{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:25:31Z","timestamp":1769311531945,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62361010 and 62462012"],"award-info":[{"award-number":["62361010 and 62462012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018533","name":"Major Scientific and Technological Special Project of Guizhou Province","doi-asserted-by":"publisher","award":["[2024]014"],"award-info":[{"award-number":["[2024]014"]}],"id":[{"id":"10.13039\/501100018533","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province","award":["SKLACSS-202414"],"award-info":[{"award-number":["SKLACSS-202414"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s44443-025-00245-6","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T14:57:48Z","timestamp":1758725868000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Physical layer key generation based on SOM and K-Means clustering quantization for TDD-OFDM systems over unstable channels"],"prefix":"10.1007","volume":"37","author":[{"given":"Weijie","family":"Tan","sequence":"first","affiliation":[]},{"given":"Qiangqiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Zhenling","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhiquan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunguo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"key":"245_CR1","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.comcom.2024.02.019","volume":"218","author":"W Abdallah","year":"2024","unstructured":"Abdallah W (2024) A physical layer security scheme for 6g wireless networks using post-quantum cryptography. Comput. Commun. 218:176\u2013187","journal-title":"Comput. Commun."},{"issue":"9","key":"245_CR2","doi-asserted-by":"publisher","first-page":"5504","DOI":"10.1109\/TCOMM.2020.3003670","volume":"68","author":"M Alrabeiah","year":"2020","unstructured":"Alrabeiah M, Alkhateeb A (2020) Deep learning for mmwave beam and blockage prediction using sub-6 ghz channels. IEEE Trans. Commun. 68(9):5504\u20135518. https:\/\/doi.org\/10.1109\/TCOMM.2020.3003670","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"245_CR3","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TIT.1977.1055721","volume":"23","author":"A Carleial","year":"1977","unstructured":"Carleial A, Hellman M (1977) A note on wyner\u2019s wiretap channel (corresp). IEEE Trans. Inf. Theory 23(3):387\u2013390. https:\/\/doi.org\/10.1109\/TIT.1977.1055721","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"245_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar I, Korner J (1978) Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3):339\u2013348. https:\/\/doi.org\/10.1109\/TIT.1978.1055892","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"245_CR5","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/18.825796","volume":"46","author":"I Csiszar","year":"2000","unstructured":"Csiszar I, Narayan P (2000) Common randomness and secret key generation with a helper. IEEE Trans. Inf. Theory 46(2):344\u2013366. https:\/\/doi.org\/10.1109\/18.825796","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"245_CR6","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TAP.2022.3217159","volume":"71","author":"F Du","year":"2023","unstructured":"Du F, Zhang Y, Zhao X, Geng S, Fu Z, Wang X, Yu L, Li Q (2023) Millimeter channel clustering by self-organizing maps with time-varying topological structure. IEEE Trans. Antennas Propag. 71(2):1736\u20131746. https:\/\/doi.org\/10.1109\/TAP.2022.3217159","journal-title":"IEEE Trans. Antennas Propag."},{"key":"245_CR7","doi-asserted-by":"publisher","unstructured":"Zhao, D., Qin, H., Song, B., Zhang, Y., Du, X., Guizani, M.: A reinforcement learning method for joint mode selection and power adaptation in the v2v communication network in 5g. IEEE Transactions on Cognitive Communications and Networking. 6(2), 452\u2013463 (2020) https:\/\/doi.org\/10.1109\/TCCN.2020.2983170","DOI":"10.1109\/TCCN.2020.2983170"},{"key":"245_CR8","doi-asserted-by":"publisher","unstructured":"Hoang, T.M., Liu, D., Luong, T.V., Zhang, J., Hanzo, L.: Deep learning aided physical-layer security: The security versus reliability trade-off. IEEE Transactions on Cognitive Communications and Networking. 8(2), 442\u2013453 (2022) https:\/\/doi.org\/10.1109\/TCCN.2021.3138392","DOI":"10.1109\/TCCN.2021.3138392"},{"key":"245_CR9","volume":"41","author":"M El-Hajj","year":"2024","unstructured":"El-Hajj M, Beune P (2024) Lightweight public key infrastructure for the internet of things: A systematic literature review. J. Ind. Inf. Integr. 