1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
2. Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing 100093, China
3. University of Chinese Academy of Sciences, Beijing 100093, China
Corresponding author (firstname.lastname@example.org
There is no abstract available for this article.
This work was supported by National Basic Research Program of China (Grant No. 2013CB834203), National Natural Science Foundation of China (Grant Nos. 61472417, 61472415, 61402469), Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA06010702), and State Key Laboratory of Information Security, Chinese Academy of Sciences.
Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有