LI Xuesong1,2, PENG Changgen1,2,3,4, ZHANG Hong1,2
1.College of Computer Science & Information, Guizhou University, Guiyang 550025, China
2.Institute of Cryptography & Data Security, Guizhou University, Guiyang 550025, China
3.Guizhou Provincial Key Laboratory of Public Big Data, Guiyang 550025, China
4.Key Laboratory of Information Security, School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China