{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:22:45Z","timestamp":1763810565539,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T00:00:00Z","timestamp":1622678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T00:00:00Z","timestamp":1622678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962011"],"award-info":[{"award-number":["61962011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Group Major Research Projects of Department of Education of Guizhou Province","award":["KY[2016]026"],"award-info":[{"award-number":["KY[2016]026"]}]},{"name":"Guizhou Provincial Science and Technology Foundation Science","award":["[2019]1434"],"award-info":[{"award-number":["[2019]1434"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12083-021-01181-8","type":"journal-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T17:02:49Z","timestamp":1622739769000},"page":"2236-2247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-1062","authenticated-orcid":false,"given":"Lunzhi","family":"Deng","sequence":"first","affiliation":[]},{"given":"Jianxin","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"1181_CR1","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume":"2894","author":"S Al-Riyami","year":"2003","unstructured":"Al-Riyami S, Paterson K (2003) Certificateless public . Advances in Cryptology-Asiacrypt 2003, LNCS 2894:452\u2013473","journal-title":"Advances in Cryptology-Asiacrypt 2003, LNCS"},{"key":"1181_CR2","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume":"773","author":"M Bellare","year":"1993","unstructured":"Bellare M, Rogaway P (1993) Entity authentication and key distribution. Advances in Cryptology-CRYPTO\u201993 LNCS 773:232\u2013249","journal-title":"Advances in Cryptology-CRYPTO\u201993 LNCS"},{"key":"1181_CR3","first-page":"30","volume":"1355","author":"S Blake-Wilson","year":"1997","unstructured":"Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. 6th IMA International Conference on Cryptography and Coding, LNCS 1355:30\u201345","journal-title":"6th IMA International Conference on Cryptography and Coding, LNCS"},{"issue":"3","key":"1181_CR4","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/s11277-015-2626-5","volume":"87","author":"S Bala","year":"2016","unstructured":"Bala S, Sharma G, Verma A (2016) PF-ID-2PAKA: pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks. Wireless Pers Commun 87(3):995\u20131012","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"1181_CR5","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1504\/IJAHUC.2016.075187","volume":"21","author":"S Bala","year":"2016","unstructured":"Bala S, Sharma G, Verma A (2016) A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. Int J Ad Hoc Ubiq Co 21(2):140\u2013155","journal-title":"Int J Ad Hoc Ubiq Co"},{"issue":"2","key":"1181_CR6","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1504\/IJAHUC.2018.089580","volume":"27","author":"S Bala","year":"2018","unstructured":"Bala S, Sharma G, Verma A (2018) Impersonation attack on Certificateless key agreement protocol. Int J Ad Hoc Ubiq Co 27(2):108\u2013120","journal-title":"Int J Ad Hoc Ubiq Co"},{"key":"1181_CR7","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume":"2045","author":"R Canetti","year":"2001","unstructured":"Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. Advances in Cryptology-EUROCRYPT 2001, LNCS 2045:453\u2013474","journal-title":"Advances in Cryptology-EUROCRYPT 2001, LNCS"},{"issue":"12","key":"1181_CR8","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1093\/ietfec\/e91-a.12.3833","volume":"91","author":"X Cao","year":"2008","unstructured":"Cao X, Kou W, Yu Y, Sun R (2008) Identity-based authenticated key agreement protocols without bilinear pairings. IEICE T Fund Electr 91(12):3833\u20133836","journal-title":"IEICE T Fund Electr"},{"key":"1181_CR9","doi-asserted-by":"publisher","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","volume":"180","author":"X Cao","year":"2010","unstructured":"Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inform Sciences 180:2895\u20132903","journal-title":"Inform Sciences"},{"issue":"6","key":"1181_CR10","first-page":"893","volume":"15","author":"C Chen","year":"2014","unstructured":"Chen C, Hsu T, Wu H, Chiang J, Hsieh W (2014) Anonymous authentication and key-agreement schemes in vehicular ad-hoc networks. J Internet Technol 15(6):893\u2013902","journal-title":"J Internet Technol"},{"issue":"4","key":"1181_CR11","first-page":"1","volume":"14","author":"L