{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:32:57Z","timestamp":1773520377387,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Industry University Research Innovation Fund of Science and Technology Development Center of the Ministry of Education, China","award":["2021JQR007"],"award-info":[{"award-number":["2021JQR007"]}]},{"name":"National Key Research and Development Program of China","award":["2020YFB1600501"],"award-info":[{"award-number":["2020YFB1600501"]}]},{"name":"Major Technology Innovation Projects of Shandong Province, China","award":["2019TSLH0203"],"award-info":[{"award-number":["2019TSLH0203"]}]},{"name":"Qilu Institute of Technology","award":["QIT24TP040"],"award-info":[{"award-number":["QIT24TP040"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01021-3","type":"journal-article","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:02:40Z","timestamp":1743382960000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs"],"prefix":"10.1007","volume":"24","author":[{"given":"Wael","family":"Khalafalla","sequence":"first","affiliation":[]},{"given":"Wen-Xing","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Elkhalil","sequence":"additional","affiliation":[]},{"given":"Salah-ud-din","family":"Khokhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,28]]},"reference":[{"issue":"6","key":"1021_CR1","doi-asserted-by":"publisher","first-page":"1446","DOI":"10.3390\/math11061446","volume":"11","author":"BA Mohammed","year":"2023","unstructured":"Mohammed, B.A., Al-Shareeda, M.A., Manickam, S., Al-Mekhlafi, Z.G., Alayba, A.M., Sallam, A.A.: ANAA-Fog: Aanovel anonymous authentication scheme for 5G-enabled vehicular fog computing. Mathematics 11(6), 1446 (2023)","journal-title":"Mathematics"},{"key":"1021_CR2","unstructured":"Al-Mekhlafi, Z.G., Lashari, S.A., Altmemi, J.M., Al-Shareeda, M.A., Mohammed, B.A., Sallam, A.A., Al-Qatab, B.A., Alshammari, M.T., Alayba, A.M.: Oblivious transfer-based authentication and privacy-preserving protocol for 5G-enabled vehicular fog computing. IEEE Access (2024)"},{"issue":"3","key":"1021_CR3","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.1109\/COMST.2022.3178081","volume":"24","author":"S Khan","year":"2022","unstructured":"Khan, S., Luo, F., Zhang, Z., Rahim, M.A., Ahmad, M., Wu, K.: Survey on issues and recent advances in vehicular public-key infrastructure (VPKI). IEEE Commun. Surv. Tutor. 24(3), 1574\u20131601 (2022)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1021_CR4","doi-asserted-by":"publisher","first-page":"65760","DOI":"10.1109\/ACCESS.2022.3183605","volume":"10","author":"MJN Mahi","year":"2022","unstructured":"Mahi, M.J.N., Chaki, S., Ahmed, S., Biswas, M., Kaiser, M.S., Islam, M.S., Whaiduzzaman, M.: A review on VANET research: perspective of recent emerging technologies. IEEE Access 10, 65760\u201365783 (2022)","journal-title":"IEEE Access"},{"key":"1021_CR5","doi-asserted-by":"crossref","unstructured":"Mustafa, A.S., Hamdi, M.M., Mahdi, H.F., Abood, M.S.: VANET: towards security issues review. In: IEEE 5th Int. Symp. Telecommun. Technol. (ISTT), pp. 151-156 (2020)","DOI":"10.1109\/ISTT50966.2020.9279375"},{"key":"1021_CR6","doi-asserted-by":"publisher","first-page":"121522","DOI":"10.1109\/ACCESS.2021.3109264","volume":"9","author":"MA Al-Shareeda","year":"2021","unstructured":"Al-Shareeda, M.A., Anbar, M., Manickam, S., Khalil, A., Hasbullah, I.H.: Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: a survey. IEEE Access 9, 121522\u2013121531 (2021)","journal-title":"IEEE Access"},{"key":"1021_CR7","volume":"25","author":"S Khan","year":"2020","unstructured":"Khan, S., Zhu, L., Yu, X., Zhang, Z., Rahim, M.A., Khan, M., Du, X., Guizani, M.: Accountable credential management system for vehicular communication. Veh. Commun. 25, 100279 (2020)","journal-title":"Veh. Commun."},{"key":"1021_CR8","first-page":"1","volume":"5","author":"N Perlroth","year":"2013","unstructured":"Perlroth, N., Larson, J., Shane, S.: NSA able to foil basic safeguards of privacy on web. N. Y. Times 5, 1\u20138 (2013)","journal-title":"N. Y. Times"},{"issue":"13","key":"1021_CR9","doi-asserted-by":"publisher","first-page":"5026","DOI":"10.3390\/s22135026","volume":"22","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda, M.A., Manickam, S., Mohammed, B.A., Al-Mekhlafi, Z.G., Qtaish, A., Alzahrani, A.J., Alshammari, G., Sallam, A.A., Almekhlafi, K.: CM-CPPA: chaotic map-based conditional privacy-preserving authentication scheme in 5G-enabled vehicular networks. Sensors 22(13), 5026 (2022)","journal-title":"Sensors"},{"issue":"9","key":"1021_CR10","doi-asserted-by":"publisher","first-page":"11991","DOI":"10.1007\/s13369-023-08535-9","volume":"49","author":"AA Almazroi","year":"2024","unstructured":"Almazroi, A.A., Alkinani, M.H., Al-Shareeda, M.A., Manickam, S.: A novel DDoS mitigation strategy in 5G-based vehicular networks using Chebyshev polynomials. Arab. J. Sci. Eng. 49(9), 11991\u201312004 (2024)","journal-title":"Arab. J. Sci. Eng."