{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:15:19Z","timestamp":1768522519941,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62162017,61962012"],"award-info":[{"award-number":["62162017,61962012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Science and Technology Major Program","award":["AA22068067"],"award-info":[{"award-number":["AA22068067"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["KX202329"],"award-info":[{"award-number":["KX202329"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01920-1","type":"journal-article","created":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T11:50:34Z","timestamp":1744026634000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure traffic data sharing in UAV-assisted VANET through certificateless proxy re-encryption and consortium blockchain"],"prefix":"10.1007","volume":"18","author":[{"given":"Yilin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Changsong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Huiyong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,7]]},"reference":[{"key":"1920_CR1","doi-asserted-by":"publisher","unstructured":"Feng X, Wang X, Cui K, Xie Q, Wang L (2023) Traffic data security sharing scheme based on blockchain and traceable ring signature for vanets. Peer-to-Peer Netw Appl 145. https:\/\/doi.org\/10.1016\/j.sysarc.2023.103029","DOI":"10.1016\/j.sysarc.2023.103029"},{"issue":"1","key":"1920_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/TIV.2022.3157049","volume":"7","author":"D Cao","year":"2022","unstructured":"Cao D, Wang X, Li L, Lv C, Na X, Xing Y, Li X, Li Y, Chen Y, Wang FY (2022) Future directions of intelligent vehicles: Potentials, possibilities, and perspectives. IEEE Trans Intell Veh 7(1):7\u201310. https:\/\/doi.org\/10.1109\/TIV.2022.3157049","journal-title":"IEEE Trans Intell Veh"},{"issue":"2","key":"1920_CR3","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/TIV.2022.3164657","volume":"8","author":"C Xu","year":"2023","unstructured":"Xu C, Wu H, Liu H, Gu W, Li Y, Cao D (2023) Blockchain-oriented privacy protection of sensitive data in the internet of vehicles. IEEE Trans Intell Veh 8(2):1057\u20131067. https:\/\/doi.org\/10.1109\/TIV.2022.3164657","journal-title":"IEEE Trans Intell Veh"},{"key":"1920_CR4","doi-asserted-by":"publisher","first-page":"4830","DOI":"10.1109\/TIFS.2023.3299466","volume":"18","author":"J Zhang","year":"2023","unstructured":"Zhang J, Su S, Zhong H, Cui J, He D (2023) Identity-based broadcast proxy re-encryption for flexible data sharing in vanets. IEEE Trans Inf Forensics Secur 18:4830\u20134842. https:\/\/doi.org\/10.1109\/TIFS.2023.3299466","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1920_CR5","doi-asserted-by":"publisher","first-page":"162401","DOI":"10.1109\/ACCESS.2021.3130495","volume":"9","author":"AA Elkhail","year":"2021","unstructured":"Elkhail AA, Refat RUD, Habre R, Hafeez A, Bacha A, Malik H (2021) Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses. IEEE Access 9:162401\u2013162437. https:\/\/doi.org\/10.1109\/ACCESS.2021.3130495","journal-title":"IEEE Access"},{"issue":"6","key":"1920_CR6","doi-asserted-by":"publisher","first-page":"3697","DOI":"10.1109\/TITS.2020.3028990","volume":"22","author":"C Lin","year":"2021","unstructured":"Lin C, Han G, Du J, Xu T, Peng Y (2021) Adaptive traffic engineering based on active network measurement towards software defined internet of vehicles. IEEE Trans Intel Transp Syst 22(6):3697\u20133706. https:\/\/doi.org\/10.1109\/TITS.2020.3028990","journal-title":"IEEE Trans Intel Transp