{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:57:09Z","timestamp":1770155829872,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_5","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:57:50Z","timestamp":1770109070000},"page":"77-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for\u00a0VANETs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4447-4469","authenticated-orcid":false,"given":"Zhenhua","family":"Han","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2783-0907","authenticated-orcid":false,"given":"Gang","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6658-851X","authenticated-orcid":false,"given":"Jiazheng","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111505","volume":"270","author":"G Zheng","year":"2025","unstructured":"Zheng, G., Cao, L., Men, H., Li, Y., Chen, L.: Research on data security delivery algorithm for crowdsourcing scenario in Internet of Vehicles. Comput. Networks 270, 111505 (2025)","journal-title":"Comput. Networks"},{"issue":"1","key":"5_CR2","first-page":"124","volume":"12","author":"W Wu","year":"2025","unstructured":"Wu, W., Ye, F.: A secure and efficient certificateless aggregate signature authentication scheme with pseudonyms for VANETs. IEEE Internet Things J. 12(1), 124\u2013139 (2025)","journal-title":"IEEE Internet Things J."},{"key":"5_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104145","volume":"148","author":"X Dang","year":"2025","unstructured":"Dang, X., Zhang, G., Sun, K., Li, Y.: A trust model for VANETs using malicious-aware multiple routing. Comput. Secur. 148, 104145 (2025)","journal-title":"Comput. Secur."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Nagaraju, L., Saini, I.: A comparative survey on RSU misbehaviour detection in VANET. In: 2024 IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp.1\u20136. Ahmedabad, India (2024)","DOI":"10.1109\/ICVES61986.2024.10928101"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Ma, X. and Trivedi, K. S.: SINR-based analysis of IEEE 802.11p\/bd broadcast VANETs for safety services. IEEE Trans. Netw. Serv. Manag., 18, pp.2672\u20132686 (2021)","DOI":"10.1109\/TNSM.2021.3069206"},{"key":"5_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100418","volume":"41","author":"P Shah","year":"2021","unstructured":"Shah, P., Kasbe, T.: A review on specification evaluation of broadcasting routing protocols in VANET. Comput. Sci. Rev. 41, 100418 (2021)","journal-title":"Comput. Sci. Rev."},{"key":"5_CR7","unstructured":"M. Placek, \"Connected cars worldwide,\" - statistics & facts, Accessed: 2023. [Online]. Available: https:\/\/www.statista.com\/topics\/1918\/connected-cars\/#topicOverview"},{"key":"5_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100411","volume":"41","author":"P Mundhe","year":"2021","unstructured":"Mundhe, P., Verma, S., Venkatesan, S.: A comprehensive survey on authentication and privacy-preserving schemes in VANETs. Comput. Sci. Rev. 41, 100411 (2021)","journal-title":"Comput. Sci. Rev."},{"issue":"6","key":"5_CR9","doi-asserted-by":"publisher","first-page":"2905","DOI":"10.1007\/s00500-025-10571-6","volume":"29","author":"MH Badole","year":"2025","unstructured":"Badole, M.H., Thakare, A., Oliva, D.: Evolutionary optimization in VANET services: a comprehensive survey, challenges and futuristic approach. Soft. Comput. 29(6), 2905\u20132929 (2025)","journal-title":"Soft. Comput."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, R., Gill, R., Singh, A., Kumar, R., Singh, D., Al-Farouni, M.: A comprehensive analysis of internet of vehicle security vulnerabilities in smart cities. In: 2024 International Conference on Data Science and Network Security (ICDSNS), pp. 1\u20136. Tiptur, India (2024)","DOI":"10.1109\/ICDSNS62112.2024.10690952"},{"issue":"20","key":"5_CR11","doi-asserted-by":"publisher","first-page":"19744","DOI":"10.1109\/JIOT.2022.3168726","volume":"9","author":"Z Siddiqui","year":"2022","unstructured":"Siddiqui, Z., Gao, J., Khan, M.: Khurram: An improved lightweight PUF\u2013PKI digital certificate authentication scheme for the internet of things. IEEE Internet Things J. 9(20), 19744\u201319756 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Fares, N., Wang, B., Bakiras, S.: Design and implementation of