1. State Key Laboratory Of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, Beijing, Beijing, China, (e-mail: daipengwen@iie.ac.cn)
2. Algorithmics Group of the Faculty of Engineering, Mathematics and Computer Science (EEMCS/EWI), Delft University of Technology, 2860 Delft, Zuid-Holland, Netherlands, (e-mail: li-yang14@mails.tsinghua.edu.cn)
3. State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, (e-mail: zhanghua@iie.ac.cn)
4. State Key Laboratory Of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, 12381 Beijing, Beijing, China, (e-mail: lijingzhi@iie.ac.cn)
5. State Key Laboratory Of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, 100093 (e-mail: caoxiaochun@iie.ac.cn)