{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:05:37Z","timestamp":1775837137596,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["NSTC113-2221-E-194-041"],"award-info":[{"award-number":["NSTC113-2221-E-194-041"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02018-4","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T03:04:21Z","timestamp":1749438261000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An efficient certificateless signcryption for mutual and batch authentication in Vehicular Ad-hoc Networks (VANETs)"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4400-4797","authenticated-orcid":false,"given":"Wei-Kuo","family":"Chiang","sequence":"first","affiliation":[]},{"given":"Wen-Yi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"2018_CR1","doi-asserted-by":"crossref","unstructured":"Ashutosh Bhatia, K. Haribabu, Kartikeya Gupta and Aakash Sahu. \"Realization of flexible and scalable VANETs through SDN and virtualization.\" 2018 International conference on information networking (ICOIN). IEEE, 2018.","DOI":"10.1109\/ICOIN.2018.8343125"},{"key":"2018_CR2","unstructured":"Zhenbo Cao, Muhammad Diyan and Kijun Han. \"A Routing Protocol Based on Multi-factor Decision in VANET.\" 2020 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia). IEEE, 2020."},{"key":"2018_CR3","doi-asserted-by":"publisher","first-page":"98986","DOI":"10.1109\/ACCESS.2020.2997840","volume":"8","author":"Y Jiang","year":"2020","unstructured":"Jiang Y, Ge S, Shen X (2020) AAAS: An anonymous authentication scheme based on group signature in VANETs. IEEE Access 8:98986\u201398998","journal-title":"IEEE Access"},{"key":"2018_CR4","doi-asserted-by":"publisher","first-page":"206581","DOI":"10.1109\/ACCESS.2020.3038042","volume":"8","author":"L Han","year":"2020","unstructured":"Han L, Cao S, Yang X, Zhang Z (2020) Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice. IEEE Access 8:206581\u2013206591","journal-title":"IEEE Access"},{"key":"2018_CR5","doi-asserted-by":"publisher","first-page":"69936","DOI":"10.1109\/ACCESS.2019.2900593","volume":"7","author":"T Gao","year":"2019","unstructured":"Gao T, Deng X, Li Q, Collotta M, You I (2019) APPAS: A privacy-preserving authentication scheme based on pseudonym ring in VSNs. IEEE Access 7:69936\u201369946","journal-title":"IEEE Access"},{"key":"2018_CR6","doi-asserted-by":"crossref","unstructured":"Al-Riyami, Sattam S., and Kenneth G. Paterson. \"Certificateless public key cryptography.\" International conference on the theory and application of cryptology and information security. Springer, Berlin, Heidelberg, 2003.","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"3","key":"2018_CR7","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1002\/sec.760","volume":"7","author":"A Malip","year":"2014","unstructured":"Malip A, Ng S-L, Li Q (2014) A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks 7(3):588\u2013601","journal-title":"Security and Communication Networks"},{"key":"2018_CR8","doi-asserted-by":"crossref","unstructured":"Malhi, Avleen Kaur, and Shalini Batra. \"An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks.\" Discrete Mathematics and Theoretical Computer Science 17.1 (2015): 317\u2013338.","DOI":"10.46298\/dmtcs.2106"},{"issue":"1","key":"2018_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.11999\/JEIT170340","volume":"40","author":"D Wang","year":"2018","unstructured":"Wang D, Teng J (2018) Probably Secure Cetificateless Aggregate Signature Algorithm for Vehicular Ad hoc Network [J]. J Electron Inf Technol 40(1):11\u201317. https:\/\/doi.org\/10.11999\/JEIT170340","journal-title":"J Electron Inf Technol"},{"key":"2018_CR10","doi-asserted-by":"crossref","unstructured":"Wei-Kuo Chiang, Kai-Heng Lin. \"An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G. \" Mobile Netw Appl (2022).","DOI":"10.1007\/s11036-022-02044-z"},{"key":"2018_CR11","unstructured":"Xiaoming Hu, Wenan Tan, Chengcheng Yu, Chuang Ma and Huajie Xu. \"Security analysis of certificateless aggregate signature scheme in VANETs.