Dang","year":"2018","unstructured":"Dang L, Xu J, Cao X, Li H, Chen J, Zhang Y, Fu X (2018) Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks. Int J Distrib Sens N 14 (4):1\u201316","journal-title":"Int J Distrib Sens N"},{"key":"1181_CR12","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.adhoc.2010.08.021","volume":"9","author":"R Dutta","year":"2011","unstructured":"Dutta R, Dowling T (2011) Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks. Ad Hoc Netw 9:767\u2013787","journal-title":"Ad Hoc Netw"},{"key":"1181_CR13","doi-asserted-by":"crossref","unstructured":"Daniel R, Rajsingh E, adversaries Silas S. (2020) An efficient eCK secure identity based two party authenticated key agreement scheme with security against active. Inform Comput, vol.275 article id.1046309","DOI":"10.1016\/j.ic.2020.104630"},{"key":"1181_CR14","first-page":"1822","volume":"10","author":"D Goya","year":"2016","unstructured":"Goya D, Nakamura D, Terada R (2016) Certificateless key agreement protocols under strong models. IEICE T Fund Electr, vol.E99A 10:1822\u20131832","journal-title":"IEICE T Fund Electr, vol.E99A"},{"key":"1181_CR15","first-page":"13","volume":"2013","author":"Z Hao","year":"2013","unstructured":"Hao Z, Zhong S, Yu N (2013) A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics. Sci World J 2013:13. Article ID 935604","journal-title":"Sci World J"},{"key":"1181_CR16","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1016\/j.csi.2008.09.024","volume":"31","author":"M Holbl","year":"2009","unstructured":"Holbl M, Welzer T (2009) Two improved two-party identity-based authenticated key agreement protocols. Comput Stand Inter 31:1056\u20131060","journal-title":"Comput Stand Inter"},{"issue":"1","key":"1181_CR17","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.jcss.2011.01.002","volume":"78","author":"M Holbl","year":"2012","unstructured":"Holbl M, Welzer T, Brumen B (2012) An improved two party identity-based authenticated key agreement protocol using pairings. J Comput Syst Sci 78(1):142\u2013150","journal-title":"J Comput Syst Sci"},{"issue":"11","key":"1181_CR18","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE T Inf Foren Sec 10(11):2681\u20132691","journal-title":"IEEE T Inf Foren Sec"},{"key":"1181_CR19","doi-asserted-by":"crossref","unstructured":"Huang J, Yeh L, Chien H (2011) ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE T Veh Technol 60()","DOI":"10.1109\/TVT.2010.2089544"},{"issue":"1","key":"1181_CR20","first-page":"91","volume":"42","author":"B Huang","year":"2015","unstructured":"Huang B, Tu H (2015) Strongly secure certificateless one-pass authenticated key agreement scheme. Kuwait J Sci 42(1):91\u2013108","journal-title":"Kuwait J Sci"},{"key":"1181_CR21","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.proeng.2012.01.890","volume":"30","author":"S Islam","year":"2012","unstructured":"Islam S, Biswas G (2012) An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Engineer 30:499\u2013507","journal-title":"Procedia Engineer"},{"key":"1181_CR22","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/s11277-014-2157-5","volume":"81","author":"M Luo","year":"2015","unstructured":"Luo M, Zhao H (2015) An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography. Wireless Pers Commun 81:779\u2013798","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"1181_CR23","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1049\/cje.2015.04.018","volume":"24","author":"Y Li","year":"2015","unstructured":"Li Y, Zhu J, Zhang N, Wang X, Zhang Y (2015) RYY++: a novel povably secure identity-based authenticated key agreement protocol. Chinese J Electron 24(2):332\u2013337","journal-title":"Chinese J Electron"},{"key":"1181_CR24","first-page":"71","volume":"45","author":"H Lin","year":"2016","unstructured":"Lin H (2016) Secure certificateless two-party key agreement with short message. Inf Technol Control 45:71\u201376","journal-title":"Inf Technol Control"},{"key":"1181_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75670-5_1","volume":"4784","author":"B LaMacchia","year":"2007","unstructured":"LaMacchia B, Lauter K, Mityagin A (2007) Stronger security of authenticated key exchange. 