YAO-LING DING1, JING-YUAN ZHAO2, LEI-BO LI3 AND HONG-BO YU1,4,+
1Department of Computer Science and Technology
Tsinghua University
Beijing, 100084 P.R. China
2State Key Laboratory of Information Security, Institute of Information Engineering
Chinese Academy of Sciences
Beijing, 100084 P.R. China
3Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education
Shandong University
Jinan, 250100 P.R. China
4Science and Technology on Communication Security Laboratory
Chengdu, 610041 P.R. China
E-mail: dyl13@mails.tsinghua.edu.cn; zhaojingyuan@iie.ac.cn;
lileibo@mail.sdu.edu.cn; yuhongbo@mail.tsinghua.edu.cn