{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:30:48Z","timestamp":1775010648542,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61461027"],"award-info":[{"award-number":["No. 61461027"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Gansu province science and technology plan project","award":["No. 20JR5RA467"],"award-info":[{"award-number":["No. 20JR5RA467"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02095-5","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:29:40Z","timestamp":1755754180000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A double-layer blockchain-assisted conditional privacy-preserving authentication and emergency reporting scheme for VANETs"],"prefix":"10.1007","volume":"18","author":[{"given":"Xiangrong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Xian","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"issue":"1","key":"2095_CR1","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/COMST.2019.2894816","volume":"22","author":"H Khelifi","year":"2020","unstructured":"Khelifi H, Luo S, Nour B et al (2020) Named data networking in vehicular ad hoc networks: state-of-the-art and challenges. IEEE Commun Surv Tutor 22(1):320\u2013351. https:\/\/doi.org\/10.1109\/COMST.2019.2894816","journal-title":"IEEE Commun Surv Tutor"},{"key":"2095_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"Sakiz F, Sen S (2017) A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw 61:33\u201350. https:\/\/doi.org\/10.1016\/j.adhoc.2017.03.006","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"2095_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MNET.001.1900220","volume":"34","author":"C Lai","year":"2020","unstructured":"Lai C, Lu R, Zheng D et al (2020) Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw 34(2):37\u201345. https:\/\/doi.org\/10.1109\/MNET.001.1900220","journal-title":"IEEE Netw"},{"issue":"5","key":"2095_CR4","doi-asserted-by":"publisher","first-page":"4101","DOI":"10.1109\/JIOT.2019.2957421","volume":"7","author":"X Liu","year":"2020","unstructured":"Liu X, Huang H et al (2020) A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs. IEEE Internet Things J 7(5):4101\u20134112. https:\/\/doi.org\/10.1109\/JIOT.2019.2957421","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"2095_CR5","doi-asserted-by":"publisher","first-page":"3301","DOI":"10.1109\/TDSC.2021.3092375","volume":"19","author":"J Chen","year":"2022","unstructured":"Chen J, Zhan Z et al (2022) Xauth: efficient privacy-preserving cross-domain authentication. IEEE Trans Depend Secure Comput 19(5):3301\u20133311. https:\/\/doi.org\/10.1109\/TDSC.2021.3092375","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"3","key":"2095_CR6","doi-asserted-by":"publisher","first-page":"2664","DOI":"10.1109\/TNSM.2022.3180357","volume":"19","author":"M Wang","year":"2022","unstructured":"Wang M, Rui L et al (2022) A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network. IEEE Trans Network Serv Manag 19(3):2664\u20132676. https:\/\/doi.org\/10.1109\/TNSM.2022.3180357","journal-title":"IEEE Trans Network Serv Manag"},{"issue":"4","key":"2095_CR7","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"K-A Shim","year":"2012","unstructured":"Shim K-A (2012) CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Technol 61(4):1874\u20131883. https:\/\/doi.org\/10.1109\/TVT.2012.2186992","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"2095_CR8","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.3390\/s22062299","volume":"22","author":"X He","year":"2022","unstructured":"He X, Niu X et al (2022) A hierarchical blockchain-assisted conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Sensors 22(6):2299. https:\/\/doi.org\/10.3390\/s22062299","journal-title":"Sensors"},{"issue":"5","key":"2095_CR9","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat M, Barmshoory M et al (2015) A secure authentication scheme for VANETs with batch verification. Wirel Netw 21(5):1733\u20131743. https:\/\/doi.org\/10.1007\/s11276-014-0881-0","journal-title":"Wirel Netw"},{"issue":"3","key":"2095_CR10","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1109\/JSAC.2011.110310","volume":"29","author":"L Chen","year":"2011","unstructured":"Chen L, Ng S-L, Wang G (2011) Threshold anonymous announcement in VANETs. IEEE J Sel Areas Commun 29(3):605\u2013615. https:\/\/doi.org\/10.1109\/JSAC.2011.110310","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"2095_CR11","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1109\/TWC.2012.12.112120","volume":"12","author":"J Ren","year":"2013","unstructured":"Ren J, Harn L (2013) An efficient threshold anonymous authentication scheme for privacy-preserving communications. IEEE Trans Wirel Commun 12(3):1018\u20131025. https:\/\/doi.org\/10.1109\/TWC.2012.12.112120","journal-title":"IEEE Trans Wirel Commun"},{"issue":"8","key":"2095_CR12","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1109\/JIOT.2021.3060751","volume":"9","author":"Z Liu","year":"2022","unstructured":"Liu Z, Weng J et al (2022) PPTM: a privacy-preserving trust management scheme for emergency message dissemination in space\u2013air\u2013ground-integrated vehicular networks. IEEE Internet Things J 9(8):5943\u20135956. https:\/\/doi.org\/10.1109\/JIOT.2021.3060751","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"2095_CR13","doi-asserted-by":"publisher","first-page":"4063","DOI":"10.1109\/TITS.2019.2934991","volume":"21","author":"F Zhu","year":"2020","unstructured":"Zhu F, Lv Y et al (2020) Parallel transportation systems: toward IoT-enabled smart urban traffic control and management. IEEE Trans Intell Transp Syst 21(10):4063\u20134071. https:\/\/doi.org\/10.1109\/TITS.2019.2934991","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2095_CR14","doi-asserted-by":"publisher","unstructured":"M. A. Al-Shareeda, M. Anbar, S. et al. (2021). Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey. IEEE Access, 9, 121522\u2013121531. https:\/\/doi.org\/10.1109\/ACCESS.2021.3109264","DOI":"10.1109\/ACCESS.2021.3109264"},{"issue":"1","key":"2095_CR15","doi-asserted-by":"publisher","first-page":"479","DOI":"10.11591\/ijeecs.v21i1.pp479-488","volume":"21","author":"MA Al-Shareeda","year":"2021","unstructured":"Al-Shareeda MA, Anbar M et al (2021) Security schemes based on conditional privacy-preserving vehicular ad hoc networks. Indones J Electr Eng Comput Sci 21(1):479\u2013488. https:\/\/doi.org\/10.11591\/ijeecs.v21i1.pp479-488","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"2095_CR16","doi-asserted-by":"publisher","first-page":"100850","DOI":"10.1016\/j.iot.2023.100850","volume":"23","author":"A Imghoure","year":"2023","unstructured":"Imghoure A, Omary F, El-Yahyaoui A (2023) Schnorr-based conditional privacy-preserving authentication scheme with multisignature and batch verification in VANET. Internet of Things 23:100850. https:\/\/doi.org\/10.1016\/j.iot.2023.100850","journal-title":"Internet of Things"},{"key":"2095_CR17","doi-asserted-by":"publisher","unstructured":"M. A. Al-Shareeda, M. Anbar, et al. (2025). Investigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs). J. Robot. Control, 6(1):456\u2013469. https:\/\/doi.org\/10.18196\/jrc.v6i1.25351","DOI":"10.18196\/jrc.v6i1.25351"},{"issue":"1","key":"2095_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.5555\/1370616.1370618","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux J (2007) Securing vehicular ad hoc networks. Comput Secur 15(1):39\u201368. https:\/\/doi.org\/10.5555\/1370616.1370618","journal-title":"Comput Secur"},{"issue":"6","key":"2095_CR19","doi-asserted-by":"publisher","first-page":"3326","DOI":"10.1109\/TITS.2020.2981907","volume":"22","author":"MA Simplicio","year":"2021","unstructured":"Simplicio MA, Cominetti EL et al (2021) Privacy-preserving certificate linkage\/revocation in VANETs without linkage authorities. IEEE Trans Intell Transp Syst 22(6):3326\u20133336. https:\/\/doi.org\/10.1109\/TITS.2020.2981907","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2095_CR20","doi-asserted-by":"publisher","unstructured":"C. Zhang, R. Lu et al. (2008). An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks.\u00a0in: 2008 - The 27th Conference on Computer Communications, INFOCOM, IEEE, pp. 246\u2013250. https:\/\/doi.org\/10.1109\/INFOCOM.2008.58","DOI":"10.1109\/INFOCOM.2008.58"},{"issue":"12","key":"2095_CR21","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S et al (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681\u20132691. https:\/\/doi.org\/10.1109\/TIFS.2015.2473820","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2095_CR22","doi-asserted-by":"publisher","unstructured":"J. Xu, D. Zhang et al. (2020). CPBA: An Efficient Conditional Privacy-Preserving Batch Authentication Scheme for VANETs. in: Wireless Algorithms, Systems, and Applications: 15th International Conference, WASA, Springer, pp. 555\u2013567. https:\/\/doi.org\/10.1007\/978-3-030-59016-1_46","DOI":"10.1007\/978-3-030-59016-1_46"},{"key":"2095_CR23","doi-asserted-by":"publisher","first-page":"1412","DOI":"10.1007\/s11036-019-01459-5","volume":"26","author":"X Yue","year":"2021","unstructured":"Yue X, Xi M et al (2021) A revocable group signatures scheme to provide privacy-preserving authentications. Mobile Netw Appl 26:1412\u20131429. https:\/\/doi.org\/10.1007\/s11036-019-01459-5","journal-title":"Mobile Netw Appl"},{"key":"2095_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100602","volume":"41","author":"B Chen","year":"2023","unstructured":"Chen B, Wang Z et al (2023) BCGS: blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh Commun 41:100602. https:\/\/doi.org\/10.1016\/j.vehcom.2023.100602","journal-title":"Veh Commun"},{"issue":"7","key":"2095_CR25","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TITS.2017.2777990","volume":"9","author":"L Li","year":"2018","unstructured":"Li L, Liu J et al (2018) CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles. IEEE Trans Intell Transp Syst 9(7):2204\u20132220. https:\/\/doi.org\/10.1109\/TITS.2017.2777990","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"2","key":"2095_CR26","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/TVT.2023.3340723","volume":"74","author":"Z Liu","year":"2025","unstructured":"Liu Z, Wan L et al (2025) PPRU: a privacy-preserving reputation updating scheme for cloud-assisted vehicular networks. IEEE Trans Veh Technol 74(2):1877\u20131892. https:\/\/doi.org\/10.1109\/TVT.2023.3340723","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"2095_CR27","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TITS.2024.3488184","volume":"26","author":"G