This work was supported by the National Key Research and Development Program of China(2016YFE0129400);Youth Innovation Promotion Association(2016290);Strategic Priority Research Program of the Chinese Academy of Sciences(XDC02010800);National Cryptography Development Fund during the 13th Five-Year Plan Period(MMJJ20180112).
In a perfect security case of symmetric encryption,the secure key is generated from a true random number generator and cannot be reused.Moreover,it has the same code length as the total message.Furthermore,we require ...