},{"key":"1021_CR11","doi-asserted-by":"crossref","unstructured":"Mironov, I., Stephens-Davidowitz, N.: Cryptographic reverse firewalls. In: Advances in Cryptology-EUROCRYPT 2015, 34th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Part II, pp. 657-686. Springer, Berlin, Heidelberg (2015)","DOI":"10.1007\/978-3-662-46803-6_22"},{"key":"1021_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.08.002","volume":"162","author":"N Eltayieb","year":"2025","unstructured":"Eltayieb, N., Elhabob, R., Abdelgader, A.M., Liao, Y., Li, F., Zhou, S.: Certificateless proxy re-encryption with cryptographic reverse firewalls for secure cloud data sharing. Future Gener. Comput. Syst. 162, 107478 (2025)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"1021_CR13","doi-asserted-by":"publisher","first-page":"3989","DOI":"10.1109\/TVT.2022.3220041","volume":"72","author":"I Ullah","year":"2022","unstructured":"Ullah, I., Khan, M.A., Kumar, N., Abdullah, A.M., AlSanad, A.A., Noor, F.: A conditional privacy preserving heterogeneous signcryption scheme for internet of vehicles. IEEE Trans. Veh. Technol. 72(3), 3989\u20133998 (2022)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1021_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109969","volume":"235","author":"H Shao","year":"2023","unstructured":"Shao, H., Xia, Y., Piao, C.: Blockchain-assisted certificateless signcryption for vehicle-to-vehicle communication in VANETs. Comput. Netw. 235, 109969 (2023)","journal-title":"Comput. Netw."},{"key":"1021_CR15","doi-asserted-by":"crossref","unstructured":"Elkhalil, Ahmed, Rashad Elhabob, and Nabeil Eltayieb.: An efficient signcryption of heterogeneous systems for internet of vehicles. Journal of Systems Architecture 113, 101885 (2021)","DOI":"10.1016\/j.sysarc.2020.101885"},{"key":"1021_CR16","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/TIFS.2022.3140657","volume":"17","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Zhang, L., Zhao, Y., Choo, K.K.R., Zhang, Y.: Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based VANET. IEEE Trans. Inf. Forensics Secur. 17, 317\u2013331 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"1021_CR17","doi-asserted-by":"publisher","first-page":"9851","DOI":"10.1007\/s10586-024-04479-3","volume":"27","author":"W Khalafalla","year":"2024","unstructured":"Khalafalla, W., Zhu, W.-X., Elkhalil, A., Elfadul, I.: Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs. Cluster Comput. 27(7), 9851\u20139871 (2024)","journal-title":"Cluster Comput."},{"key":"1021_CR18","volume":"2024","author":"S Mazhar","year":"2024","unstructured":"Mazhar, S., Rakib, A., Pan, L., Jiang, F., Anwar, A., Doss, R., Bryans, J.: State-of-the-art authentication and verification schemes in VANETs: a survey. Veh. Commun. 2024, 100804 (2024)","journal-title":"Veh. Commun."},{"key":"1021_CR19","doi-asserted-by":"crossref","unstructured":"Shao, H., Piao, C.: A provably secure lightweight authentication based on elliptic curve signcryption for vehicle-to-vehicle communication in VANETs. IEEE Trans. Ind, Informat (2023)","DOI":"10.1109\/TII.2023.3313527"},{"issue":"11","key":"1021_CR20","doi-asserted-by":"publisher","first-page":"2539","DOI":"10.1007\/s00607-023-01196-4","volume":"105","author":"A Elkhalil","year":"2023","unstructured":"Elkhalil, A., Zhang, J., Elhabob, R., Eltayieb, N.: POOSC: provably online\/offline signcryption scheme for vehicular communication in VANETs. Computing 105(11), 2539\u20132561 (2023)","journal-title":"Computing"},{"issue":"6","key":"1021_CR21","doi-asserted-by":"publisher","first-page":"5974","DOI":"10.1109\/TVT.2021.3078806","volume":"70","author":"I Ali","year":"2021","unstructured":"Ali, I., Chen, Y., Ullah, N., Afzal, M., Wen, H.E.: Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Trans. Veh. Technol. 70(6), 5974\u20135989 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1021_CR22","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/TIFS.2022.3140657","volume":"17","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Zhang, L., Zhao, Y., Choo, K.K.R., Zhang, Y.: Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based VANET. IEEE Trans. Inf. Forensics Secur. 17, 317\u2013331 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1021_CR23","doi-asserted-by":"crossref","unstructured":"Li, Y., Qi, Y., Lu, L.: Secure and efficient V2V communications for heterogeneous vehicle ad hoc networks. In: Int. Conf. Networking and Network Applications (NaNA), pp. 93-99 (2017)","DOI":"10.1109\/NaNA.2017.54"},{"issue":"2","key":"1021_CR24","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TVT.2021.3050614","volume":"70","author":"P Bagga","year":"2021","unstructured":"Bagga, P., Das, A.K., Wazid, M., Rodrigues, J.J.P.C., Choo, K.