LIU Peng1,2,HE Qian1,2,LI Shuangfu1,2 ,XU Hong1,2
(1.Key Laboratory of Cryptography and Information Security,Guilin University of Electronic Technology,Guilin 541004;
2.Guangxi Collaborative Innovation Center of Cloud Computing and Big Data,
Guilin University of Electronic Technology,Guilin 541004,China)