{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:54:21Z","timestamp":1761598461586,"version":"3.41.2"},"reference-count":23,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","funder":[{"DOI":"10.13039\/501100015247","name":"State Grid Shandong Electric Power Company","doi-asserted-by":"publisher","award":["520626210001"],"award-info":[{"award-number":["520626210001"]}],"id":[{"id":"10.13039\/501100015247","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p> As the latest generation of cellular mobile communication technology, the fifth-generation (5G) mobile communication technology is proposed to build a network-based society. As a result, industry and academia are placing great emphasis on security research for 5G technology. 5G technology has higher security requirements than previous systems and the secondary authentication is an important technology to ensure the security of 5G. In this paper, we propose to incorporate the SM9 encryption algorithm with 5G secondary authentication to provide higher security assurance. Due to the high computational overhead of the SM9 algorithm, we further propose an acceleration strategy for the SM9 algorithm based on the non-adjacent form (NAF) representation method to improve the performance of the entire system. <\/jats:p>","DOI":"10.1142\/s0218126623500949","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T04:23:36Z","timestamp":1663647816000},"source":"Crossref","is-referenced-by-count":1,"title":["An SM9-Based Secondary Authentication Framework for 5G Technology"],"prefix":"10.1142","volume":"32","author":[{"given":"Rui","family":"Wang","sequence":"first","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Donglan","family":"Liu","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Han","family":"Liu","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Jianfei","family":"Chen","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.\u00a0R.\u00a0China"}]},{"given":"Zhenghao","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, Jinan, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"S0218126623500949BIB001","doi-asserted-by":"crossref","first-page":"7702","DOI":"10.1109\/JIOT.2019.2901840","volume":"6","author":"Zhu L.","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"S0218126623500949BIB002","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"Zhu L.","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"S0218126623500949BIB003","doi-asserted-by":"crossref","first-page":"23022","DOI":"10.1109\/ACCESS.2020.2970118","volume":"8","author":"Shafique K.","year":"2020","journal-title":"IEEE Access"},{"key":"S0218126623500949BIB004","first-page":"1","volume":"1","author":"Alliance NGMN","year":"2016","journal-title":"NGMN 5G P"},{"key":"S0218126623500949BIB005","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/MWC.2019.1800234","volume":"26","author":"Zhang S.","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"S0218126623500949BIB006","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIC.2017.3481355","volume":"21","author":"Li X.","year":"2017","journal-title":"IEEE Internet Comput."},{"key":"S0218126623500949BIB007","doi-asserted-by":"crossref","first-page":"5773","DOI":"10.1109\/TVT.2019.2957425","volume":"69","author":"Zhu L.","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"S0218126623500949BIB008","doi-asserted-by":"crossref","first-page":"36009","DOI":"10.1109\/ACCESS.2020.2975072","volume":"8","author":"Khan L. U.","year":"2020","journal-title":"IEEE Access"},{"key":"S0218126623500949BIB009","doi-asserted-by":"crossref","first-page":"9112","DOI":"10.1109\/TVT.2018.2865498","volume":"67","author":"Guan K.","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"S0218126623500949BIB010","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MCOM.2017.1600951","volume":"55","author":"Foukas X.","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"S0218126623500949BIB011","first-page":"1","volume":"61","author":"Ji X.","year":"2018","journal-title":"Sci. China Inf. Sci."},{"key":"S0218126623500949BIB012","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCOM.2016.7514161","volume":"54","author":"Samdanis K.","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"S0218126623500949BIB013","doi-asserted-by":"crossref","first-page":"616","DOI":"10.23919\/ICACT.2019.8701936","volume-title":"2019 21st Int. Conf. Advanced Communication Technology (ICACT)","author":"Lee W.","year":"2019"},{"key":"S0218126623500949BIB014","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-030-14234-6_1","volume-title":"Information Security and Cryptology, Inscrypt 2018","volume":"11449","author":"Cheng Z.","year":"2019"},{"key":"S0218126623500949BIB015","doi-asserted-by":"crossref","first-page":"22466","DOI":"10.1109\/ACCESS.2018.2827419","volume":"6","author":"Arfaoui G.","year":"2018","journal-title":"IEEE Access"},{"key":"S0218126623500949BIB016","first-page":"9701756","volume":"2018","author":"Zhang Q.","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"S0218126623500949BIB017","first-page":"256","volume-title":"Proc. 2017 2nd Int. Conf. Communication and Information Systems","author":"Zhen P.","year":"2017"},{"key":"S0218126623500949BIB018","first-page":"296","volume-title":"2021 Int. Conf. Computer Technology and Media Convergence Design (CTMCD)","author":"Hao Q.","year":"2021"},{"key":"S0218126623500949BIB019","first-page":"140","volume-title":"2021 31st Int. Telecommunication Networks and Applications Conf. (ITNAC)","author":"Ajit M.","year":"2021"},{"key":"S0218126623500949BIB020","doi-asserted-by":"crossref","first-page":"29612","DOI":"10.1109\/ACCESS.2022.3157876","volume":"10","author":"Yuan Z.","year":"2022","journal-title":"IEEE Access"},{"key":"S0218126623500949BIB021","doi-asserted-by":"crossref","first-page":"95507","DOI":"10.1109\/ACCESS.2021.3094902","volume":"9","author":"Liu S.","year":"2021","journal-title":"IEEE Access"},{"key":"S0218126623500949BIB022","first-page":"306","volume-title":"2019 15th Int. Conf. Computational Intelligence and Security (CIS)","author":"Shan W.","year":"2019"},{"key":"S0218126623500949BIB023","first-page":"78","volume-title":"Int. Conf. Pairing-Based Cryptography","author":"Scott M.","year":"2009"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126623500949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T05:47:14Z","timestamp":1681796834000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126623500949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,9]]},"references-count":23,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.1142\/S0218126623500949"],"URL":"https:\/\/doi.org\/10.1142\/s0218126623500949","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2022,11,9]]},"article-number":"2350094"}}