YONG LI1,2,3, GE YAO1, LI-NAN LEI1, HUA-QUN WANG4 AND CHANG-LU LIN2
1School of Electronic and Information Engineering
Beijing Jiaotong University
Beijing, 100044 P.R. China
E-mail: liyong@bjtu.edu.cn
2Fujian Provincial Key Laboratory of Network Security and Cryptology
Fujian Normal University
Fuzhou, 350007 P.R. China
3Guangxi Key Laboratory of Cryptography and Information Security
Guilin University of Electronic Technology
Guilin, 541004 P.R. China
4School of Computer Science and Technology
Nanjing University of Posts and Telecommunications
Nanjing, 210023 P.R. China