certificateless cryptography for IoT applications. In: 2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 933\u2013937. Tempe, AZ, USA (2023)","DOI":"10.1109\/MWSCAS57524.2023.10405921"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Rousselot, A., Cuppens, N., Bouakkaz, S.: AIS authentication using certificateless cryptography. In: Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT), pp. 49\u201361. SciTePress (2023)","DOI":"10.5220\/0012054600003555"},{"issue":"5","key":"5_CR14","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/s10586-024-04889-3","volume":"28","author":"R Ullah","year":"2025","unstructured":"Ullah, R., Mehmood, A., Khan, M.A., et al.: Provably secure multilayers certificateless proxy signature for industrial internet of things. Cluster Comput. 28(5), 312 (2025)","journal-title":"Cluster Comput."},{"issue":"15","key":"5_CR15","doi-asserted-by":"publisher","first-page":"26191","DOI":"10.1109\/JIOT.2024.3393000","volume":"11","author":"Q Zhang","year":"2024","unstructured":"Zhang, Q., Sun, Y., Lu, Y., Xia, N., Wu, G.: Efficient certificateless aggregate designated verifier signature with conditional privacy preserving in VANETs. IEEE Internet Things J. 11(15), 26191\u201326202 (2024)","journal-title":"IEEE Internet Things J."},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26","DOI":"10.1007\/3-540-39200-9_26"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.adhoc.2023.103134","volume":"144","author":"Z Gong","year":"2023","unstructured":"Gong, Z., Gao, T., Guo, N.: PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs. Ad Hoc Netw. 144, 103\u2013134 (2023)","journal-title":"Ad Hoc Netw."},{"issue":"12","key":"5_CR18","first-page":"1662","volume":"30","author":"RK Verma","year":"2024","unstructured":"Verma, R.K., Khan, A.J., Kashyap, S., Chande, M.K.: Certificateless aggregate signatures: A comprehensive survey and comparative analysis. J. UCS 30(12), 1662\u20131690 (2024)","journal-title":"J. UCS"},{"issue":"1","key":"5_CR19","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JSYST.2022.3213245","volume":"17","author":"W Xiong","year":"2023","unstructured":"Xiong, W., Wang, R., Wang, Y., Wei, Y., Zhou, F., Luo, X.: Improved certificateless aggregate signature scheme against collusion attacks for VANETs. IEEE Syst. J. 17(1), 1098\u20131109 (2023)","journal-title":"IEEE Syst. J."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Farran, H., Khoury, D.: Performance improvements of vehicular PKI protocol for the security of V2X communications. In: 2023 46th International Conference on Telecommunications and Signal Processing (TSP), pp. 177\u2013182. Prague, Czech Republic (2023)","DOI":"10.1109\/TSP59544.2023.10197762"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Angelogianni, A., Krontiris, I., Giannetsos, T.: Comparative evaluation of PKI and DAA-based architectures for V2X communication security. In: 2023 IEEE Vehicular Networking Conference (VNC), pp. 199\u2013206. Istanbul, Turkiye (2023)","DOI":"10.1109\/VNC57357.2023.10136316"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Moussaoui, D., Kadri, B., Feham, M., Ammar Bensaber, B.: A distributed blockchain based PKI (BCPKI) architecture to enhance privacy in VANET. In: 2020 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH), pp. 75\u201379. Boumerdes, Algeria (2021)","DOI":"10.1109\/IHSH51661.2021.9378727"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Heng, X., Qin, S., Xiao, Y., Wang, J., Tao, Y., Zhang, R.: A strong secure V2I authentication scheme from PKI and accumulator. In: 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE), pp. 98\u2013103. Guangzhou, China (2022)","DOI":"10.1109\/ICCECE54139.2022.9712701"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Jiang, S., Chen, X., Cao, Y., Xu, T., He, J., Cui, Y.: APKI: An anonymous authentication scheme based on PKI for VANET. In: 2022 7th International Conference on Computer and Communication Systems (ICCCS), pp. 530\u2013536. Wuhan, China (2022)","DOI":"10.1109\/ICCCS55155.2022.9845923"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Wan, H., Wang, Q., Ma, C., Teng, Y., Lin, J., Ye, D.: ESCORT: Efficient status check and revocation transparency for linkage-based pseudonym certificates in VANETs. In: 2023 IEEE Symposium on Computers and Communications (ISCC), pp. 1340\u20131343. Gammarth, Tunisia (2023)","DOI":"10.1109\/ISCC58397.2023.10218118"},{"issue":"1","key":"5_CR26","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/TDSC.2024.3392470","volume":"22","author":"L Wang","year":"2025","unstructured":"Wang, L., Xu, J., Qin, B., Wen, M., Chen, K.: An efficient fuzzy certificateless signature-based authentication scheme using anonymous biometric identities for VANETs. IEEE Trans. Depend. Secure Comput. 