{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:15Z","timestamp":1758987615421,"version":"3.44.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02045-1","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:35:49Z","timestamp":1752140149000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis and enhancement of a quantum-secure two-party authentication protocol for mobile devices"],"prefix":"10.1007","volume":"18","author":[{"given":"Mohammad\u00a0Reza","family":"Saeidi","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"issue":"6","key":"2045_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/tit.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654. https:\/\/doi.org\/10.1109\/tit.1976.1055638","journal-title":"IEEE Trans Inf Theory"},{"key":"2045_CR2","doi-asserted-by":"publisher","unstructured":"Shor PW (1994) Algorithms for quantum computation: Discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. SFCS-94. IEEE Comput Soc Press. https:\/\/doi.org\/10.1109\/sfcs.1994.365700","DOI":"10.1109\/sfcs.1994.365700"},{"issue":"5","key":"2045_CR3","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/s0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor PW (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5):1484\u20131509. https:\/\/doi.org\/10.1137\/s0097539795293172","journal-title":"SIAM J Comput"},{"key":"2045_CR4","doi-asserted-by":"publisher","unstructured":"Ding J, Alsayigh S, Saraswathy RV, Fluhrer S, Lin X (2017) Leakage of signal function with reused keys in rlwe key exchange. In: 2017 IEEE international conference on communications (ICC). IEEE Paris France. https:\/\/doi.org\/10.1109\/icc.2017.7996806","DOI":"10.1109\/icc.2017.7996806"},{"key":"2045_CR5","unstructured":"Fluhrer S (2016) Cryptanalysis of ring-lwe based key exchange with key share reuse. Cryptol ePrint Arch"},{"issue":"5","key":"2045_CR6","doi-asserted-by":"publisher","first-page":"2548","DOI":"10.1007\/s12083-023-01534-5","volume":"16","author":"B Moony","year":"2023","unstructured":"Moony B, Barnwal AK, Singh M, Mishra D (2023) Quantum secure two party authentication protocol for mobile devices. Peer-to-Peer Netw Appl 16(5):2548\u20132559. https:\/\/doi.org\/10.1007\/s12083-023-01534-5","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2045_CR7","doi-asserted-by":"publisher","unstructured":"Bellovin SM, Merritt M (1992) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings 1992 IEEE computer society symposium on research in security and privacy. IEEE Comput Soc Press. https:\/\/doi.org\/10.1109\/risp.1992.213269","DOI":"10.1109\/risp.1992.213269"},{"key":"2045_CR8","doi-asserted-by":"publisher","unstructured":"Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks, Springer Berlin Heidelberg, pp 139\u2013155. https:\/\/doi.org\/10.1007\/3-540-45539-6_11","DOI":"10.1007\/3-540-45539-6_11"},{"key":"2045_CR9","doi-asserted-by":"publisher","unstructured":"Horn G, Preneel B (1998) Authentication and payment in future mobile systems, Springer Berlin Heidelberg, pp 277\u2013293 .https:\/\/doi.org\/10.1007\/bfb0055870","DOI":"10.1007\/bfb0055870"},{"issue":"1","key":"2045_CR10","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/tce.2004.1277867","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231\u2013235. https:\/\/doi.org\/10.1109\/tce.2004.1277867","journal-title":"IEEE Trans Consum Electron"},{"key":"2045_CR11","doi-asserted-by":"publisher","unstructured":"Viet DQ, Yamamura A, Tanaka H (2005) Anonymous password-based authenticated key exchange, Springer Berlin Heidelberg, pp 244\u2013257. https:\/\/doi.org\/10.1007\/11596219_20","DOI":"10.1007\/11596219_20"},{"key":"2045_CR12","doi-asserted-by":"publisher","unstructured":"Yang