{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T12:06:17Z","timestamp":1765627577656,"version":"3.48.0"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02142-1","type":"journal-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T14:17:56Z","timestamp":1760969876000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A blockchain-based quantum-secure protocol for efficient V2I handover authentication in vehicular Ad-Hoc networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Dheerendra","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Purva","family":"Rewal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"2142_CR1","doi-asserted-by":"publisher","first-page":"177693","DOI":"10.1109\/ACCESS.2020.3027718","volume":"8","author":"J Qi","year":"2020","unstructured":"Qi J, Gao T (2020) A privacy-preserving authentication and pseudonym revocation scheme for vanets. IEEE Access 8:177693\u2013177707","journal-title":"IEEE Access"},{"issue":"2","key":"2142_CR2","doi-asserted-by":"publisher","first-page":"2422","DOI":"10.1109\/JSEN.2020.3021731","volume":"21","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda MA, Anbar M, Hasbullah IH, Manickam S (2020) Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sens J 21(2):2422\u20132433","journal-title":"IEEE Sens J"},{"key":"2142_CR3","doi-asserted-by":"publisher","first-page":"91028","DOI":"10.1109\/ACCESS.2020.2992580","volume":"8","author":"OS Al-Heety","year":"2020","unstructured":"Al-Heety OS, Zakaria Z, Ismail M, Shakir MM, Alani S, Alsariera H (2020) A comprehensive survey: benefits, services, recent works, challenges, security, and use cases for sdn-vanet. IEEE Access 8:91028\u201391047","journal-title":"IEEE Access"},{"key":"2142_CR4","unstructured":"Al-Mekhlafi Z\u00a0G, Lashari S\u00a0A, Al-Shareeda M\u00a0A, Mohammed B\u00a0A, Alshudukhi J\u00a0S, Al-Dhlan K\u00a0A, Manickam S (2024) Coherent taxonomy of vehicular ad hoc networks (vanets)-enabled by fog computing: a review, IEEE Sens J"},{"key":"2142_CR5","doi-asserted-by":"crossref","unstructured":"Dong S, Su H, Xia Y, Zhu F, Hu X, Wang B (2023) A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks, IEEE Trans Intell Transport Syst","DOI":"10.1109\/TITS.2023.3297527"},{"key":"2142_CR6","doi-asserted-by":"crossref","unstructured":"Shawky MA, Abbasi QH, Imran MA, Ansari S, Taha A, Cross-layer authentication based on physical-layer signatures for secure vehicular communication, in, (2022) Ieee intelligent vehicles symposium (iv). IEEE 2022:1315\u20131320","DOI":"10.1109\/IV51971.2022.9827444"},{"key":"2142_CR7","doi-asserted-by":"crossref","unstructured":"Mundhe P, Verma S, Venkatesan S (2021) A comprehensive survey on authentication and privacy-preserving schemes in vanets. Comput Sci Rev 41:100411","DOI":"10.1016\/j.cosrev.2021.100411"},{"issue":"3","key":"2142_CR8","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.icte.2022.01.005","volume":"9","author":"MM Elsayed","year":"2023","unstructured":"Elsayed MM, Hosny KM, Fouda MM, Khashaba MM (2023) Vehicles communications handover in 5g: a survey. ICT Express 9(3):366\u2013378","journal-title":"ICT Express"},{"key":"2142_CR9","first-page":"19","volume":"9","author":"SS Manvi","year":"2017","unstructured":"Manvi SS, Tangade S (2017) A survey on authentication schemes in vanets for secured communication, vehicular. Communications 9:19\u201330","journal-title":"Communications"},{"key":"2142_CR10","doi-asserted-by":"crossref","unstructured":"Xu C, Huang X, Ma M, Bao H (2018) An anonymous handover authentication scheme based on lte-a for vehicular networks. Wirel Commun Mob Comput 2018(1):6251219","DOI":"10.1155\/2018\/6251219"},{"key":"2142_CR11","doi-asserted-by":"crossref","unstructured":"El-Rewini Z, Sadatsharan K, Selvaraj DF, Plathottam SJ, Ranganathan P (2020) Cybersecurity challenges in vehicular communications. Veh Commun 23:100214","DOI":"10.1016\/j.vehcom.2019.100214"},{"issue":"5","key":"2142_CR12","doi-asserted-by":"publisher","first-page":"5535","DOI":"10.1109\/TVT.2020.2981934","volume":"69","author":"AK Sutrala","year":"2020","unstructured":"Sutrala AK, Bagga P, Das AK, Kumar N, Rodrigues JJ, Lorenz P (2020) On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment. IEEE Trans Veh Technol 69(5):5535\u20135548","journal-title":"IEEE Trans Veh Technol"},{"key":"2142_CR13","doi-asserted-by":"crossref","unstructured":"Mazhar