\" 2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE, 2019."},{"key":"2018_CR12","doi-asserted-by":"publisher","unstructured":"Ruihan Dong and Jinghui Lv, \"Enhancing Telemedicine Security: A Novel Certificateless Aggregate Signature Scheme with Revocation Management,\"\u00a02024 6th International Conference on Natural Language Processing (ICNLP), Xi'an, China, 2024, pp. 290\u2013294, https:\/\/doi.org\/10.1109\/ICNLP60986.2024.10692722.","DOI":"10.1109\/ICNLP60986.2024.10692722"},{"key":"2018_CR13","doi-asserted-by":"publisher","unstructured":"Siqi Yang, Wenqiang Pan, Wenqi Zheng, Mingyong Yin, Fang Lou,\u00a0Teng Hu., \"CLAST: Efficient Certificateless Sequential Aggregate Signature Scheme for Industrial Internet of Things Environments,\"\u00a02023 IEEE 11th International Conference on Information, Communication and Networks (ICICN), Xi\u2019an, China, 2023, pp. 378\u2013384, https:\/\/doi.org\/10.1109\/ICICN59530.2023.10393378.","DOI":"10.1109\/ICICN59530.2023.10393378"},{"issue":"5","key":"2018_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","volume":"13","author":"M Raya","year":"2006","unstructured":"Raya M, Papadimitratos P, Hubaux J-P (2006) Securing vehicular communications. IEEE Wirel Commun 13(5):8\u201315","journal-title":"IEEE Wirel Commun"},{"key":"2018_CR15","doi-asserted-by":"crossref","unstructured":"Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. \"Aggregate and verifiably encrypted signatures from bilinear maps.\" International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, 2003.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"2018_CR16","doi-asserted-by":"crossref","unstructured":"C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen. \"An efficient identity-based batch verification scheme for vehicular sensor networks.\" IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, 2008.","DOI":"10.1109\/INFOCOM.2007.58"},{"key":"2018_CR17","doi-asserted-by":"crossref","unstructured":"Bako, Boto, and Michael Weber. \u201cEfficient information dissemination in VANETs.\u201d IntechOpen, 2011.","DOI":"10.5772\/15533"},{"issue":"3","key":"2018_CR18","first-page":"27","volume":"5","author":"R Kumar","year":"2012","unstructured":"Kumar R, Dave M (2012) A review of various VANET data dissemination protocols. International Journal of u-and e-Service, Science and Technology 5(3):27\u201344","journal-title":"International Journal of u-and e-Service, Science and Technology"},{"key":"2018_CR19","unstructured":"Ranjan, Prabhakar, and Kamal Kant Ahirwar. \"Comparative study of VANET and manet routing protocols.\" Proc. of the International Conference on Advanced Computing and Communication Technologies (ACCT 2011). No. Acct. 2011."},{"key":"2018_CR20","unstructured":"Da Cunha, Felipe Domingos, Azzedine Boukerche, Leandro Villas, Aline Carneiro Viana and Antonio A. F. Loureiro. \u201cData communication in VANETs: a survey, challenges, and applications.\u201d Diss. INRIA Saclay; INRIA, 2014."},{"issue":"4","key":"2018_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/2.917550","volume":"34","author":"MW Maier","year":"2001","unstructured":"Maier MW, Emery D, Hilliard R (2001) Software architecture: Introducing IEEE standard 1471. Computer 34(4):107\u2013109","journal-title":"Computer"},{"issue":"3","key":"2018_CR22","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1002\/sys.20008","volume":"7","author":"MW Maier","year":"2004","unstructured":"Maier MW, Emery D, Hilliard R (2004) ANSI\/IEEE 1471 and systems engineering. Syst Eng 7(3):257\u2013270","journal-title":"Syst Eng"},{"key":"2018_CR23","doi-asserted-by":"crossref","unstructured":"Emer, David, and Rich Hilliard. \"Every architecture description needs a framework: Expressing architecture frameworks using ISO\/IEC 42010.