Y, Zhou J, Weng J, Bao F (2009) A new approach for anonymous password authentication. In: 2009 Annual computer security applications conference, IEEE Honolulu Hawaii USA, pp 199\u2013208. https:\/\/doi.org\/10.1109\/acsac.2009.26","DOI":"10.1109\/acsac.2009.26"},{"key":"2045_CR13","doi-asserted-by":"publisher","unstructured":"Yang Y, Zhou J, Wong JW, Bao F (2010) Towards practical anonymous password authentication. In: Proceedings of the 26th Annual computer security applications conference. ACSAC \u201910, ACM Austin Texas USA, pp 59\u201368. https:\/\/doi.org\/10.1145\/1920261.1920271","DOI":"10.1145\/1920261.1920271"},{"key":"2045_CR14","doi-asserted-by":"publisher","unstructured":"Ajtai M (1996) Generating hard instances of lattice problems (extended abstract). In: Proceedings of the 28th Annual acm symposium on theory of computing - STOC \u201996. STOC \u201996, ACM Press Philadelphia, Pennsylvania United States, pp 99\u2013108. https:\/\/doi.org\/10.1145\/237814.237838","DOI":"10.1145\/237814.237838"},{"key":"2045_CR15","doi-asserted-by":"publisher","unstructured":"Regev O (2005) On lattices learning with errors random linear codes and cryptography. In: Proceedings of the 37th Annual ACM symposium on theory of computing. STOC \u201905, Association for Computing Machinery New York NY USA, pp 84\u201393. https:\/\/doi.org\/10.1145\/1060590.1060603","DOI":"10.1145\/1060590.1060603"},{"key":"2045_CR16","doi-asserted-by":"publisher","unstructured":"Lyubashevsky V, Peikert C, Regev O (2010) On Ideal lattices and learning with errors over rings, Springer Berlin Heidelberg , pp 1\u201323. https:\/\/doi.org\/10.1007\/978-3-642-13190-5_1","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"2045_CR17","doi-asserted-by":"publisher","unstructured":"Bos J.W, Costello C, Naehrig M, Stebila D (2015) Post-quantum key exchange for the tls protocol from the ring learning with errors problem. In: 2015 IEEE symposium on security and privacy. IEEE San Jose CA. https:\/\/doi.org\/10.1109\/sp.2015.40","DOI":"10.1109\/sp.2015.40"},{"key":"2045_CR18","unstructured":"Alkim E, Ducas L, P\u00f6ppelmann T, Schwabe P (2016) Post-quantum key exchange: A new hope. In: Proceedings of the 25th USENIX conference on security symposium. SEC\u201916, USENIX Association USA, pp 327\u2013343"},{"issue":"3","key":"2045_CR19","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s10623-014-9972-2","volume":"76","author":"A Fujioka","year":"2014","unstructured":"Fujioka A, Suzuki K, Xagawa K, Yoneyama K (2014) Strongly secure authenticated key exchange from factoring codes and lattices. Des Codes Crypt 76(3):469\u2013504. https:\/\/doi.org\/10.1007\/s10623-014-9972-2","journal-title":"Des Codes Crypt"},{"key":"2045_CR20","doi-asserted-by":"publisher","unstructured":"Zhang J, Zhang Z, Ding J, Snook M, Dagdelen O (2015) Authenticated key exchange from ideal lattices, Springer Berlin Heidelberg, pp 719\u2013751. https:\/\/doi.org\/10.1007\/978-3-662-46803-6_24","DOI":"10.1007\/978-3-662-46803-6_24"},{"key":"2045_CR21","doi-asserted-by":"publisher","unstructured":"Katz J, Vaikuntanathan V (2009) Smooth projective hashing and password-based authenticated key exchange from lattices, Springer Berlin, Heidelberg, pp 636\u2013652.https:\/\/doi.org\/10.1007\/978-3-642-10366-7_37","DOI":"10.1007\/978-3-642-10366-7_37"},{"key":"2045_CR22","doi-asserted-by":"publisher","unstructured":"Ding J, Alsayigh S, Lancrenon J, RV S, Snook M (2017) Provably secure password authenticated key exchange based on RLWE for the post-quantum world, Springer Cham, pp 