Syst"},{"key":"1920_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100414","volume":"34","author":"B Samra","year":"2022","unstructured":"Samra B, Fouzi S (2022) New efficient certificateless scheme-based conditional privacy preservation authentication for applications in vanet. Veh Commun 34:100414. https:\/\/doi.org\/10.1016\/j.vehcom.2021.100414","journal-title":"Veh Commun"},{"issue":"12","key":"1920_CR8","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1109\/JAS.2021.1004225","volume":"8","author":"SK Dwivedi","year":"2021","unstructured":"Dwivedi SK, Amin R, Vollala S (2021) Blockchain-based secured ipfs-enable event storage technique with authentication protocol in vanet. IEEE\/CAA J Autom Sin 8(12):1913\u20131922. https:\/\/doi.org\/10.1109\/JAS.2021.1004225","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"6","key":"1920_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.3390\/drones6060147","volume":"6","author":"SAH Mohsan","year":"2022","unstructured":"Mohsan SAH, Khan MA, Noor F, Ullah I, Alsharif MH (2022) Towards the unmanned aerial vehicles (uavs): A comprehensive review. Drones 6(6):147. https:\/\/doi.org\/10.3390\/drones6060147","journal-title":"Drones"},{"key":"1920_CR10","doi-asserted-by":"publisher","first-page":"77535","DOI":"10.1109\/ACCESS.2020.2989790","volume":"8","author":"RA Nazib","year":"2020","unstructured":"Nazib RA, Moh S (2020) Routing protocols for unmanned aerial vehicle-aided vehicular ad hoc networks: A survey. IEEE Access 8:77535\u201377560. https:\/\/doi.org\/10.1109\/ACCESS.2020.2989790","journal-title":"IEEE Access"},{"issue":"12","key":"1920_CR11","doi-asserted-by":"publisher","first-page":"15933","DOI":"10.1109\/TVT.2020.3037804","volume":"69","author":"SJ Horng","year":"2020","unstructured":"Horng SJ, Lu CC, Zhou W (2020) An identity-based and revocable data-sharing scheme in vanets. IEEE Trans Veh Technol 69(12):15933\u201315946. https:\/\/doi.org\/10.1109\/TVT.2020.3037804","journal-title":"IEEE Trans Veh Technol"},{"key":"1920_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/5031112","volume":"2022","author":"Z Wang","year":"2022","unstructured":"Wang Z, Xu Y, Liu J, Li Z, Li Z, Jia H, Wang D (2022) An efficient data sharing scheme for privacy protection based on blockchain and edge intelligence in 6g-vanet. Wirel Commun Mob Comput 2022:1\u201318. https:\/\/doi.org\/10.1155\/2022\/5031112","journal-title":"Wirel Commun Mob Comput"},{"key":"1920_CR13","doi-asserted-by":"publisher","unstructured":"Deng X, Gao T, Guo N, Xie K (2022) A secure data sharing scheme based on cp-abe in vanets. In: International conference on innovative mobile and internet services in ubiquitous computing, Springer, pp 65\u201374. https:\/\/doi.org\/10.1007\/978-3-031-08819-3_7","DOI":"10.1007\/978-3-031-08819-3_7"},{"key":"1920_CR14","doi-asserted-by":"publisher","first-page":"85190","DOI":"10.1109\/ACCESS.2020.2992203","volume":"8","author":"H Li","year":"2020","unstructured":"Li H, Pei L, Liao D, Chen S, Zhang M, Xu D (2020) Fadb: A fine-grained access control scheme for vanet data based on blockchain. IEEE Access 8:85190\u201385203. https:\/\/doi.org\/10.1109\/ACCESS.2020.2992203","journal-title":"IEEE Access"},{"issue":"3","key":"1920_CR15","doi-asserted-by":"publisher","first-page":"2170","DOI":"10.1109\/TITS.2020.3034223","volume":"23","author":"X Liu","year":"2020","unstructured":"Liu X, Chen W, Xia Y (2020) Security-aware information dissemination with fine-grained access control in cooperative multi-rsu of vanets. IEEE Trans Intel Transp Syst 23(3):2170\u20132179. https:\/\/doi.org\/10.1109\/TITS.2020.3034223","journal-title":"IEEE