{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:16:05Z","timestamp":1774541765328,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T00:00:00Z","timestamp":1544659200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s00607-018-0689-3","type":"journal-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T16:58:52Z","timestamp":1544720332000},"page":"1763-1788","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice"],"prefix":"10.1007","volume":"101","author":[{"given":"Sankar","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Daya Sagar","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,13]]},"reference":[{"issue":"1","key":"689_CR1","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TSG.2016.2553647","volume":"9","author":"A Abdallah","year":"2018","unstructured":"Abdallah A, Shen XS (2018) A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans Smart Grid 9(1):396\u2013405","journal-title":"IEEE Trans Smart Grid"},{"key":"689_CR2","unstructured":"Abdallah AR, Shen XS (2014) Lightweight lattice-based homomorphic privacy-preserving aggregation scheme for home area networks. In: 6th International conference on wireless communications and signal processing (WCSP), 2014. IEEE, pp 1\u20136"},{"key":"689_CR3","unstructured":"Ajtai M (1996) Generating hard instances of lattice problems. In: Proceedings of the 28th annual ACM symposium on theory of computing. ACM, pp 99\u2013108"},{"key":"689_CR4","doi-asserted-by":"crossref","unstructured":"Ajtai M, Dwork C (1997) A public-key cryptosystem with worst-case\/average-case equivalence. In: Proceedings of the 29th annual ACM symposium on theory of computing. ACM, pp 284\u2013293","DOI":"10.1145\/258533.258604"},{"key":"689_CR5","unstructured":"Ajtai M, Dwork C (2007) The first and fourth public-key cryptosystems with worst-case\/average-case equivalence. In: Electronic colloquium on computational complexity (ECCC), vol 14"},{"key":"689_CR6","first-page":"755","volume":"2015","author":"E Alkim","year":"2015","unstructured":"Alkim E, Bindel N, Buchmann JA, Dagdelen \u00d6, Schwabe P (2015) Tesla: tightly-secure efficient signatures from standard lattices. IACR Cryptol ePrint Arch 2015:755","journal-title":"IACR Cryptol ePrint Arch"},{"key":"689_CR7","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees M, Vijayakumar P, Deboarh LJ (2017) EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18:2467\u20132476","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"689_CR8","first-page":"9","volume":"5","author":"R Baiad","year":"2016","unstructured":"Baiad R, Alhussein O, Otrok H, Muhaidat S (2016) Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in vanet. Veh Commun 5:9\u201317","journal-title":"Veh Commun"},{"issue":"5","key":"689_CR9","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for vanets with batch verification. Wirel Netw 21(5):1733\u20131743","journal-title":"Wirel Netw"},{"issue":"12","key":"689_CR10","doi-asserted-by":"publisher","first-page":"2838","DOI":"10.1016\/j.comcom.2007.12.004","volume":"31","author":"A Boukerche","year":"2008","unstructured":"Boukerche A, Oliveira HA, Nakamura EF, Loureiro AA (2008) Vehicular ad hoc networks: a new challenge for localization-based systems. Comput Commun 31(12):2838\u20132849","journal-title":"Comput Commun"},{"issue":"2","key":"689_CR11","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TC.2012.188","volume":"63","author":"TW Chim","year":"2014","unstructured":"Chim TW, Yiu SM, Hui LC, Li VO (2014) VSPN: vanet-based secure and privacy-preserving navigation. IEEE Trans Comput 63(2):510\u2013524","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"689_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"689_CR13","first-page":"33","volume":"1","author":"A Dua","year":"2014","unstructured":"Dua A, Kumar N, Bawa S (2014) A systematic review on routing protocols for vehicular ad hoc networks. Veh Commun 1(1):33\u201352","journal-title":"Veh Commun"},{"key":"689_CR14","doi-asserted-by":"crossref","unstructured":"Ducas L, Durmus A, Lepoint T, Lyubashevsky V (2013) Lattice signatures and bimodal Gaussians. In: Advances in