183\u2013204. https:\/\/doi.org\/10.1007\/978-3-319-52153-4_11","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"2045_CR23","doi-asserted-by":"publisher","unstructured":"Boyko V, MacKenzie P, Patel S (2000) Provably secure password-authenticated key exchange using diffie-hellman, Springer Berlin Heidelberg, pp 156\u2013171. https:\/\/doi.org\/10.1007\/3-540-45539-6_12","DOI":"10.1007\/3-540-45539-6_12"},{"key":"2045_CR24","unstructured":"Ding J, Xie X, Lin X (2012) A simple provably secure key exchange scheme based on the learning with errors problem. Cryptol ePrint Arch"},{"key":"2045_CR25","doi-asserted-by":"publisher","unstructured":"Seyhan K, Akleylek S (2023) A new password-authenticated module learning with rounding-based key exchange protocol: Saber.pake. J Supercomput 79(16):17859\u201317896. https:\/\/doi.org\/10.1007\/s11227-023-05251-x","DOI":"10.1007\/s11227-023-05251-x"},{"key":"2045_CR26","doi-asserted-by":"publisher","unstructured":"D\u2019Anvers JP, Karmakar A, Sinha\u00a0Roy S, Vercauteren F (2018) Saber: Module-LWR Based Key Exchange CPA-Secure Encryption and CCA-Secure KEM, Springer Cham, pp 282\u2013305. https:\/\/doi.org\/10.1007\/978-3-319-89339-6_16","DOI":"10.1007\/978-3-319-89339-6_16"},{"issue":"3","key":"2045_CR27","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/jsyst.2018.2851295","volume":"13","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D, Zeadally S, Kumar N, Liang K (2019) Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Syst J 13(3):2775\u20132785. https:\/\/doi.org\/10.1109\/jsyst.2018.2851295","journal-title":"IEEE Syst J"},{"issue":"4","key":"2045_CR28","doi-asserted-by":"publisher","first-page":"5067","DOI":"10.1109\/jsyst.2020.3023808","volume":"15","author":"V Dabra","year":"2021","unstructured":"Dabra V, Bala A, Kumari S (2021) Lba-pake: Lattice-based anonymous password authenticated key exchange for mobile devices. IEEE Syst J 15(4):5067\u20135077. https:\/\/doi.org\/10.1109\/jsyst.2020.3023808","journal-title":"IEEE Syst J"},{"issue":"3","key":"2045_CR29","doi-asserted-by":"publisher","first-page":"5035","DOI":"10.1109\/jsyst.2022.3161264","volume":"16","author":"R Ding","year":"2022","unstructured":"Ding R, Cheng C, Qin YQ (2022) Further analysis and improvements of a lattice-based anonymous pake scheme. IEEE Syst J 16(3):5035\u20135043. https:\/\/doi.org\/10.1109\/jsyst.2022.3161264","journal-title":"IEEE Syst J"},{"key":"2045_CR30","doi-asserted-by":"publisher","unstructured":"Chaudhary D, Dadsena PK, Pal Y, Yadav D, Jain J, Kumar MR, Preetham LM (2024) Security issues and solutions in post quantum authenticated key exchange for mobile devices, Springer Singapore , pp 125\u2013134. https:\/\/doi.org\/10.1007\/978-981-99-7862-5_10","DOI":"10.1007\/978-981-99-7862-5_10"},{"key":"2045_CR31","doi-asserted-by":"publisher","unstructured":"Rana S, Mishra D (2021) Lattice-based key agreement protocol under ring-lwe problem for iot-enabled smart devices. S\u0101dhan\u0101. 46(2).https:\/\/doi.org\/10.1007\/s12046-021-01607-2","DOI":"10.1007\/s12046-021-01607-2"},{"key":"2045_CR32","doi-asserted-by":"publisher","unstructured":"Yadav S, Dabra V, Malik P, Kumari S, Chen CM (2022) Cryptanalysis and improvement of rana-mishra\u2019s lattice-based key agreement protocol under ring-lwe problem for iot enabled smart devices. https:\/\/doi.org\/10.21203\/rs.3.rs-1337663\/v1","DOI":"10.21203\/rs.3.rs-1337663\/v1"},{"key":"2045_CR33","doi-asserted-by":"publisher","unstructured":"Saeidi MR, Mala H (2024) Further analysis of \u201clattice-based key agreement protocol under ring-lwe problem for iot-enabled smart