\" 2009 Join Working IEEE\/IFIP Conference on Software Architecture & European Conference on Software Architecture. IEEE, 2009.","DOI":"10.1109\/WICSA.2009.5290789"},{"key":"2018_CR24","doi-asserted-by":"crossref","unstructured":"Kosch, T., Schroth, C., Strassberger, M., Bechler, M. \u201cAutomotive internetworking.\u201d Vol. 4. John Wiley & Sons, 2012.","DOI":"10.1002\/9781119944737"},{"key":"2018_CR25","doi-asserted-by":"crossref","unstructured":"Moustafa Hassnaa, and Yan Zhang. \u201cVehicular networks: techniques, standards, and applications.\u201d Auerbach publications, 2009.","DOI":"10.1201\/9781420085723"},{"key":"2018_CR26","doi-asserted-by":"crossref","unstructured":"Yuliang Zheng. \"Digital signcryption or how to achieve cost (signature & encryption)\u226a cost (signature)+ cost (encryption).\" Annual international cryptology conference. Springer, Berlin, Heidelberg, 1997.","DOI":"10.1007\/BFb0052234"},{"key":"2018_CR27","doi-asserted-by":"publisher","unstructured":"Insaf Ullah, Abdullah Alomari, Ako Muhammad Abdullah, Neeraj Kumar, Amjad Alsirhani, and Fazal Noor. \u201cCertificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things.\u201d IEEE Access, vol. 10, pp. 105182\u2013105194, Oct. 2022. https:\/\/doi.org\/10.1109\/ACCESS.2022.3211257.","DOI":"10.1109\/ACCESS.2022.3211257"},{"key":"2018_CR28","unstructured":"Shamir, Adi. \"Identity-based cryptosystems and signature schemes.\" Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, 1984."},{"issue":"4","key":"2018_CR29","doi-asserted-by":"publisher","first-page":"4260","DOI":"10.1109\/TITS.2025.3528932","volume":"26","author":"A Manasrah","year":"2025","unstructured":"Manasrah A, Yaseen Q, Al-Aqrabi H, Liu Lu (2025) Identity-Based Authentication in VANETs: A Review. IEEE Trans Intell Transp Syst 26(4):4260\u20134282. https:\/\/doi.org\/10.1109\/TITS.2025.3528932","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2018_CR30","doi-asserted-by":"publisher","first-page":"121522","DOI":"10.1109\/ACCESS.2021.3109264","volume":"9","author":"A Mahmood","year":"2021","unstructured":"Mahmood A (2021) Al-Shareeda, Mohammed Anbar, Selvakumar Manickam, Ayman Khalil, and Iznan Husainy Hasbullah, \u201cSecurity and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey.\u201d IEEE Access 9:121522\u2013121531. https:\/\/doi.org\/10.1109\/ACCESS.2021.3109264","journal-title":"IEEE Access"},{"issue":"1","key":"2018_CR31","doi-asserted-by":"publisher","first-page":"479","DOI":"10.11591\/ijeecs.v21.i1.pp479-488.ISSN:2502-4752","volume":"21","author":"MA Al-Shareeda","year":"2021","unstructured":"Al-Shareeda MA, Anbar M, Alazzawi MA, Manickam S, Hasbullah IH (2021) Security schemes based on conditional privacy-preserving vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science 21(1):479\u2013488. https:\/\/doi.org\/10.11591\/ijeecs.v21.i1.pp479-488.ISSN:2502-4752","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"key":"2018_CR32","doi-asserted-by":"crossref","unstructured":"Manuel Barbosa, and Pooya Farshim. \"Certificateless signcryption.\" Proceedings of the 2008 ACM symposium on Information, computer, and communications security. 2008.","DOI":"10.1145\/1368310.1368364"},{"issue":"1","key":"2018_CR33","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/JSYST.2020.2978015","volume":"15","author":"D Dharminder","year":"2021","unstructured":"Dharminder D, Obaidat MS, Mishra D, Das AK (2021) SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment. IEEE Syst J 15(1):598\u2013606. https:\/\/doi.org\/10.1109\/JSYST.2020.2978015","journal-title":"IEEE Syst J"},{"key":"2018_CR34","doi-asserted-by":"publisher","unstructured":"D. Dharminder, D. Mishra, J. J. P. C. Rodrigues, R. de A. L. Rabelo, and K. Saleem, 2022 \u201cPSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments,\u201d