cryptology\u2014CRYPTO 2013. Springer, pp 40\u201356","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"689_CR15","doi-asserted-by":"crossref","unstructured":"El\u00a0Moustaine E, Laurent M (2012) A lattice based authentication for low-cost RFID. In: IEEE international conference on RFID technology and applications, RFID-TA\u201912. IEEE, pp 68\u201373","DOI":"10.1109\/RFID-TA.2012.6404569"},{"key":"689_CR16","unstructured":"Freudiger J, Raya M, F\u00e9legyh\u00e1zi M, Papadimitratos P, Hubaux JP (2007) Mix-zones for location privacy in vehicular networks. In: ACM workshop on wireless networking for intelligent transportation systems (WiN-ITS), LCA-CONF-2007-016"},{"key":"689_CR17","doi-asserted-by":"crossref","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th annual ACM symposium on theory of computing, Victoria, British Columbia, Canada, 17\u201320 May 2008. ACM, pp 197\u2013206","DOI":"10.1145\/1374376.1374407"},{"key":"689_CR18","doi-asserted-by":"crossref","unstructured":"Ghazinour K, Majedi M, Barker K (2009) A lattice-based privacy aware access control model. In: International conference on computational science and engineering, 2009, CSE\u201909, vol 3. IEEE, pp 154\u2013159","DOI":"10.1109\/CSE.2009.356"},{"issue":"7","key":"689_CR19","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.adhoc.2010.02.008","volume":"8","author":"M Ghosh","year":"2010","unstructured":"Ghosh M, Varghese A, Gupta A, Kherani AA, Muthaiah SN (2010) Detecting misbehaviors in vanet with integrated root-cause analysis. Ad Hoc Netw 8(7):778\u2013790","journal-title":"Ad Hoc Netw"},{"key":"689_CR20","first-page":"9","volume":"1996","author":"O Goldreich","year":"1996","unstructured":"Goldreich O, Goldwasser S, Halevi S (1996) Collision-free hashing from lattice problems. IACR Cryptol ePrint Arch 1996:9","journal-title":"IACR Cryptol ePrint Arch"},{"key":"689_CR21","doi-asserted-by":"crossref","unstructured":"Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks. ACM, pp 29\u201337","DOI":"10.1145\/1023875.1023881"},{"key":"689_CR22","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu T, Lyubashevsky V, P\u00f6ppelmann T (2012) Practical lattice-based cryptography: a signature scheme for embedded systems. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 530\u2013547","DOI":"10.1007\/978-3-642-33027-8_31"},{"issue":"18","key":"689_CR23","doi-asserted-by":"publisher","first-page":"e3363","DOI":"10.1002\/dac.3363","volume":"30","author":"DS Gupta","year":"2017","unstructured":"Gupta DS, Biswas G (2017a) An ECC-based authenticated group key exchange protocol in IBE framework. Int J Commun Syst 30(18):e3363","journal-title":"Int J Commun Syst"},{"issue":"3","key":"689_CR24","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11277-017-4399-5","volume":"96","author":"DS Gupta","year":"2017","unstructured":"Gupta DS, Biswas G (2017b) On securing bi-and tri-partite session key agreement protocol using ibe framework. Wirel Pers Commun 96(3):4505\u20134524","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"689_CR25","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/IJISP.2017070105","volume":"11","author":"DS Gupta","year":"2017","unstructured":"Gupta DS, Biswas G (2017c) A secure cloud storage using ECC-based homomorphic encryption. Int J Inf Secur Priv (IJISP) 11(3):54\u201362","journal-title":"Int J Inf Secur Priv (IJISP)"},{"issue":"6","key":"689_CR26","doi-asserted-by":"publisher","first-page":"e3255","DOI":"10.1002\/ett.3255","volume":"29","author":"DS Gupta","year":"2018","unstructured":"Gupta DS, Biswas G (2018a) Design of lattice-based ELGamal encryption and signature schemes using SIS problem. Trans Emerg Telecommun Technol 29(6):e3255","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"3","key":"689_CR27","doi-asserted-by":"publisher","first-page":"e3473","DOI":"10.1002\/dac.3473","volume":"31","author":"DS Gupta","year":"2018","unstructured":"Gupta DS, Biswas G (2018b) A novel and efficient lattice-based authenticated key exchange protocol in C\u2013K model. Int J Commun Syst 31(3):e3473","journal-title":"Int J Commun Syst"},{"key":"689_CR28","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.pisc.2016.04.034","volume":"8","author":"DS Gupta","year":"2016","unstructured":"Gupta DS, Biswas GP (2016) Cryptanalysis of Wang et al.