devices\". https:\/\/doi.org\/10.21203\/rs.3.rs-4970556\/v1","DOI":"10.21203\/rs.3.rs-4970556\/v1"},{"issue":"3","key":"2045_CR34","doi-asserted-by":"publisher","first-page":"2680","DOI":"10.1109\/jiot.2022.3213990","volume":"10","author":"D Dharminder","year":"2023","unstructured":"Dharminder D, Reddy CB, Das AK, Park Y, Jamal SS (2023) Post-quantum lattice-based secure reconciliation enabled key agreement protocol for iot. IEEE Internet Things J 10(3):2680\u20132692. https:\/\/doi.org\/10.1109\/jiot.2022.3213990","journal-title":"IEEE Internet Things J"},{"key":"2045_CR35","unstructured":"Abri M, Mala H (2024) Cryptanalysis of two post-quantum authenticated key agreement protocols. Cryptol ePrint Arch Pap 2024\/1177. https:\/\/eprint.iacr.org\/2024\/1177"},{"key":"2045_CR36","doi-asserted-by":"publisher","unstructured":"Khan N, Jianbiao Z, Ullah I, Salman\u00a0Pathan M, Lim H (2023) Lattice-based authentication scheme to prevent quantum attack in public cloud environment. Comput Mater Contin 75(1):35\u201349. https:\/\/doi.org\/10.32604\/cmc.2023.036189","DOI":"10.32604\/cmc.2023.036189"},{"issue":"5","key":"2045_CR37","doi-asserted-by":"publisher","first-page":"2012","DOI":"10.1109\/tsc.2024.3433534","volume":"17","author":"Y Huang","year":"2024","unstructured":"Huang Y, Xu G, Song X, Xu Y (2024) An efficient rlwe-based privacy-preserving authentication scheme based on edge computing in industrial internet of things. IEEE Trans Serv Comput 17(5):2012\u20132026. https:\/\/doi.org\/10.1109\/tsc.2024.3433534","journal-title":"IEEE Trans Serv Comput"},{"key":"2045_CR38","doi-asserted-by":"publisher","unstructured":"Pursharthi K, Mishra D (2025) Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices. Peer-to-Peer Netw Appl 18(3). https:\/\/doi.org\/10.1007\/s12083-025-01937-6","DOI":"10.1007\/s12083-025-01937-6"},{"key":"2045_CR39","doi-asserted-by":"publisher","unstructured":"Pursharthi K, Mishra D (2023) A computationally efficient and randomized rlwe-based key exchange scheme. Clust Comput 27(2):1599\u20131610. https:\/\/doi.org\/10.1007\/s10586-023-04032-8","DOI":"10.1007\/s10586-023-04032-8"},{"key":"2045_CR40","doi-asserted-by":"publisher","unstructured":"Pursharthi K, Mishra D (2024) Towards post-quantum authenticated key agreement scheme for mobile devices. J Inf Secur Appl 82:103754. https:\/\/doi.org\/10.1016\/j.jisa.2024.103754","DOI":"10.1016\/j.jisa.2024.103754"},{"key":"2045_CR41","doi-asserted-by":"publisher","unstructured":"Kumar U, Garg M, Kumari S, Dharminder D (2022) A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication. Trans Emerg Telecommun Technol 34(1). https:\/\/doi.org\/10.1002\/ett.4660","DOI":"10.1002\/ett.4660"},{"issue":"4","key":"2045_CR42","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.1007\/s12083-024-01676-0","volume":"17","author":"G Wei","year":"2024","unstructured":"Wei G, Fan K, Zhang K, Wang H, Wang Y, Yang K, Li H, Yang Y (2024) Lower rounds lattice-based anonymous aka under the seck model for the iot. Peer-to-Peer Netw Appl 17(4):2031\u20132046. https:\/\/doi.org\/10.1007\/s12083-024-01676-0","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2045_CR43","doi-asserted-by":"publisher","unstructured":"Chaudhary D, Lee CC (2024) Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for internet of drones. Comput Electr Eng 120:109774. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109774","DOI":"10.1016\/j.compeleceng.2024.109774"},{"key":"2045_CR44","doi-asserted-by":"publisher","unstructured":"Kumar U, Garg M, Chaudhary D (2024) Design and analysis of a post-quantum secure three party authenticated key agreement protocol based on ring learning with error for mobile device. J Supercomput 81(1). https:\/\/doi.org\/10.1007\/s11227-024-06467-1","DOI":"10.1007\/s11227-024-06467-1"},{"key":"2045_CR45","doi-asserted-by":"publisher","unstructured":"Adeli M, Bagheri N, Maimani HR, Kumari S, Rodrigues JJPC (2024) A post-quantum compliant authentication scheme for iot healthcare systems. IEEE Int Things J 11(4):6111\u20136118. https:\/\/doi.org\/10.1109\/jiot.2023.3309931","DOI":"10.1109\/jiot.2023.3309931"},{"key":"2045_CR46","unstructured":"Kirkwood D, Lackey B.C, McVey J, Motley M, Solinas JA, Tuller D (2015) Failure is not an option: Standardization issues for post-quantum key agreement. In: Workshop on cybersecurity in a post-quantum world, p 21"},{"key":"2045_CR47","doi-asserted-by":"crossref","unstructured":"Peikert C (2014) Lattice cryptography for the internet. In: Post-quantum cryptography. Lecture notes in computer science, Springer Champp 197\u2013219","DOI":"10.1007\/978-3-319-11659-4_12"},{"key":"2045_CR48","doi-asserted-by":"publisher","unstructured":"Ding J, Fluhrer S, Rv S (2018) Complete attack on RLWE key exchange with reused keys without signal leakage, Springer Cham, pp 467\u2013486. https:\/\/doi.org\/10.1007\/978-3-319-93638-3_27","DOI":"10.1007\/978-3-319-93638-3_27"},{"issue":"1","key":"2045_CR49","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1137\/s0097539705447360","volume":"37","author":"D Micciancio","year":"2007","unstructured":"Micciancio D, Regev O (2007) Worst-case to average-case reductions based on gaussian measures. SIAM J Comput 37(1):267\u2013302. https:\/\/doi.org\/10.1137\/s0097539705447360","journal-title":"SIAM J Comput"},{"issue":"2","key":"2045_CR50","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/tit.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208. https:\/\/doi.org\/10.1109\/tit.1983.1056650","journal-title":"IEEE Trans Inf Theory"},{"key":"2045_CR51","doi-asserted-by":"publisher","unstructured":"Boyd C, Mathuria A, Stebila D (2020) Protocols for authentication and key establishment. Springer Berlin Germany. https:\/\/doi.org\/10.1007\/978-3-662-58146-9","DOI":"10.1007\/978-3-662-58146-9"},{"key":"2045_CR52","unstructured":"Shoup V (2004) Sequences of games: A tool for taming complexity in security proofs. Cryptol ePrint Arch Pap 2004\/332. https:\/\/eprint.iacr.org\/2004\/332"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02045-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02045-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02045-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:33Z","timestamp":1758986553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02045-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2045"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02045-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"27 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest\/competing interests to report regarding the present work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest\/Competing interests"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Financial and non-financial interests"}},{"value":"Not applicable for the present work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable for the present work.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors have agreed and given their consent for submission of this paper to the Peer-to-Peer Networking and Applications.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable for the present work.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}},{"value":"Not applicable for the present work.","order":8,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"239"}}