{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T03:58:44Z","timestamp":1768967924856,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531844","type":"print"},{"value":"9789819531851","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3185-1_9","type":"book-chapter","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:05:44Z","timestamp":1760421944000},"page":"137-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["RRSC: Revocable Ring Signature Scheme over\u00a0CRYSTALS-Dilithium for\u00a0VANETs"],"prefix":"10.1007","author":[{"given":"Yatao","family":"Yang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deng","family":"Pan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liangyu","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xin","family":"Chang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Alagic, G., Alperin-Sheriff, J., Bassily, R., et\u00a0al.: Status report on the first round of the NIST post-quantum cryptography standardization process. NIST Internal Report (NIST IR), vol. 8240 (2019)","DOI":"10.6028\/NIST.IR.8240"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Grassl, M., Langenberg, B., Roetteler, et\u00a0al.: Applying Grover\u2019s algorithm to AES: quantum resource estimates. In: International Workshop on Post-Quantum Cryptography, pp. 29\u201343. Springer (2016)","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Lanyon, B.P., Weinhold, T.J., Langford, et\u00a0al.: Experimental demonstration of Shor\u2019s algorithm with quantum entanglement. Phys. Rev. Lett. 99(25), 250505 (2007)","DOI":"10.1103\/PhysRevLett.99.250505"},{"key":"9_CR4","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1007\/s11390-007-9096-5","volume":"22","author":"Revocable ring signature","year":"2007","unstructured":"Revocable ring signature: Liu, D.Y., Liu, J.K., Mu, et al. J. Comput. Sci. Technol. 22, 785\u2013794 (2007)","journal-title":"J. Comput. Sci. Technol."},{"issue":"3","key":"9_CR5","doi-asserted-by":"publisher","first-page":"4698","DOI":"10.1109\/TVT.2024.3485671","volume":"74","author":"G Liu","year":"2024","unstructured":"Liu, G., Li, H., Le, J., et al.: LRCPA: Lattice-based robust and conditional privacy-preserving authentication for VANETS. IEEE Trans. Veh. Technol. 74(3), 4698\u20134712 (2024)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signature for ad hoc groups. In: Australasian Conference on Information Security and Privacy, pp. 325\u2013335. Springer (2004)","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"65760","DOI":"10.1109\/ACCESS.2022.3183605","volume":"10","author":"MJN Mahi","year":"2022","unstructured":"Mahi, M.J.N., Chaki, S., Ahmed, S., et al.: A review on vanet research: Perspective of recent emerging technologies. IEEE Access 10, 65760\u201365783 (2022)","journal-title":"IEEE Access"},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"5463","DOI":"10.1109\/JSYST.2020.2980297","volume":"14","author":"P Mundhe","year":"2020","unstructured":"Mundhe, P., Yadav, V.K., Verma, S., Venkatesan, S.: Efficient lattice-based ring signature for message authentication in VANETS. IEEE Syst. J. 14(4), 5463\u20135474 (2020)","journal-title":"IEEE Syst. J."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Perera, M.N.S., Nakamura, T., Hashimoto, M., et\u00a0al.: A survey on group signatures and ring signatures: traceability vs. anonymity. Cryptography 6(1), 3 (2022)","DOI":"10.3390\/cryptography6010003"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: 7th International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT 2001), Australia, December 9\u201313, 2001. pp. 552\u2013565. Springer (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Russo, A., Anta, A.F., Vasco, M.I.G., Romano, S.P.: ChiroTonia: a scalable and secure e-voting framework based on blockchains and linkable ring signatures. In: 2021 IEEE International Conference on Blockchain (Blockchain), pp. 417\u2013424. IEEE (2021)","DOI":"10.1109\/Blockchain53845.2021.00065"},{"issue":"2","key":"9_CR12","first-page":"475","volume":"43","author":"Y Yang","year":"2021","unstructured":"Yang, Y., Zhao, Y., Zhang, J., et al.: Recent development of theory and application on homomorphic encryption. J. Electron. Inf. Technol. 43(2), 475\u2013487 (2021)","journal-title":"J. Electron. Inf. Technol."},{"issue":"11","key":"9_CR13","first-page":"180","volume":"40","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Han, X., Huang, J., et al.: Bidirectional authentication key agreement protocol supporting identity\u2019s privacy preservation based on RLWE. J. Commun. 40(11), 180\u2013186 (2019)","journal-title":"J. Commun."},{"key":"9_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119536","volume":"648","author":"Q Ye","year":"2023","unstructured":"Ye, Q., Lang, Y., Guo, H., Tang, Y.: Efficient lattice-based traceable ring signature scheme with its application in blockchain. Inf. Sci. 648, 119536 (2023)","journal-title":"Inf. Sci."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Atapattu, S., Wang, Y., Sun, S., Sithamparanathan, K.: Optimal cooperative mac strategies for wireless vanets with multiple roadside units. IEEE Trans. Veh. Technol. 74, 877\u2013893 (2024)","DOI":"10.1109\/TVT.2024.3456082"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3185-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:05:51Z","timestamp":1760421951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3185-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9789819531844","9789819531851"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3185-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}