{"id":"https://openalex.org/W4229048288","doi":"https://doi.org/10.1145/3507657.3528540","title":"A Post-Quantum Secure Subscription Concealed Identifier for 6G","display_name":"A Post-Quantum Secure Subscription Concealed Identifier for 6G","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4229048288","doi":"https://doi.org/10.1145/3507657.3528540"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3528540","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3528540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086828434","display_name":"Vincent Ulitzsch","orcid":"https://orcid.org/0000-0002-7967-2103"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Vincent Quentin Ulitzsch","raw_affiliation_strings":["Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081481350","display_name":"Shinjo Park","orcid":"https://orcid.org/0000-0002-8569-1327"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Shinjo Park","raw_affiliation_strings":["Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052881645","display_name":"Soundes Marzougui","orcid":"https://orcid.org/0000-0003-2191-172X"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Soundes Marzougui","raw_affiliation_strings":["Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001159554","display_name":"Jean\u2010Pierre Seifert","orcid":"https://orcid.org/0000-0002-5372-4825"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]},{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Seifert","raw_affiliation_strings":["Technische Universit\u00e4t Berlin, Fraunhofer Institute for Secure Information Technology, Berlin, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Berlin, Fraunhofer Institute for Secure Information Technology, Berlin, Darmstadt, Germany","institution_ids":["https://openalex.org/I4210133470","https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086828434"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":2.9186,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.91985017,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"157","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7564586400985718},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.587910532951355},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5655307173728943},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5254482626914978},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49717071652412415},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4391057789325714},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.4139483571052551},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.39286717772483826},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2873803973197937},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.2563817501068115},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08491325378417969}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7564586400985718},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.587910532951355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5655307173728943},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5254482626914978},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49717071652412415},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4391057789325714},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.4139483571052551},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.39286717772483826},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2873803973197937},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.2563817501068115},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08491325378417969},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3507657.3528540","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3528540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/434420","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/434420","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W191000419","https://openalex.org/W1982227476","https://openalex.org/W2042280942","https://openalex.org/W2084652510","https://openalex.org/W2294912729","https://openalex.org/W2944879713","https://openalex.org/W2945358264","https://openalex.org/W2951773754","https://openalex.org/W2963061006","https://openalex.org/W2968953378","https://openalex.org/W2979004593","https://openalex.org/W2983195505","https://openalex.org/W3014223651","https://openalex.org/W3023478445","https://openalex.org/W3023890793","https://openalex.org/W3041378054","https://openalex.org/W3086670598","https://openalex.org/W3091959406","https://openalex.org/W3105319862","https://openalex.org/W3157712399","https://openalex.org/W3161394282","https://openalex.org/W3172023548","https://openalex.org/W3176721475","https://openalex.org/W3193390955","https://openalex.org/W3203547317","https://openalex.org/W3213574559","https://openalex.org/W4241443238","https://openalex.org/W4297831737","https://openalex.org/W4300349690"],"related_works":["https://openalex.org/W2077461987","https://openalex.org/W1891552123","https://openalex.org/W1499103434","https://openalex.org/W1810303253","https://openalex.org/W2915550258","https://openalex.org/W2662454373","https://openalex.org/W1490519238","https://openalex.org/W3210507754","https://openalex.org/W2149350464","https://openalex.org/W2370270697"],"abstract_inverted_index":{"5G":[0,278],"saw":[1],"the":[2,9,18,26,44,50,58,64,68,75,80,84,87,99,106,129,148,168,178,182,213,217,229,233,253,266,283],"introduction":[3],"of":[4,17,29,46,53,74,86,132,212,222,252],"an":[5,194],"encrypted":[6],"user":[7],"identifier,":[8],"Subscriber":[10],"Concealed":[11],"Identifier":[12],"(SUCI),":[13],"to":[14,62,108,141,158,216,282],"provide":[15,236],"confidentiality":[16,41,65],"subscriber's":[19],"whereabouts":[20],"and":[21,102,110,119,134,150,243,260,263,279,293],"identities.":[22],"The":[23,72],"SUCI":[24,69,81,169,184,196],"protects":[25],"new":[27],"generation":[28],"cellular":[30,47,154],"networks":[31],"against":[32],"tracking":[33],"devices,":[34],"so-called":[35],"IMSI-catchers,":[36],"which":[37],"have":[38],"undermined":[39],"users'":[40],"ever":[42],"since":[43],"inception":[45],"networks.":[48,155],"However,":[49],"potential":[51],"advent":[52],"large-scale":[54],"quantum":[55,95,115,189],"computers":[56],"in":[57,114,181,231],"near":[59],"future":[60],"threatens":[61],"compromise":[63],"provided":[66],"by":[67],"yet":[70],"again.":[71],"security":[73],"public-key":[76],"cryptography":[77,101,146,225],"that":[78],"underpins":[79],"relies":[82],"on":[83,200,239],"hardness":[85],"discrete":[88],"logarithm":[89],"problem.":[90],"Using":[91],"Shor's":[92],"algorithm,":[93],"a":[94,120,125,163,240],"adversary":[96],"could":[97],"break":[98],"SUCI's":[100],"once":[103],"more":[104],"gain":[105],"capability":[107],"track":[109],"identify":[111,261],"users.":[112],"Advancements":[113],"computing":[116],"are":[117],"unpredictable,":[118],"breakthrough":[121],"might":[122],"be":[123,275],"only":[124,294],"decade":[126],"away.":[127],"Given":[128],"slow":[130],"nature":[131],"standards":[133],"their":[135],"implementation,":[136],"it":[137],"is":[138],"thus":[139],"necessary":[140],"already":[142],"integrate":[143],"now":[144],"quantum-resistant":[145],"into":[147,277],"current":[149,183],"also":[151],"next-generation":[152],"(6G)":[153],"To":[156,172],"contribute":[157],"this":[159,173],"development,":[160],"we":[161,175],"propose":[162],"post-quantum":[164,201,223],"secure":[165,202,224],"scheme":[166,186,198,208],"for":[167,220],"calculation,":[170],"\\textttKEMSUCI.":[171],"end,":[174],"first":[176],"analyze":[177],"weak":[179],"points":[180],"calculation":[185,197],"when":[187],"considering":[188],"attacks.":[190],"We":[191,249],"then":[192],"describe":[193],"alternative":[195],"based":[199],"key-encapsulation":[203],"mechanisms":[204],"(KEMs).":[205],"Our":[206],"proposed":[207],"can":[209,274],"use":[210],"any":[211],"KEMs":[214],"submitted":[215],"NIST":[218,254],"call":[219],"standardization":[221],"(PQC)":[226],"schemes.":[227],"For":[228],"usage":[230],"\\textttKEMSUCI,":[232],"KEM":[234],"should":[235],"efficient":[237],"execution":[238,291],"SIM":[241],"card":[242],"induce":[244],"little":[245,295],"network":[246],"communication":[247,296],"overhead.":[248,297],"evaluate":[250],"all":[251],"PQC":[255],"finalists":[256],"under":[257],"these":[258,271],"aspects":[259],"Kyber":[262],"Saber":[264],"as":[265],"best":[267],"fit.":[268],"Instantiated":[269],"with":[270],"KEMs,":[272],"\\textttKEMSUCI":[273,288],"integrated":[276],"6G.":[280],"Compared":[281],"existing":[284],"SUPI":[285],"protection":[286],"schemes,":[287],"exhibits":[289],"faster":[290],"speed":[292]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