Software: Practice and Experience, 52(3):744\u2013755, https:\/\/doi.org\/10.1002\/spe.2826.","DOI":"10.1002\/spe.2826"},{"key":"2018_CR35","doi-asserted-by":"publisher","first-page":"111155","DOI":"10.1016\/j.comnet.2025.111155","volume":"261","author":"M Shariq","year":"2025","unstructured":"Shariq M, Ahmed IT, Masud M, Berini ADE, Jamil N (2025) Design of a provable secure lightweight privacy-preserving authentication protocol for autonomous vehicles in IoT systems. Comput Netw 261:111155. https:\/\/doi.org\/10.1016\/j.comnet.2025.111155","journal-title":"Comput Netw"},{"key":"2018_CR36","doi-asserted-by":"publisher","first-page":"104001","DOI":"10.1016\/j.jisa.2025.104001","volume":"77","author":"X Wang","year":"2025","unstructured":"Wang X, Zeng P, Liu G, Li K-C, Liu Y, Biao Hu, Palmieri F (2025) A privacy-preserving certificate-less aggregate signature scheme with detectable invalid signatures for VANETs. Journal of Information Security and Applications 77:104001. https:\/\/doi.org\/10.1016\/j.jisa.2025.104001","journal-title":"Journal of Information Security and Applications"},{"key":"2018_CR37","doi-asserted-by":"publisher","unstructured":"Abdulwahab Ali Almazroi, Eman A. Aldhahri, Mahmood A. Al-Shareeda, and Selvakumar Manickam, \u201cECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing,\u201d PLOS ONE, Published: Jun. 23, 2023. https:\/\/doi.org\/10.1371\/journal.pone.0287291.","DOI":"10.1371\/journal.pone.0287291"},{"issue":"13","key":"2018_CR38","doi-asserted-by":"publisher","first-page":"5026","DOI":"10.3390\/s22135026","volume":"22","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda MA, Manickam S, Mohammed BA, Al-Mekhlafi ZG, Qtaish A, Alzahrani AJ, Alshammari G, Sallam AA, Almekhlafi K (2022) CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 22(13):5026. https:\/\/doi.org\/10.3390\/s22135026","journal-title":"Sensors"},{"key":"2018_CR39","doi-asserted-by":"publisher","unstructured":"Y. Salami and V. Khajehvand, \u201cLSKE: Lightweight Secure Key Exchange Scheme in Fog Federation,\u201d Security and Privacy, vol. 4, Oct. 2021. [Online]. Available: https:\/\/doi.org\/10.1155\/2021\/4667586","DOI":"10.1155\/2021\/4667586"},{"key":"2018_CR40","doi-asserted-by":"publisher","unstructured":"Y. Salami, V. Khajehvand, and E. Zeinali, \u201cSAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation,\u201d Security and Privacy, vol. 6, Apr. 2023. [Online]. Available: https:\/\/doi.org\/10.1155\/2023\/9143563","DOI":"10.1155\/2023\/9143563"},{"issue":"1","key":"2018_CR41","doi-asserted-by":"publisher","first-page":"5576","DOI":"10.1038\/s41598-024-56141-y","volume":"14","author":"Y Salami","year":"2024","unstructured":"Salami Y, Khajehvand V, Zeinali E (2024) A new secure offloading approach for internet of vehicles in the fog-cloud federation. Sci Rep 14(1):5576. https:\/\/doi.org\/10.1038\/s41598-024-56141-y","journal-title":"Sci Rep"},{"key":"2018_CR42","doi-asserted-by":"publisher","unstructured":"Gopal Singh Rawat, Karan Singh, Mohd Shariq, Ashok Kumar Das, Shehzad Ashraf Chaudhry, and Pascal Lorenz. \u201cBTC2PA: A Blockchain-Assisted Trust Computation With Conditional Privacy-Preserving Authentication for Connected Vehicles.\u201d IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 1, pp. 1134\u20131148, Jan. 2025. https:\/\/doi.org\/10.1109\/TITS.2024.3488184.","DOI":"10.1109\/TITS.2024.3488184"},{"key":"2018_CR43","doi-asserted-by":"publisher","unstructured":"Yahui Wang, Cong Peng, Xiaoying Jia, Jiaming Wen, and Yuanyuan Zhang. \u201cPairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs.