KANG XIANG1,2, YOU-LIANG TIAN1,2,+, SHENG GAO3,
CHANG-GEN PENG1,2 AND WEI-JIE TAN1
1State Key Laboratory of Public Big Data
College of Computer Science and Technology
2Institute of Cryptography and Data Security
Guizhou University
Guiyang, 550025 P.R. China
3School of Information
Central University of Finance and Economics
Beijing, 100081 P.R. China
E-mail: xiangkang5258@gmail.com; youliangtian@163.com+