\u2019s lattice-based key exchange protocol. Perspect Sci 8:228\u2013230","journal-title":"Perspect Sci"},{"key":"689_CR29","doi-asserted-by":"crossref","unstructured":"Gupta DS, Biswas G, Nandan R (2018) Security weakness of a lattice-based key exchange protocol. In: 4th International conference on recent advances in information technology (RAIT), 2018. IEEE, pp 1\u20135","DOI":"10.1109\/RAIT.2018.8389018"},{"issue":"6","key":"689_CR30","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H Hartenstein","year":"2008","unstructured":"Hartenstein H, Laberteaux L (2008) A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag 46(6):164\u2013171","journal-title":"IEEE Commun Mag"},{"issue":"12","key":"689_CR31","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681\u20132691","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"689_CR32","doi-asserted-by":"crossref","unstructured":"Hoffstein J, Pipher J, Silverman JH (1998) NTRU: a ring-based public key cryptosystem. In: International algorithmic number theory symposium. Springer, pp 267\u2013288","DOI":"10.1007\/BFb0054868"},{"key":"689_CR33","doi-asserted-by":"crossref","unstructured":"Hoffstein J, Pipher J, Silverman JH (2001) NSS: an NTRU lattice-based signature scheme. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 211\u2013228","DOI":"10.1007\/3-540-44987-6_14"},{"key":"689_CR34","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2015.04.033","volume":"317","author":"SJ Horng","year":"2015","unstructured":"Horng SJ, Tzeng SF, Huang PH, Wang X, Li T, Khan MK (2015) An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf Sci 317:48\u201366","journal-title":"Inf Sci"},{"issue":"3","key":"689_CR35","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"JP Hubaux","year":"2004","unstructured":"Hubaux JP, Capkun S, Luo J (2004) The security and privacy of smart vehicles. IEEE Secur Priv 2(3):49\u201355","journal-title":"IEEE Secur Priv"},{"issue":"5","key":"689_CR36","first-page":"351","volume":"16","author":"Z Jianhong","year":"2014","unstructured":"Jianhong Z, Min X, Liying L (2014) On the security of a secure batch verification with group testing for vanet. Int J Netw Secur 16(5):351\u2013358","journal-title":"Int J Netw Secur"},{"issue":"177","key":"689_CR37","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"issue":"5","key":"689_CR38","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TITS.2015.2502322","volume":"17","author":"NW Lo","year":"2016","unstructured":"Lo NW, Tsai JL (2016) An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans Intell Transp Syst 17(5):1319\u20131328","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"689_CR39","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: 27th Conference on computer communications, IEEE, INFOCOM 2008. IEEE, pp 1229\u20131237","DOI":"10.1109\/INFOCOM.2008.179"},{"issue":"2","key":"689_CR40","first-page":"53","volume":"1","author":"MN Mejri","year":"2014","unstructured":"Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on vanet security challenges and possible cryptographic solutions. Veh Commun 1(2):53\u201366","journal-title":"Veh Commun"},{"issue":"4","key":"689_CR41","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s00037-007-0234-9","volume":"16","author":"D Micciancio","year":"2007","unstructured":"Micciancio D (2007) Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Comput Complex 16(4):365\u2013411","journal-title":"Comput Complex"},{"issue":"1","key":"689_CR42","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1137\/S0097539705447360","volume":"37","author":"D Micciancio","year":"2007","unstructured":"Micciancio D, Regev O (2007) Worst-case to average-case reductions based on Gaussian measures. SIAM J Comput 37(1):267\u2013302","journal-title":"SIAM J Comput"},{"key":"689_CR43","unstructured":"Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques. Springer, pp 