22(1), 292\u2013307 (2025)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"17","key":"5_CR27","doi-asserted-by":"publisher","first-page":"7863","DOI":"10.1109\/TVT.2022.3169948","volume":"71","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Luo, M., Vijayakumar, P., Peng, C., He, D.: Efficient certificateless conditional privacy-preserving authentication for VANETs. IEEE Trans. Veh. Technol. 71(17), 7863\u20137875 (2022)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"5449","DOI":"10.1109\/TIFS.2024.3402992","volume":"19","author":"L Pu","year":"2024","unstructured":"Pu, L., Lin, C., Gu, J., Huang, X., He, D.: Generic construction of conditional privacy-preserving certificateless signatures with efficient instantiations for VANETs. IEEE Trans. Inf. Forens. Secur. 19, 5449\u20135463 (2024)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"1","key":"5_CR29","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/JSYST.2020.2966526","volume":"15","author":"Q Mei","year":"2021","unstructured":"Mei, Q., Xiong, H., Chen, J., Yang, M., Kumari, S., Khan, M.K.: Efficient certificateless aggregate signature with conditional privacy preservation in IoV. IEEE Syst. J. 15(1), 245\u2013256 (2021)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"5_CR30","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1109\/JSYST.2022.3180221","volume":"17","author":"Y Liang","year":"2023","unstructured":"Liang, Y., Liu, Y.: Analysis and improvement of an efficient certificateless aggregate signature with conditional privacy preservation in VANETs. IEEE Syst. J. 17(1), 664\u2013672 (2023)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"5_CR31","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1109\/JSYST.2021.3116029","volume":"16","author":"Y Han","year":"2022","unstructured":"Han, Y., Song, W., Zhou, Z., Wang, H., Yuan, B.: eCLAS: An efficient pairing-free certificateless aggregate signature for secure VANET communication. IEEE Syst. J. 16(1), 1637\u20131648 (2022)","journal-title":"IEEE Syst. J."},{"issue":"3","key":"5_CR32","doi-asserted-by":"publisher","first-page":"3822","DOI":"10.1109\/JSYST.2022.3220869","volume":"17","author":"H Zheng","year":"2023","unstructured":"Zheng, H., Luo, M., Zhang, Y., Peng, C., Feng, Q.: A security-enhanced pairing-free certificateless aggregate signature for vehicular ad-hoc networks. IEEE Syst. J. 17(3), 3822\u20133833 (2023)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"5_CR33","doi-asserted-by":"publisher","first-page":"6664","DOI":"10.1109\/JIOT.2023.3311800","volume":"11","author":"G Shen","year":"2024","unstructured":"Shen, G., Xia, C., Li, Y., Shen, H., Meng, W., Zhang, M.: Traceable and privacy-preserving authentication scheme for energy trading in V2G networks. IEEE Internet Things J. 11(4), 6664\u20136676 (2024)","journal-title":"IEEE Internet Things J."},{"key":"5_CR34","doi-asserted-by":"publisher","unstructured":"Fiat, A., Shamir, A.: How To Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12","DOI":"10.1007\/3-540-47721-7_12"},{"issue":"3","key":"5_CR35","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991). https:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J. Cryptol."},{"issue":"8","key":"5_CR36","doi-asserted-by":"publisher","first-page":"13482","DOI":"10.1109\/JIOT.2023.3337136","volume":"11","author":"Z Xu","year":"2024","unstructured":"Xu, Z., Wang, L., Luo, Y., Long, Y., Zhang, K., Yan, H., Chen, K.: A security-enhanced conditional privacy-preserving certificateless aggregate signature scheme for vehicular ad-hoc networks. IEEE Internet Things J. 11(8), 13482\u201313495 (2024)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:57:55Z","timestamp":1770109075000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}