\u201d IEEE Internet of Things Journal, Early Access, pp. 1\u20131, Jan. 2025. https:\/\/doi.org\/10.1109\/JIOT.2025.3528067.","DOI":"10.1109\/JIOT.2025.3528067"},{"key":"2018_CR44","doi-asserted-by":"publisher","unstructured":"Y. Salami, \u201cSOBT-UF: Secure offloading in blockchain infrastructure for intelligent transportation systems using 5G-enabled UAVs within a fog-edge computing federation,\u201d 2024 19th Iranian Conference on Intelligent Systems (ICIS), Sirjan, Iran, Oct. 2024, https:\/\/doi.org\/10.1109\/ICIS64839.2024.10887460.","DOI":"10.1109\/ICIS64839.2024.10887460"},{"key":"2018_CR45","doi-asserted-by":"publisher","unstructured":"Gopal Singh Rawat, Karan Singh, Noreen Izza Arshad, Komeil Hadidi, and Ali Ahmadian. \u201cA lightweight authentication scheme with privacy preservation for vehicular networks.\u201d Computers and Electrical Engineering, vol. 100, 108016, May 2022. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108016.","DOI":"10.1016\/j.compeleceng.2022.108016"},{"key":"2018_CR46","doi-asserted-by":"publisher","unstructured":"Abdulnasser AbdulJabbar Abbood, Faris K. AL-Shammri, Zainab Marid Alzamili, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, and Rommel AlAli, \u201cInvestigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs),\u201d Journal of Robotics and Control (JRC), vol. 6, no. 1, 2025. https:\/\/doi.org\/10.18196\/jrc.v6i1.25351. ISSN: 2715\u20135072.","DOI":"10.18196\/jrc.v6i1.25351"},{"key":"2018_CR47","doi-asserted-by":"crossref","unstructured":"N. B. Gayathri, Gowri Thumbur, P. Vasudeva Reddy, and Muhammad Zia Ur Rahman. \"Efficient pairing-free certificateless authentication scheme with batch verification for vehicular ad-hoc networks.\" IEEE Access 6 (2018): 31808\u201331819.","DOI":"10.1109\/ACCESS.2018.2845464"},{"key":"2018_CR48","doi-asserted-by":"crossref","unstructured":"Xiaodong Yang, Rui Liu, Meiding Wang and Guilan Chen. \"Identity-based aggregate signature scheme in vehicle ad-hoc network.\" 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). IEEE, 2019.","DOI":"10.1109\/ICMCCE48743.2019.00233"},{"key":"2018_CR49","doi-asserted-by":"crossref","unstructured":"Anil Kumar Sutrala, Palak Bagga, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues, and Pascal Lorenz. \"On the design of conditional privacy-preserving batch verification-based authentication scheme for Internet of vehicles deployment.\" IEEE Transactions on Vehicular Technology 69.5 (2020): 5535\u20135548.","DOI":"10.1109\/TVT.2020.2981934"},{"key":"2018_CR50","doi-asserted-by":"publisher","first-page":"178310","DOI":"10.1109\/ACCESS.2019.2958356","volume":"7","author":"C Zhang","year":"2019","unstructured":"Zhang C, Xue X, Feng L, Zeng X, Ma J (2019) Group-signature and group session key combined safety message authentication protocol for VANETs. IEEE Access 7:178310\u2013178320","journal-title":"IEEE Access"},{"key":"2018_CR51","doi-asserted-by":"crossref","unstructured":"Sikarwar, Himani, Ankur Nahar, and Debasis Das. \"LABVS: Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV).\" 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring). IEEE, 2020.","DOI":"10.1109\/VTC2020-Spring48590.2020.9129180"},{"key":"2018_CR52","doi-asserted-by":"crossref","unstructured":"Ahamed, Anis Begum Shakeel, Navaneetha Kanagaraj, and Maria Azees. \"EMBA: An efficient anonymous mutual and batch authentication schemes for VANETs.\" 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018.","DOI":"10.1109\/ICICCT.2018.8473110"},{"key":"2018_CR53","doi-asserted-by":"crossref","unstructured":"Li Cui, Bai Yun, Shi Lin and Bai Wenhua. \"A New Certificateless Signcryption Scheme Without Bilinear Pairing.\" 2018 13th International Conference on Computer Science & Education (ICCSE). IEEE, 2018.","DOI":"10.1109\/ICCSE.2018.8468859"},{"key":"2018_CR54","doi-asserted-by":"crossref","unstructured":"S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan, \u201cCryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing.\u201d International Conference on Information Security and Cryptology, Inscrypt 2009: Information Security and Cryptology, 75 \u2013 92.","DOI":"10.1007\/978-3-642-16342-5_6"},{"key":"2018_CR55","doi-asserted-by":"crossref","unstructured":"A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cu\u00e9llar, et al., \u201cThe AVISPA tool for the automated validation of Internet security protocols and applications,\u201d in Proc. 17th Int. Conf. Computer Aided Verification (CAV), Edinburgh, UK, Jul. 2005, pp. 281\u2013285.","DOI":"10.1007\/11513988_27"},{"key":"2018_CR56","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigano","year":"2006","unstructured":"Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electron Notes Theor Comput Sci 155:61\u201386. https:\/\/doi.org\/10.1016\/j.entcs.2005.11.052","journal-title":"Electron Notes Theor Comput Sci"},{"key":"2018_CR57","unstructured":"T. Genet, \u201cSPAN: Security Protocol ANimator,\u201d Accessed: Apr. 1, 2025. [Online]. Available: https:\/\/people.irisa.fr\/Thomas.Genet\/span\/"},{"key":"2018_CR58","doi-asserted-by":"publisher","unstructured":"J. R. Douceur, \u201cThe Sybil Attack,\u201d in Peer-to-Peer Systems, P. Druschel, F. Kaashoek, and A. Rowstron, Eds., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2002, pp. 251\u2013260. https:\/\/doi.org\/10.1007\/3-540-45748-8_24.","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"7","key":"2018_CR59","doi-asserted-by":"publisher","first-page":"7863","DOI":"10.1109\/TVT.2022.3169948","volume":"71","author":"X Zhou","year":"2022","unstructured":"Zhou X, Luo M, Vijayakumar P, Peng C, He D (2022) Efficient certificateless conditional privacy-preserving authentication for VANETs. IEEE Trans Veh Technol 71(7):7863\u20137875","journal-title":"IEEE Trans Veh Technol"},{"key":"2018_CR60","doi-asserted-by":"crossref","unstructured":"Han Y, Song W, Zhou Z, Wang H, Yuan B. 2021 \u201ceCLAS: An efficient pairing-free certificateless aggregate signature for secure VANET communication. \u201dIEEE Systems Journal;16(1):1637\u201348.","DOI":"10.1109\/JSYST.2021.3116029"},{"key":"2018_CR61","doi-asserted-by":"publisher","unstructured":"Pandi Vijayakumar, Maria Azees, Sergei A. Kozlov and Joel J. P. C. Rodrigues, \"An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs,\" in\u00a0IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 2, pp. 1630\u20131638, Feb. 2022, https:\/\/doi.org\/10.1109\/TITS.2021.3099488.","DOI":"10.1109\/TITS.2021.3099488"},{"issue":"10","key":"2018_CR62","doi-asserted-by":"publisher","first-page":"14245","DOI":"10.1109\/TITS.2024.3397352","volume":"25","author":"A Karati","year":"2024","unstructured":"Karati A, Chang L-C (2024) AnonMAKE: Toward Secure and Anonymous Mutually Authenticated Key Exchange Protocol for Vehicular Communications. IEEE Trans Intell Transp Syst 25(10):14245\u201314258. https:\/\/doi.org\/10.1109\/TITS.2024.3397352","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2018_CR63","first-page":"84","volume":"2015","author":"Z Cao","year":"2015","unstructured":"Cao Z, Liu L (2015) On the Disadvantages of Pairing-based Cryptography. IACR Cryptol ePrint Arch 2015:84","journal-title":"IACR Cryptol ePrint Arch"},{"key":"2018_CR64","unstructured":"Pairing-Based Cryptography Library, [online] Available: http:\/\/crypto.stanford.edu\/pbc\/."},{"key":"2018_CR65","unstructured":"ECPy, [online] Available: https:\/\/github.com\/cslashm\/ECPy"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02018-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02018-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02018-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:11Z","timestamp":1758986531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02018-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":65,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2018"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02018-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"1 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"206"}}