41:100670","journal-title":"J. Ind. Inf. Integr."},{"issue":"3","key":"245_CR10","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/MWC.013.2200538","volume":"31","author":"N Gao","year":"2024","unstructured":"Gao N, Han Y, Li N, Jin S, Matthaiou M (2024) When physical layer key generation meets ris: Opportunities, challenges, and road ahead. IEEE Wirel. Commun. 31(3):355\u2013361. https:\/\/doi.org\/10.1109\/MWC.013.2200538","journal-title":"IEEE Wirel. Commun."},{"key":"245_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2019.09.076","volume":"512","author":"Q Han","year":"2020","unstructured":"Han Q, Liu J, Shen Z, Liu J, Gong F (2020) Vector partitioning quantization utilizing k-means clustering for physical layer secret key generation. Inf. Sci. 512:137\u2013160. https:\/\/doi.org\/10.1016\/j.ins.2019.09.076","journal-title":"Inf. Sci."},{"key":"245_CR12","doi-asserted-by":"crossref","unstructured":"Xu, W., Zhang, J., Huang, S., Luo, C., Li, W.: Key generation for internet of things: A contemporary survey. ACM Comput. Surv. 54(1), 1\u201337 (2021)","DOI":"10.1145\/3429740"},{"issue":"1","key":"245_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/26.385951","volume":"43","author":"JE Hershey","year":"1995","unstructured":"Hershey JE, Hassan AA, Yarlagadda R (1995) Unconventional cryptographic keying variable management. IEEE Trans. Commun. 43(1):3\u20136. https:\/\/doi.org\/10.1109\/26.385951","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"245_CR14","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1109\/TCCN.2021.3138392","volume":"8","author":"TM Hoang","year":"2022","unstructured":"Hoang TM, Liu D, Luong TV, Zhang J, Hanzo L (2022) Deep learning aided physical-layer security: The security versus reliability trade-off. IEEE Transactions on Cognitive Communications and Networking. 8(2):442\u2013453. https:\/\/doi.org\/10.1109\/TCCN.2021.3138392","journal-title":"IEEE Transactions on Cognitive Communications and Networking."},{"issue":"3","key":"245_CR15","doi-asserted-by":"publisher","first-page":"2526","DOI":"10.1109\/TVT.2016.2582853","volume":"66","author":"R Jin","year":"2017","unstructured":"Jin R, Du X, Zeng K, Huang L, Xiao L, Xu J (2017) Delay analysis of physical-layer key generation in dynamic roadside-to-vehicle networks. IEEE Trans. Veh. Technol. 66(3):2526\u20132535. https:\/\/doi.org\/10.1109\/TVT.2016.2582853","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"245_CR16","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1109\/JPROC.2015.2469602","volume":"103","author":"E Jorswieck","year":"2015","unstructured":"Jorswieck E, Tomasin S, Sezgin A (2015) Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing. Proc. IEEE 103(10):1702\u20131724. https:\/\/doi.org\/10.1109\/JPROC.2015.2469602","journal-title":"Proc. IEEE"},{"key":"245_CR17","doi-asserted-by":"publisher","unstructured":"Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Di\u00a0Renzo, M.: Safeguarding 5g wireless communication networks using physical layer security. IEEE Communications Magazine. 53(4), 20\u201327 (2015) https:\/\/doi.org\/10.1109\/MCOM.2015.7081071","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"245_CR18","doi-asserted-by":"publisher","first-page":"5264","DOI":"10.1109\/TIFS.2021.3127021","volume":"16","author":"G Li","year":"2021","unstructured":"Li G, Xu Y, Xu W, Jorswieck E, Hu A (2021) Robust key generation with hardware mismatch for secure mimo communications. IEEE Trans. Inf. Forensics Secur. 16:5264\u20135278. https:\/\/doi.org\/10.1109\/TIFS.2021.3127021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"245_CR19","doi-asserted-by":"publisher","unstructured":"Carleial, A., Hellman, M.: A note on wyner\u2019s wiretap channel (corresp). IEEE Transactions on Information Theory. 23(3), 387\u2013390 (1977). https:\/\/doi.org\/10.1109\/TIT.1977.1055721","DOI":"10.1109\/TIT.1977.1055721"},{"issue":"9","key":"245_CR20","doi-asserted-by":"publisher","first-page":"2951","DOI":"10.1109\/JSAC.2023.3287610","volume":"41","author":"H Luo","year":"2023","unstructured":"Luo H, Garg N, Ratnarajah T (2023) A channel frequency response-based secret key generation scheme in in-band full-duplex mimo-ofdm systems. IEEE J. Sel. Areas Commun. 