1st International Conference on Provable Security, LNCS 4784:1\u201316","journal-title":"1st International Conference on Provable Security, LNCS"},{"issue":"9","key":"1181_CR26","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1016\/j.camwa.2012.01.041","volume":"65","author":"L Ni","year":"2013","unstructured":"Ni L, Chen G, Li J (2013) Escrowable identity-based authenticated key agreement protocol with strong security. Comput Math Appl 65(9):1339\u20131349","journal-title":"Comput Math Appl"},{"issue":"8","key":"1181_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-011-4520-4","volume":"56","author":"L Ni","year":"2013","unstructured":"Ni L, Chen G, Li J, Hao Y (2013) Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci China Inform Sci 56(8):1\u201314","journal-title":"Sci China Inform Sci"},{"key":"1181_CR28","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2016.05.015","volume":"367","author":"L Ni","year":"2016","unstructured":"Ni L, Chen G, Li J, Hao Y (2016) Strongly secure identity-based authenticated key agreement protocols without bilinear pairings. Inform Sciences 367:176\u2013193","journal-title":"Inform Sciences"},{"key":"1181_CR29","first-page":"47","volume":"196","author":"A Shamir","year":"1984","unstructured":"Shamir A (1984) Identity-based cryptosystem and signature scheme. Adv Cryptology-Crypto 1984, LNCS 196:47\u201353","journal-title":"Adv Cryptology-Crypto 1984, LNCS"},{"key":"1181_CR30","doi-asserted-by":"crossref","unstructured":"Shim K (2012) Cryptanalysis of two identity-based authenticated key agreement protocols. IEEE Commun Lett 16(4)","DOI":"10.1109\/LCOMM.2012.022112.112421"},{"issue":"17","key":"1181_CR31","doi-asserted-by":"publisher","first-page":"3167","DOI":"10.1002\/sec.1241","volume":"8","author":"H Sun","year":"2015","unstructured":"Sun H, Wen Q, Zhang H, Jin Z (2015) A strongly secure identity based authenticated key agreement protocol without pairings under the GDH assumption. Secur Commun Netw 8(17):3167\u20133179","journal-title":"Secur Commun Netw"},{"key":"1181_CR32","first-page":"032109:1","volume":"59","author":"H Sun","year":"2016","unstructured":"Sun H, Wen Q, Li W (2016) A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci China Inform Sci 59:032109:1-032109:16","journal-title":"Sci China Inform Sci"},{"key":"1181_CR33","doi-asserted-by":"publisher","first-page":"6365","DOI":"10.1007\/s11042-015-2470-3","volume":"74","author":"H Tu","year":"2016","unstructured":"Tu H, Kumar N, Kim J, Seo J (2016) A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multimed Tools Appl 74:6365\u20136377","journal-title":"Multimed Tools Appl"},{"key":"1181_CR34","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovic","year":"2014","unstructured":"Turkanovic M, Brumen B, Holbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20:96\u2013112","journal-title":"Ad Hoc Netw"},{"key":"1181_CR35","doi-asserted-by":"publisher","first-page":"14966","DOI":"10.1109\/ACCESS.2017.2723265","volume":"5","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das A, Kumar N, Odelu V, Reddy A, Park Y (2017) Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access 5:14966\u201314980","journal-title":"IEEE Access"},{"issue":"14","key":"1181_CR36","first-page":"587","volume":"112","author":"M Xie","year":"2012","unstructured":"Xie M, Wang L (2012) One-round identity-based key exchange with perfect forward security. Theor Comput Sci 112(14):587\u2013591","journal-title":"Theor Comput Sci"},{"issue":"11","key":"1181_CR37","first-page":"2769","volume":"7","author":"L Yang","year":"2013","unstructured":"Yang L, Ding C, Wu M (2013) TinyIBAK: design and prototype implementation of an identity-based authenticated key agreement scheme for large scale sensor networks. KSII T Internet Inf 7(11):2769\u20132792","journal-title":"KSII T Internet Inf"},{"issue":"2","key":"1181_CR38","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.tcs.2007.02.021","volume":"378","author":"R Zhu","year":"2007","unstructured":"Zhu R, Yang G, Wong D (2007) An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theor Comput Sci 378(2):198\u2013207","journal-title":"Theor Comput Sci"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01181-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01181-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01181-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T11:28:35Z","timestamp":1624706915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01181-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,3]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1181"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01181-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,6,3]]},"assertion":[{"value":"20 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}