S, Rakib A, Pan L, Jiang F, Anwar A, Doss R, Bryans J (2024) State-of-the-art authentication and verification schemes in vanets: A survey, Veh Commun 100804","DOI":"10.1016\/j.vehcom.2024.100804"},{"issue":"2","key":"2142_CR14","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TVT.2021.3050614","volume":"70","author":"P Bagga","year":"2021","unstructured":"Bagga P, Das AK, Wazid M, Rodrigues JJ, Choo K-KR, Park Y (2021) On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system. IEEE Trans Veh Technol 70(2):1736\u20131751","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"2142_CR15","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","volume":"9","author":"S Son","year":"2022","unstructured":"Son S, Lee J, Park Y, Park Y, Das AK (2022) Design of blockchain-based lightweight v2i handover authentication protocol for vanet. IEEE Trans Netw Sci Eng 9(3):1346\u20131358","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2142_CR16","doi-asserted-by":"crossref","unstructured":"Mohammed B\u00a0A, Al-Shareeda M\u00a0A, Alsadhan A\u00a0A, Al-Mekhlafi Z\u00a0G, Sallam A\u00a0A, Al-Qatab B\u00a0A, Alshammari M\u00a0T, Alayba A\u00a0M (2024) Service based veins framework for vehicular ad-hoc network (vanet): A systematic review of state-of-the-art, Peer-to-Peer Netw Appl 1\u201323","DOI":"10.1007\/s12083-024-01692-0"},{"issue":"2","key":"2142_CR17","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/COMST.2023.3236448","volume":"25","author":"A Boualouache","year":"2023","unstructured":"Boualouache A, Engel T (2023) A survey on machine learning-based misbehavior detection systems for 5g and beyond vehicular networks. IEEE Commun Surv Tutor 25(2):1128\u20131172","journal-title":"IEEE Commun Surv Tutor"},{"key":"2142_CR18","doi-asserted-by":"publisher","first-page":"117716","DOI":"10.1109\/ACCESS.2019.2936575","volume":"7","author":"D Zheng","year":"2019","unstructured":"Zheng D, Jing C, Guo R, Gao S, Wang L (2019) A traceable blockchain-based access authentication system with privacy preservation in vanets. IEEE Access 7:117716\u2013117726","journal-title":"IEEE Access"},{"issue":"6","key":"2142_CR19","doi-asserted-by":"publisher","first-page":"5836","DOI":"10.1109\/TVT.2020.2972923","volume":"69","author":"Z Ma","year":"2020","unstructured":"Ma Z, Zhang J, Guo Y, Liu Y, Liu X, He W (2020) An efficient decentralized key management mechanism for vanet with blockchain. IEEE Trans Veh Technol 69(6):5836\u20135849","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"2142_CR20","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1109\/TETC.2020.2978866","volume":"9","author":"C Wang","year":"2020","unstructured":"Wang C, Shen J, Lai J-F, Liu J (2020) B-tsca: blockchain assisted trustworthiness scalable computation for v2i authentication in vanets. IEEE Trans Emerg Top Comput 9(3):1386\u20131396","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"2142_CR21","doi-asserted-by":"publisher","first-page":"12463","DOI":"10.1109\/TEM.2022.3159311","volume":"71","author":"Q Mei","year":"2022","unstructured":"Mei Q, Xiong H, Chen Y-C, Chen C-M (2022) Blockchain-enabled privacy-preserving authentication mechanism for transportation cps with cloud-edge computing. IEEE Trans Eng Manage 71:12463\u201312474","journal-title":"IEEE Trans Eng Manage"},{"issue":"6","key":"2142_CR22","first-page":"3491","volume":"10","author":"SK Dwivedi","year":"2023","unstructured":"Dwivedi SK, Amin R, Vollala S, Khan MK (2023) B-has: blockchain-assisted efficient handover authentication and secure communication protocol in vanets. IEEE Trans Netw Sci Eng 10(6):3491\u20133504","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2142_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6679882","volume":"2021","author":"A Maria","year":"2021","unstructured":"Maria A, Pandi V, Lazarus JD, Karuppiah M, Christo MS (2021) Bbaas: blockchain-based anonymous authentication scheme for providing secure communication in vanets. Secur Commun Netw 2021:1\u201311","journal-title":"Secur Commun Netw"},{"issue":"3","key":"2142_CR24","doi-asserted-by":"publisher","first-page":"488","DOI":"10.3390\/electronics11030488","volume":"11","author":"A Maria","year":"2022","unstructured":"Maria A, Rajasekaran AS, Al-Turjman F, Altrjman C, Mostarda L (2022) Baiv: an efficient blockchain-based anonymous