41(9):2951\u20132965. https:\/\/doi.org\/10.1109\/JSAC.2023.3287610","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"245_CR21","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"UM Maurer","year":"1993","unstructured":"Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3):733\u2013742. https:\/\/doi.org\/10.1109\/18.256484","journal-title":"IEEE Trans. Inf. Theory"},{"key":"245_CR22","doi-asserted-by":"publisher","unstructured":"Willink, T.J.: Improving power allocation to mimo eigenbeams under imperfect channel estimation. IEEE Communications Letters. 9(7), 622\u2013624 (2005) https:\/\/doi.org\/10.1109\/LCOMM.2005.1461684","DOI":"10.1109\/LCOMM.2005.1461684"},{"issue":"1","key":"245_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TMC.2009.88","volume":"9","author":"N Patwari","year":"2010","unstructured":"Patwari N, Croft J, Jana S, Kasera SK (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput. 9(1):17\u201330. https:\/\/doi.org\/10.1109\/TMC.2009.88","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"8","key":"245_CR24","doi-asserted-by":"publisher","first-page":"5176","DOI":"10.1109\/TWC.2017.2706657","volume":"16","author":"Y Peng","year":"2017","unstructured":"Peng Y, Wang P, Xiang W, Li Y (2017) Secret key generation based on estimated channel state information for tdd-ofdm systems over fading channels. IEEE Trans. Wireless Commun. 16(8):5176\u20135186. https:\/\/doi.org\/10.1109\/TWC.2017.2706657","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"11","key":"245_CR25","doi-asserted-by":"publisher","first-page":"9638","DOI":"10.1109\/TWC.2022.3178499","volume":"21","author":"Z Qin","year":"2022","unstructured":"Qin Z, Yin H, Cao Y, Li W, Gesbert D (2022) A partial reciprocity-based channel prediction framework for fdd massive mimo with high mobility. IEEE Trans. Wireless Commun. 21(11):9638\u20139652. https:\/\/doi.org\/10.1109\/TWC.2022.3178499","journal-title":"IEEE Trans. Wireless Commun."},{"key":"245_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/OJVT.2019.2962631","volume":"1","author":"MS Safari","year":"2020","unstructured":"Safari MS, Pourahmadi V, Sodagari S (2020) Deep ul2dl: Data-driven channel knowledge transfer from uplink to downlink. IEEE Open Journal of Vehicular Technology. 1:29\u201344. https:\/\/doi.org\/10.1109\/OJVT.2019.2962631","journal-title":"IEEE Open Journal of Vehicular Technology."},{"key":"245_CR27","doi-asserted-by":"publisher","unstructured":"El\u00a0Hajj\u00a0Shehadeh Y, Alfandi O, Tout K, Hogrefe D (2011) Intelligent mechanisms for key generation from multipath wireless channels. In: 2011 Wireless Telecommunications Symposium (WTS), pp. 1\u20136. https:\/\/doi.org\/10.1109\/WTS.2011.5960848","DOI":"10.1109\/WTS.2011.5960848"},{"issue":"2","key":"245_CR28","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MWC.2011.5751298","volume":"18","author":"YS Shiu","year":"2011","unstructured":"Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2):66\u201374. https:\/\/doi.org\/10.1109\/MWC.2011.5751298","journal-title":"IEEE Wirel. Commun."},{"key":"245_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.20.064040","volume":"20","author":"D Tupkary","year":"2023","unstructured":"Tupkary D, L\u00fctkenhaus N (2023) Using cascade in quantum key distribution. Phys. Rev. Appl. 20:064040. https:\/\/doi.org\/10.1103\/PhysRevApplied.20.064040","journal-title":"Phys. Rev. Appl."},{"issue":"7","key":"245_CR30","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1109\/LCOMM.2005.1461684","volume":"9","author":"TJ Willink","year":"2005","unstructured":"Willink TJ (2005) Improving power allocation to mimo eigenbeams under imperfect channel estimation. IEEE Commun. Lett. 9(7):622\u2013624. https:\/\/doi.org\/10.1109\/LCOMM.2005.1461684","journal-title":"IEEE Commun. Lett."},{"key":"245_CR31","doi-asserted-by":"publisher","unstructured":"Ye, H., Gao, F., Qian, J., Wang, H., Li, G.Y.: Deep learning-based denoise network for csi feedback in fdd massive mimo systems. IEEE Communications Letters. 24(8), 1742\u20131746 (2020) https:\/\/doi.org\/10.1109\/LCOMM.2020.2989499","DOI":"10.1109\/LCOMM.2020.2989499"},{"issue":"1","key":"245_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3429740","volume":"54","author":"W Xu","year":"2021","unstructured":"Xu W, Zhang J, Huang S, Luo C, Li W (2021) Key generation for internet of things: A contemporary survey. ACM Comput. Surv. 54(1):1\u201337","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"245_CR33","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Di Renzo M (2015) Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4):20\u201327. https:\/\/doi.org\/10.1109\/MCOM.2015.7081071","journal-title":"IEEE Commun. Mag."