{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:23:52Z","timestamp":1776115432229,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T00:00:00Z","timestamp":1749254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T00:00:00Z","timestamp":1749254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key Laboratory of Industrial Information Security Perception and Evaluation Technology, Ministry of Industry and Information Technology"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372285"],"award-info":[{"award-number":["62372285"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013105","name":"Shanghai Rising-Star Program","doi-asserted-by":"publisher","award":["22QA1403800"],"award-info":[{"award-number":["22QA1403800"]}],"id":[{"id":"10.13039\/501100013105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02029-1","type":"journal-article","created":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T03:49:50Z","timestamp":1749268190000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A security enhanced certificateless aggregate signcryption scheme for VANETs"],"prefix":"10.1007","volume":"18","author":[{"given":"Dong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wentao","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Liangliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiquan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,7]]},"reference":[{"issue":"19","key":"2029_CR1","doi-asserted-by":"publisher","first-page":"19086","DOI":"10.1109\/JIOT.2022.3163607","volume":"9","author":"S Niu","year":"2022","unstructured":"Niu S, Shao H, Hu Y, Zhou S, Wang C (2022) Privacy-preserving mutual heterogeneous signcryption schemes based on 5g network slicing. IEEE Internet Things J 9(19):19086\u201319100","journal-title":"IEEE Internet Things J"},{"key":"2029_CR2","unstructured":"Liu Z, Wan L, Guo J, Huang F, Feng X, Wang L, Ma J (2023) Ppru: A privacy-preserving reputation updating scheme for cloud-assisted vehicular networks. IEEE Trans Veh Technol"},{"issue":"9","key":"2029_CR3","doi-asserted-by":"publisher","first-page":"10138","DOI":"10.1109\/TITS.2023.3271110","volume":"24","author":"Y Liang","year":"2023","unstructured":"Liang Y, Yan H, Liu Y (2023) Unlinkable signcryption scheme for multi-receiver in vanets. IEEE Trans Intell Transp Syst 24(9):10138\u201310154","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2029_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110864","volume":"255","author":"X Liu","year":"2024","unstructured":"Liu X, Xiong X, Wang J, Qi Y (2024) An internet of vehicles road traffic data sharing scheme based on signcryption and editable blockchain. Comput Netw 255:110864","journal-title":"Comput Netw"},{"key":"2029_CR5","doi-asserted-by":"crossref","unstructured":"Rivest R (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM","DOI":"10.21236\/ADA606588"},{"key":"2029_CR6","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security, Springer, pp 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"2029_CR7","doi-asserted-by":"crossref","unstructured":"Yang X, Li S, Yang L, Du X, Wang C (2024) Efficient and security-enhanced certificateless aggregate signature-based authentication scheme with conditional privacy preservation for vanets. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2024.3367925"},{"key":"2029_CR8","doi-asserted-by":"crossref","unstructured":"Shao H, Piao C (2023) A provably secure lightweight authentication based on elliptic curve signcryption for vehicle-to-vehicle communication in vanets. IEEE Trans Ind Inf","DOI":"10.1016\/j.comnet.2023.109969"},{"key":"2029_CR9","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.comcom.2024.02.018","volume":"218","author":"Z Ou","year":"2024","unstructured":"Ou Z, Xing X, He S, Wang G (2024) Tds-na: Blockchain-based trusted data sharing scheme with pki authentication. Comput Commun 218:240\u2013252","journal-title":"Comput Commun"},{"issue":"2","key":"2029_CR10","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s11276-023-03503-5","volume":"30","author":"PK Pandey","year":"2024","unstructured":"Pandey PK, Kansal V, Swaroop A (2024) Pki-smr: Pki based secure multipath routing for unmanned military vehicles (umv) in vanets. Wireless Netw 30(2):595\u2013615","journal-title":"Wireless Netw"},{"key":"2029_CR11","doi-asserted-by":"crossref","unstructured":"Venkatesan K, Srinivasan S, Thamodharan P, Nagar N, Haribabu P, Sudarsan S, Pandian KS (2024) Distributed estimation based public key infrastructure for in-vehicle network security. In: 2024 IEEE international conference on public key infrastructure and its applications (PKIA), IEEE, pp 1\u20137","DOI":"10.1109\/PKIA62599.2024.10729035"},{"issue":"9","key":"2029_CR12","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees M, Vijayakumar P, Deboarh LJ (2017) Eaap: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18(9):2467\u20132476","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2029_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121540","volume":"690","author":"Y Gao","year":"2025","unstructured":"Gao Y, Deng L, Feng S, Liu H, Li B, Wang N (2025) Revocable certificate-based broadcast signcryption scheme for edge-enabled iiot. Inf Sci 690:121540","journal-title":"Inf Sci"},{"key":"2029_CR14","doi-asserted-by":"crossref","unstructured":"Zhou H, Shen W, Liu J (2025) Certificate-based multi-copy cloud storage auditing supporting data dynamics. Comput Secur 148","DOI":"10.1016\/j.cose.2024.104096"},{"key":"2029_CR15","doi-asserted-by":"crossref","unstructured":"Xu Z, Wang L, Luo Y, Long Y, Zhang K, Yan H, Chen K (2023) A security-enhanced conditional privacy-preserving certificateless aggregate signature scheme for vehicular ad-hoc networks. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3337136"},{"key":"2029_CR16","doi-asserted-by":"crossref","unstructured":"Lian Y, Wei X (2020) Lightweight identity authentication scheme based on ibc identity cryptograph. In: Big data and security: 1st International conference, ICBDS 2019, Nanjing, China, December 20\u201322, 2019, Revised Selected Papers 1, Springer, pp 190\u2013198","DOI":"10.1007\/978-981-15-7530-3_13"},{"key":"2029_CR17","doi-asserted-by":"crossref","unstructured":"Chen X, Wang W, Gan W, Yang Y, Yuan S, Li M (2011) Mobile terminal identity authentication method based on ibc. In:\u00a0International conference on smart computing and communication, Springer, pp 112\u2013122","DOI":"10.1007\/978-3-030-97774-0_10"},{"issue":"4","key":"2029_CR18","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1109\/TCC.2016.2545668","volume":"6","author":"J Wei","year":"2016","unstructured":"Wei J, Liu W, Hu X (2016) Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Trans Cloud Comput 6(4):1136\u20131148","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"2029_CR19","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TCC.2020.2973623","volume":"8","author":"K Lee","year":"2020","unstructured":"Lee K (2020) Comments on \u201csecure data sharing in cloud computing using revocable-storage identity-based encryption\". IEEE Trans Cloud Comput 8(4):1299\u20131300","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"2029_CR20","doi-asserted-by":"publisher","first-page":"5373","DOI":"10.1109\/JSYST.2020.2977670","volume":"14","author":"Y Wang","year":"2020","unstructured":"Wang Y, Zhong H, Xu Y, Cui J, Wu G (2020) Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for vanets. IEEE Syst J 14(4):5373\u20135383","journal-title":"IEEE Syst J"},{"issue":"4","key":"2029_CR21","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TVT.2015.2406877","volume":"66","author":"S-F Tzeng","year":"2015","unstructured":"Tzeng S-F, Horng S-J, Li T, Wang X, Huang P-H, Khan MK (2015) Enhancing security and privacy for identity-based batch verification scheme in vanets. IEEE Trans Veh Technol 66(4):3235\u20133248","journal-title":"IEEE Trans Veh Technol"},{"key":"2029_CR22","doi-asserted-by":"crossref","unstructured":"Cobblah CNA, Xia Q, Gao J, Xia H, Kusi GA, Obiri IA (2024) A secure and lightweight ndn-based vehicular network using edge computing and certificateless signcryption. IEEE Internet Things J","DOI":"10.1109\/JIOT.2024.3399031"},{"key":"2029_CR23","doi-asserted-by":"crossref","unstructured":"Zhan Q, Luo M, Qiu M (2024) An efficient multi-mode certificateless ring signcryption scheme in vanets. IEEE Internet Things J","DOI":"10.1109\/JIOT.2024.3430482"},{"issue":"10","key":"2029_CR24","doi-asserted-by":"publisher","first-page":"9136","DOI":"10.1109\/JIOT.2022.3233180","volume":"10","author":"X Chen","year":"2022","unstructured":"Chen X, He D, Khan MK, Luo M, Peng C (2022) A secure certificateless signcryption scheme without pairing for internet of medical things. IEEE Internet Things J 10(10):9136\u20139147","journal-title":"IEEE Internet Things J"},{"key":"2029_CR25","doi-asserted-by":"crossref","unstructured":"Li H, Wu C, Pang L (2022) Completely anonymous certificateless multi-receiver signcryption scheme with sender traceability. J Inf Secur Appl 71","DOI":"10.1016\/j.jisa.2022.103384"},{"key":"2029_CR26","doi-asserted-by":"crossref","unstructured":"Zhou Y, Xu R, Qiao Z, Yang B, Xia Z, Zhang M (2023) An anonymous and efficient multi-message and multi-receiver certificateless signcryption scheme for vanet. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3305489"},{"key":"2029_CR27","doi-asserted-by":"publisher","first-page":"180205","DOI":"10.1109\/ACCESS.2019.2958089","volume":"7","author":"J Qiu","year":"2019","unstructured":"Qiu J, Fan K, Zhang K, Pan Q, Li H, Yang Y (2019) An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile iot. IEEE Access 7:180205\u2013180217","journal-title":"IEEE Access"},{"issue":"3","key":"2029_CR28","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/JIOT.2017.2666783","volume":"4","author":"S Basudan","year":"2017","unstructured":"Basudan S, Lin X, Sankaranarayanan K (2017) A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J 4(3):772\u2013782","journal-title":"IEEE Internet Things J"},{"key":"2029_CR29","doi-asserted-by":"crossref","unstructured":"Han Y, Zhou Y, Yang B, Xia Z, Zhang M (2023) An efficient and secure lightweight certificateless hybrid signcryption scheme. IEEE Internet of Things J","DOI":"10.1109\/JIOT.2023.3332492"},{"issue":"10","key":"2029_CR30","doi-asserted-by":"publisher","first-page":"11266","DOI":"10.1109\/TVT.2020.3008781","volume":"69","author":"I Ali","year":"2020","unstructured":"Ali I, Lawrence T, Omala AA, Li F (2020) An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in vanets. IEEE Trans Veh Technol 69(10):11266\u201311280","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"2029_CR31","doi-asserted-by":"publisher","first-page":"5974","DOI":"10.1109\/TVT.2021.3078806","volume":"70","author":"I Ali","year":"2021","unstructured":"Ali I, Chen Y, Ullah N, Afzal M, Wen H (2021) Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications. IEEE Trans Veh Technol 70(6):5974\u20135989","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02029-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02029-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02029-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:00Z","timestamp":1758986520000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02029-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,7]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2029"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02029-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,7]]},"assertion":[{"value":"24 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"204"}}