-K.R., Park, Y.: On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system. IEEE Trans. Veh. Technol. 70(2), 1736\u20131751 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1021_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102522","volume":"127","author":"C Jin","year":"2022","unstructured":"Jin, C., Zhu, H., Qin, W., Chen, Z., Jin, Y., Shan, J.: Heterogeneous online\/offline signcryption for secure communication in internet of things. J. Syst. Archit. 127, 102522 (2022)","journal-title":"J. Syst. Archit."},{"issue":"11","key":"1021_CR26","doi-asserted-by":"publisher","first-page":"8967","DOI":"10.1109\/JIOT.2021.3119513","volume":"9","author":"J Chen","year":"2021","unstructured":"Chen, J., Wang, L., Wen, M., Zhang, K., Chen, K.: Efficient certificateless online\/offline signcryption scheme for edge IoT devices. IEEE Internet Things J. 9(11), 8967\u20138979 (2021)","journal-title":"IEEE Internet Things J."},{"key":"1021_CR27","doi-asserted-by":"publisher","first-page":"21267","DOI":"10.1109\/ACCESS.2021.3055148","volume":"9","author":"VS Naresh","year":"2021","unstructured":"Naresh, V.S., Reddi, S., Kumari, S., Allavarpu, V.D., Kumar, S., Yang, M.H.: Practical identity-based online\/offline signcryption scheme for secure communication in internet of things. IEEE Access 9, 21267\u201321278 (2021)","journal-title":"IEEE Access"},{"key":"1021_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101692","volume":"103","author":"I Ali","year":"2020","unstructured":"Ali, I., Lawrence, T., Li, F.: An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. J. Syst. Archit. 103, 101692 (2020)","journal-title":"J. Syst. Archit."},{"key":"1021_CR29","doi-asserted-by":"crossref","unstructured":"Ma, H., Zhang, R., Yang, G., Song, Z., Sun, S., Xiao, Y.: Concessive online\/offline attribute-based encryption with cryptographic reverse firewalls-Secure and efficient fine-grained access control on corrupted machines. In: Computer Security: 23rd Eur. Symp. Res. Comput. Secur., ESORICS 2018, pp. 507-526. Springer Int. Publishing (2018)","DOI":"10.1007\/978-3-319-98989-1_25"},{"key":"1021_CR30","doi-asserted-by":"crossref","unstructured":"Hong, B., Chen, J., Zhang, K., Qian, H.: Multi-authority non-monotonic KP-ABE with cryptographic reverse firewall. IEEE Access 7, 159002\u2013159012 (2019)","DOI":"10.1109\/ACCESS.2019.2950394"},{"key":"1021_CR31","doi-asserted-by":"crossref","unstructured":"Barreto, P.S., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Advances in Cryptology-CRYPTO 2002, pp. 354\u2013369. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45708-9_23"},{"issue":"10","key":"1021_CR32","doi-asserted-by":"publisher","first-page":"11266","DOI":"10.1109\/TVT.2020.3008781","volume":"69","author":"I Ali","year":"2020","unstructured":"Ali, I., Lawrence, T., Omala, A., Li, F.: An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Trans. Veh. Technol. 69(10), 11266\u201311280 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1021_CR33","doi-asserted-by":"crossref","unstructured":"Elkhalil, A., Zhang, J., Elhabob, R.: An efficient heterogeneous blockchain-based online\/offline signcryption systems for internet of vehicles. Cluster Comput. (2021)","DOI":"10.1016\/j.sysarc.2020.101885"},{"key":"1021_CR34","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology-CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) Advances in Cryptology-CRYPTO 2001, pp. 213\u2013229. Springer, Berlin, Heidelberg (2001)"},{"issue":"3","key":"1021_CR35","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptology 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptology"},{"key":"1021_CR36","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Advances in Cryptology-EUROCRYPT 2004, pp. 56-73. Springer, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"1021_CR37","doi-asserted-by":"crossref","unstructured":"De Caro, A., Iovino, V.: jPBC: Java pairing-based cryptography. In: IEEE Symp. Comput. Commun. (ISCC), pp. 850-855. IEEE (2011)","DOI":"10.1109\/ISCC.2011.5983948"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01021-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01021-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01021-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:06Z","timestamp":1750500666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01021-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,28]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1021"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01021-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,28]]},"assertion":[{"value":"28 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"105"}}