Singh Rawat","year":"2025","unstructured":"Singh Rawat G, Singh K et al (2025) BTC2PA: a blockchain-assisted trust computation with conditional privacy-preserving authentication for connected vehicles. IEEE Trans Intell Transp Syst 26(1):1134\u20131148. https:\/\/doi.org\/10.1109\/TITS.2024.3488184","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"6","key":"2095_CR28","doi-asserted-by":"publisher","first-page":"4146","DOI":"10.1109\/TII.2019.2948053","volume":"16","author":"Q Feng","year":"2020","unstructured":"Feng Q, He D et al (2020) BPAS: blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans Ind Inform 16(6):4146\u20134155. https:\/\/doi.org\/10.1109\/TII.2019.2948053","journal-title":"IEEE Trans Ind Inform"},{"issue":"12","key":"2095_CR29","doi-asserted-by":"publisher","first-page":"7408","DOI":"10.1109\/TITS.2020.3002096","volume":"22","author":"C Lin","year":"2021","unstructured":"Lin C, He D et al (2021) BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 22(12):7408\u20137420. https:\/\/doi.org\/10.1109\/TITS.2020.3002096","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"2095_CR30","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TVT.2022.3204582","volume":"72","author":"X Zhou","year":"2023","unstructured":"Zhou X, He D et al (2023) An efficient blockchain-based conditional privacy-preserving authentication protocol for VANETs. IEEE Trans Veh Technol 72(1):81\u201392. https:\/\/doi.org\/10.1109\/TVT.2022.3204582","journal-title":"IEEE Trans Veh Technol"},{"key":"2095_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103600","volume":"163","author":"X Guo","year":"2024","unstructured":"Guo X, Lu X et al (2024) DBCPCA: Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs. Ad Hoc Networks 163:103600. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103600","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"2095_CR32","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.32604\/cmc.2024.053854","volume":"81","author":"VO Nyangaresi","year":"2024","unstructured":"Nyangaresi VO, Ghaib AA et al (2024) Message verification protocol based on bilinear pairings and elliptic curves for enhanced security in vehicular ad hoc networks. Comput Mater Contin 81(1):1029\u20131057. https:\/\/doi.org\/10.32604\/cmc.2024.053854","journal-title":"Comput Mater Contin"},{"issue":"6","key":"2095_CR33","doi-asserted-by":"publisher","first-page":"18631","DOI":"10.48084\/etasr.8851","volume":"14","author":"H Al-Maliki","year":"2024","unstructured":"Al-Maliki H, AL-Asadi HAA et al (2024) Reliable vehicular ad hoc networks for intelligent transportation systems based on the snake optimization algorithm. Eng Technol Appl Sci Res 14(6):18631\u201318639. https:\/\/doi.org\/10.48084\/etasr.8851","journal-title":"Eng Technol Appl Sci Res"},{"key":"2095_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.03.060","volume":"451","author":"J Cui","year":"2018","unstructured":"Cui J, Zhang J et al (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Inf Sci 451:1\u201315. https:\/\/doi.org\/10.1016\/j.ins.2018.03.060","journal-title":"Inf Sci"},{"issue":"3","key":"2095_CR35","doi-asserted-by":"publisher","first-page":"4693","DOI":"10.1109\/JIOT.2018.2877634","volume":"6","author":"C Liu","year":"2019","unstructured":"Liu C, Xiao Y et al (2019) NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce. IEEE Internet Things J 6(3):4693. https:\/\/doi.org\/10.1109\/JIOT.2018.2877634","journal-title":"IEEE Internet Things J"},{"key":"2095_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110718","volume":"253","author":"R Du","year":"2024","unstructured":"Du R, Chen T et al (2024) Starcross: redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT. Comput Networks 253:110718. https:\/\/doi.org\/10.1016\/j.comnet.2024.110718","journal-title":"Comput Networks"},{"issue":"5","key":"2095_CR37","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"H-N Dai","year":"2019","unstructured":"Dai H-N, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076\u20138094. https:\/\/doi.org\/10.1109\/JIOT.2019.2920987","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2095_CR38","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361\u2013396. https:\/\/doi.org\/10.1007\/s001450010003","journal-title":"J Cryptol"},{"issue":"8","key":"2095_CR39","doi-asserted-by":"publisher","first-page":"3697","DOI":"10.1109\/TVT.2014.2358633","volume":"64","author":"Y Liu","year":"2015","unstructured":"Liu Y, Wang L, Chen H-H (2015) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3697\u20133710. https:\/\/doi.org\/10.1109\/TVT.2014.2358633","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02095-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02095-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02095-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:35Z","timestamp":1760683175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02095-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,21]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2095"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02095-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,21]]},"assertion":[{"value":"5 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"N\/A.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"271"}}