417\u2013426"},{"issue":"1","key":"689_CR44","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39\u201368","journal-title":"J Comput Secur"},{"key":"689_CR45","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, pp 47\u201353"},{"issue":"4","key":"689_CR46","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"KA Shim","year":"2012","unstructured":"Shim KA (2012) Cpas: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Technol 61(4):1874\u20131883","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"689_CR47","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303\u2013332","journal-title":"SIAM Rev"},{"key":"689_CR48","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.cose.2016.04.006","volume":"60","author":"V Sucasas","year":"2016","unstructured":"Sucasas V, Mantas G, Saghezchi FB, Radwan A, Rodriguez J (2016) An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Comput Secur 60:193\u2013205","journal-title":"Comput Secur"},{"key":"689_CR49","doi-asserted-by":"crossref","unstructured":"Sumra IA, Ahmad I, Hasbullah H et al (2011) Classes of attacks in VANET. In: Saudi international electronics, communications and photonics conference (SIECPC), 2011. IEEE, pp 1\u20135","DOI":"10.1109\/SIECPC.2011.5876939"},{"key":"689_CR50","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","volume":"78","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar P, Chang V, Deborah LJ, Balusamy B, Shynu P (2016) Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener Comput Syst 78:943\u2013955","journal-title":"Future Gener Comput Syst"},{"issue":"7","key":"689_CR51","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s00607-014-0393-x","volume":"98","author":"M Wang","year":"2016","unstructured":"Wang M, Liu D, Zhu L, Xu Y, Wang F (2016) LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98(7):685\u2013708","journal-title":"Computing"},{"issue":"12","key":"689_CR52","doi-asserted-by":"publisher","first-page":"2883","DOI":"10.1016\/j.comcom.2008.01.009","volume":"31","author":"G Yan","year":"2008","unstructured":"Yan G, Olariu S, Weigle MC (2008) Providing VANET security through active position detection. Comput Commun 31(12):2883\u20132897","journal-title":"Comput Commun"},{"issue":"5","key":"689_CR53","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1016\/j.jnca.2012.05.013","volume":"36","author":"B Ying","year":"2013","unstructured":"Ying B, Makrakis D, Mouftah HT (2013) Privacy preserving broadcast message authentication protocol for VANETs. J Netw Comput Appl 36(5):1352\u20131364","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"689_CR54","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally S, Hunt R, Chen YS, Irwin A, Hassan A (2012) Vehicular ad hoc networks (VANETs): status, results, and challenges. Telecommun Syst 50(4):217\u2013241","journal-title":"Telecommun Syst"},{"key":"689_CR55","doi-asserted-by":"crossref","unstructured":"Zhang C, Lin X, Lu R, Ho PH (2008a) Raise: an efficient RSU-aided message authentication scheme in vehicular communication networks. In: IEEE international conference on communications, 2008, ICC\u201908. IEEE, pp 1451\u20131457","DOI":"10.1109\/ICC.2008.281"},{"key":"689_CR56","doi-asserted-by":"crossref","unstructured":"Zhang C, Lu R, Lin X, Ho PH, Shen X (2008b) An efficient identity-based batch verification scheme for vehicular sensor networks. In: 27th Conference on computer communications on INFOCOM 2008. IEEE, pp 246\u2013250","DOI":"10.1109\/INFOCOM.2008.58"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0689-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0689-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0689-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,9]],"date-time":"2020-02-09T06:04:30Z","timestamp":1581228270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0689-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,13]]},"references-count":56,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["689"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0689-3","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,13]]},"assertion":[{"value":"18 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}