Trans Intel Transp Syst"},{"key":"1920_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1494-1","volume":"1","author":"J Pan","year":"2019","unstructured":"Pan J, Cui J, Wei L, Xu Y (2019) Zhong H (2019) Secure data sharing scheme for vanets based on edge computing. EURASIP J Wirel Commun Netw 1:1\u201311. https:\/\/doi.org\/10.1186\/s13638-019-1494-1","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"1920_CR17","doi-asserted-by":"publisher","unstructured":"Han X, Tian D, Zhou J, Duan X, Sheng Z, Leung VCM (2023) Privacy-preserving proxy re-encryption with decentralized trust management for mec-empowered vanets. IEEE Trans Intell Veh 1\u201315. https:\/\/doi.org\/10.1109\/TIV.2023.3289069","DOI":"10.1109\/TIV.2023.3289069"},{"key":"1920_CR18","doi-asserted-by":"publisher","unstructured":"Noh SW, Park Y, Sur C, Shin SU, Rhee KH (2017) Blockchain-based user-centric records management system. Int J Control Autom 10(11):133\u2013144. https:\/\/doi.org\/10.14257\/ijca.2017.10.11.12","DOI":"10.14257\/ijca.2017.10.11.12"},{"key":"1920_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2020.02.064","volume":"522","author":"Y Wang","year":"2020","unstructured":"Wang Y, Pang H, Deng RH, Ding Y, Wu Q, Qin B, Fan K (2020) Secure server-aided data sharing clique with attestation. Inf Sci 522:80\u201398. https:\/\/doi.org\/10.1016\/j.ins.2020.02.064","journal-title":"Inf Sci"},{"key":"1920_CR20","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1155\/2021\/1567019","volume":"2021","author":"WB Kim","year":"2021","unstructured":"Kim WB, Kim SH, Seo D, Lee IY (2021) Broadcast proxy reencryption based on certificateless public key cryptography for secure data sharing. Wirel Commun Mob Comput 2021:16. https:\/\/doi.org\/10.1155\/2021\/1567019","journal-title":"Wirel Commun Mob Comput"},{"key":"1920_CR21","doi-asserted-by":"publisher","unstructured":"Eltayieb N, Sun L, Wang K, Li F (2019) A certificateless proxy re-encryption scheme for cloud-based blockchain. In: Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi\u2019an, China, November 15\u201317, 2019, Proceedings 2, Springer, pp 293\u2013307. https:\/\/doi.org\/10.1007\/978-981-15-0818-9_19","DOI":"10.1007\/978-981-15-0818-9_19"},{"key":"1920_CR22","doi-asserted-by":"publisher","unstructured":"Yang H, Li L, Yang C (2022) A fine-grained certificateless conditional proxy broadcast re-encryption scheme without pairing. In: 2022 IEEE 10th joint international information technology and artificial intelligence conference (ITAIC), vol 10, pp 1414\u20131423. https:\/\/doi.org\/10.1109\/ITAIC54216.2022.9836814","DOI":"10.1109\/ITAIC54216.2022.9836814"},{"key":"1920_CR23","doi-asserted-by":"publisher","unstructured":"Xiong W, Wang R, Wang Y, Zhou F, Luo X (2021) Cppa-d: Efficient conditional privacy-preserving authentication scheme with double-insurance in vanets. IEEE Trans Veh Technol 70(4):3456\u20133468. https:\/\/doi.org\/10.1109\/TVT.2021.3064337","DOI":"10.1109\/TVT.2021.3064337"},{"key":"1920_CR24","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1007\/s12083-019-00786-4","volume":"12","author":"H Li","year":"2019","unstructured":"Li H, Pei L, Liao D, Sun G, Xu D (2019) Blockchain meets vanet: An architecture for identity and location privacy protection in vanet. Peer-to-Peer Netw Appl 12:1178\u20131193. https:\/\/doi.org\/10.1007\/s12083-019-00786-4","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"5","key":"1920_CR25","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1109\/JBHI.2022.3183397","volume":"27","author":"J