572267, 61272425, 61702294)
National Cryptography Development Fund of China (MMJJ20170118, MMJJ20170126)
The Open Project of Co-Innovation Center for Information Supply & Assurance Technology, Anhui University
The Open Project of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences (2017-MS-21, 2016-MS-23)
Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, NJUPT (BDSIP1806)
Natural Science Foundation of Shandong Province (ZR2015FM020, ZR2016FQ02)
Article History
Received: 7 October 2017
Revised: 1 April 2018
Accepted: 28 May 2018
First Online: 1 June 2018