},{"issue":"8","key":"245_CR34","doi-asserted-by":"publisher","first-page":"1742","DOI":"10.1109\/LCOMM.2020.2989499","volume":"24","author":"H Ye","year":"2020","unstructured":"Ye H, Gao F, Qian J, Wang H, Li GY (2020) Deep learning-based denoise network for csi feedback in fdd massive mimo systems. IEEE Commun. Lett. 24(8):1742\u20131746. https:\/\/doi.org\/10.1109\/LCOMM.2020.2989499","journal-title":"IEEE Commun. Lett."},{"key":"245_CR35","doi-asserted-by":"publisher","unstructured":"Yu P, Zhou F, Zhang X, Qiu X, Kadoch M, Cheriet M (2020) Deep learning-based resource allocation for 5g broadband tv service. IEEE Trans. Broadcast. 66(4):800\u2013813. https:\/\/doi.org\/10.1109\/TBC.2020.2968730","DOI":"10.1109\/TBC.2020.2968730"},{"key":"245_CR36","doi-asserted-by":"publisher","unstructured":"Tupkary, D., L\u00fctkenhaus, N.: Using cascade in quantum key distribution. Phys. Rev. Appl. 20, 064040 (2023). https:\/\/doi.org\/10.1103\/PhysRevApplied.20.064040","DOI":"10.1103\/PhysRevApplied.20.064040"},{"key":"245_CR37","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comcom.2019.02.001","volume":"137","author":"F Zhan","year":"2019","unstructured":"Zhan F, Zhao Z, Chen Y, Yao N (2019) On the using of r\u00e9nyi\u2019s quadratic entropy for physical layer key generation. Comput. Commun. 137:32\u201343","journal-title":"Comput. Commun."},{"issue":"8","key":"245_CR38","doi-asserted-by":"publisher","first-page":"6081","DOI":"10.1109\/JIOT.2021.3109272","volume":"9","author":"X Zhang","year":"2022","unstructured":"Zhang X, Li G, Zhang J, Hu A, Hou Z, Xiao B (2022) Deep-learning-based physical-layer secret key generation for fdd systems. IEEE Internet Things J. 9(8):6081\u20136094. https:\/\/doi.org\/10.1109\/JIOT.2021.3109272","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"245_CR39","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.dcan.2022.03.004","volume":"9","author":"L Zhang","year":"2023","unstructured":"Zhang L, Wang P, Zhang Y, Chi Z, Tong N, Wang L, Li F (2023) An adaptive and robust secret key extraction scheme from high noise wireless channel in iiot. Digital Communications and Networks. 9(4):809\u2013816. https:\/\/doi.org\/10.1016\/j.dcan.2022.03.004","journal-title":"Digital Communications and Networks."},{"key":"245_CR40","doi-asserted-by":"publisher","unstructured":"Zhao D, Qin H, Song B, Zhang Y, Du X, Guizani M (2020) A reinforcement learning method for joint mode selection and power adaptation in the v2v communication network in 5g.\u00a0IEEE Transactions on Cognitive Communications and Networking. 6(2):452\u2013463. https:\/\/doi.org\/10.1109\/TCCN.2020.2983170","DOI":"10.1109\/TCCN.2020.2983170"},{"key":"245_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103779","volume":"83","author":"H Zhao","year":"2024","unstructured":"Zhao H, Guo E, Lian Z, Zhao Y, Huang X, Su C (2024) A review and implementation of physical layer channel key generation in the internet of things. Journal of Information Security and Applications. 83:103779. https:\/\/doi.org\/10.1016\/j.jisa.2024.103779","journal-title":"Journal of Information Security and Applications."},{"key":"245_CR42","doi-asserted-by":"publisher","unstructured":"Csiszar, I., Narayan, P.: Common randomness and secret key generation with a helper. IEEE Transactions on Information Theory. 46(2), 344\u2013366 (2000). https:\/\/doi.org\/10.1109\/18.825796","DOI":"10.1109\/18.825796"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00245-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00245-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00245-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T22:03:02Z","timestamp":1761775382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00245-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"references-count":42,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["245"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00245-6","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,24]]},"assertion":[{"value":"17 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare no conflicts of interest. This work was supported by the National Natural Science Foundation of China under Grant 62361010 and 62462012, the Major Scientific and Technological Special Project of Guizhou Province under Grant [2024]014, and the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province under Grant SKLACSS-202414.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest statement"}}],"article-number":"221"}}