Liu","year":"2023","unstructured":"Liu J, Jiang W, Sun R, Bashir AK, Alshehri MD, Hua Q, Yu K (2023) Conditional anonymous remote healthcare data sharing over blockchain. IEEE J Biomed Health Inf 27(5):2231\u20132242. https:\/\/doi.org\/10.1109\/JBHI.2022.3183397","journal-title":"IEEE J Biomed Health Inf"},{"key":"1920_CR26","doi-asserted-by":"publisher","unstructured":"Kumar R, Marchang N, Tripathi R (2020) Distributed off-chain storage of patient diagnostic reports in healthcare system using ipfs and blockchain. In: 2020 international conference on communication systems & NETworkS (COMSNETS), pp 1\u20135. https:\/\/doi.org\/10.1109\/COMSNETS48256.2020.9027313","DOI":"10.1109\/COMSNETS48256.2020.9027313"},{"key":"1920_CR27","doi-asserted-by":"publisher","unstructured":"Sun J, Yao X, Wang S, Wu Y (2020) Blockchain-based secure storage and access scheme for electronic medical records in ipfs. IEEE Access 8:59389\u201359401. https:\/\/doi.org\/10.1109\/ACCESS.2020.2982964","DOI":"10.1109\/ACCESS.2020.2982964"},{"key":"1920_CR28","doi-asserted-by":"publisher","unstructured":"Liu Y, Wang Y, Yi C, Ding Y, Yang C, Wang H (2023) Secure traffic data sharing in uav-assisted vanets. Int Conf Collab Comput Netw Appl Worksharing 562:301\u2013320. https:\/\/doi.org\/10.1007\/978-3-031-54528-3_17","DOI":"10.1007\/978-3-031-54528-3_17"},{"issue":"11","key":"1920_CR29","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun ACM"},{"key":"1920_CR30","doi-asserted-by":"publisher","unstructured":"Micali S, Rabin M, Vadhan S (1999) Verifiable random functions. In: 40th annual symposium on foundations of computer science (Cat. No.99CB37039), pp 120\u2013130. https:\/\/doi.org\/10.1109\/SFFCS.1999.814584","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"1920_CR31","doi-asserted-by":"publisher","first-page":"70017","DOI":"10.1109\/ACCESS.2018.2879479","volume":"6","author":"P Zeng","year":"2018","unstructured":"Zeng P, Choo KKR (2018) A new kind of conditional proxy re-encryption for secure cloud storage. IEEE Access 6:70017\u201370024. https:\/\/doi.org\/10.1109\/ACCESS.2018.2879479","journal-title":"IEEE Access"},{"issue":"3","key":"1920_CR32","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TDSC.2019.2899300","volume":"18","author":"C Ge","year":"2021","unstructured":"Ge C, Liu Z, Xia J, Fang L (2021) Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Trans Dependable Sec Comput 18(3):1214\u20131226. https:\/\/doi.org\/10.1109\/TDSC.2019.2899300","journal-title":"IEEE Trans Dependable Sec Comput"},{"key":"1920_CR33","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ins.2019.01.051","volume":"527","author":"M Su","year":"2020","unstructured":"Su M, Zhou B, Fu A, Yu Y, Zhang G (2020) Prta: A proxy re-encryption based trusted authorization scheme for nodes on cloudiot. Inf Sci 527:533\u2013547. https:\/\/doi.org\/10.1016\/j.ins.2019.01.051","journal-title":"Inf Sci"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01920-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01920-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01920-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:32:38Z","timestamp":1746844358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01920-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,7]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1920"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01920-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,7]]},"assertion":[{"value":"26 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Yes.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"143"}}