authentication and integrity preservation scheme for secure communication in vanets. Electronics 11(3):488","journal-title":"Electronics"},{"issue":"3","key":"2142_CR25","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2022.3144785","volume":"71","author":"DS Gupta","year":"2022","unstructured":"Gupta DS, Karati A, Saad W, Costa DB (2022) Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles. IEEE Trans Veh Technol 71(3):3255\u20133266","journal-title":"IEEE Trans Veh Technol"},{"key":"2142_CR26","doi-asserted-by":"crossref","unstructured":"Elkhalil A, Elhabob R, Eltayieb N et al (2021) An efficient signcryption of heterogeneous systems for internet of vehicles. J Syst Arch 113:101885","DOI":"10.1016\/j.sysarc.2020.101885"},{"issue":"7","key":"2142_CR27","doi-asserted-by":"publisher","first-page":"9851","DOI":"10.1007\/s10586-024-04479-3","volume":"27","author":"W Khalafalla","year":"2024","unstructured":"Khalafalla W, Zhu W-X, Elkhalil A, Elfadul I (2024) Efficient access control scheme for heterogeneous signcryption based on blockchain in vanets. Clust Comput 27(7):9851\u20139871","journal-title":"Clust Comput"},{"issue":"3","key":"2142_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-025-01021-3","volume":"24","author":"W Khalafalla","year":"2025","unstructured":"Khalafalla W, Zhu W-X, Elkhalil A et al (2025) Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for vanets. Int J Inf Secur 24(3):1\u201318","journal-title":"Int J Inf Secur"},{"issue":"4","key":"2142_CR29","doi-asserted-by":"publisher","first-page":"4336","DOI":"10.1109\/TVT.2022.3147875","volume":"71","author":"Q Li","year":"2022","unstructured":"Li Q, He D, Yang Z, Xie Q, Choo K-KR (2022) Lattice-based conditional privacy-preserving authentication protocol for the vehicular ad hoc network. IEEE Trans Veh Technol 71(4):4336\u20134347","journal-title":"IEEE Trans Veh Technol"},{"key":"2142_CR30","doi-asserted-by":"crossref","unstructured":"Liu Y, Guo W, Zhong Q, Yao G (2017) Lvap: lightweight v2i authentication protocol using group communication in vanet s. Int J Commun Syst 30(16):e3317","DOI":"10.1002\/dac.3317"},{"issue":"3","key":"2142_CR31","doi-asserted-by":"publisher","first-page":"3547","DOI":"10.1109\/JSYST.2020.2991168","volume":"14","author":"X Li","year":"2020","unstructured":"Li X, Liu T, Obaidat MS, Wu F, Vijayakumar P, Kumar N (2020) A lightweight privacy-preserving authentication protocol for vanets. IEEE Syst J 14(3):3547\u20133557","journal-title":"IEEE Syst J"},{"key":"2142_CR32","doi-asserted-by":"crossref","unstructured":"Nandy T, Idris M\u00a0Y I\u00a0B, Noor R\u00a0M, Ahmedy I, Bhattacharyya S (2020) An enhanced two-factor authentication protocol for v2v communication in vanets, In: Proceedings of the 3rd International Conference on Information Science and Systems, pp 171\u2013176","DOI":"10.1145\/3388176.3388185"},{"issue":"18","key":"2142_CR33","doi-asserted-by":"publisher","first-page":"14248","DOI":"10.1109\/JIOT.2021.3068268","volume":"8","author":"C Wang","year":"2021","unstructured":"Wang C, Huang R, Shen J, Liu J, Vijayakumar P, Kumar N (2021) A novel lightweight authentication protocol for emergency vehicle avoidance in vanets. IEEE Internet Things J 8(18):14248\u201314257","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"2142_CR34","doi-asserted-by":"publisher","first-page":"7318","DOI":"10.1109\/TITS.2023.3253710","volume":"24","author":"Q Xie","year":"2023","unstructured":"Xie Q, Ding Z, Zheng P (2023) Provably secure and anonymous v2i and v2v authentication protocol for vanets. IEEE Trans Intell Transp Syst 24(7):7318\u20137327","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"2","key":"2142_CR35","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/TITS.2020.3024000","volume":"23","author":"A Yang","year":"2020","unstructured":"Yang A, Weng J, Yang K, Huang C, Shen X (2020) Delegating authentication to edge: a decentralized authentication architecture for vehicular networks. IEEE Trans Intell Transp Syst 23(2):1284\u20131298","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2142_CR36","doi-asserted-by":"crossref","unstructured":"Yu F, Ma M, Li X (2021) A blockchain-assisted seamless handover authentication for v2i communication in 5g wireless networks, In: ICC 2021-IEEE International Conference on Communications, IEEE, pp 1\u20136","DOI":"10.1109\/ICC42927.2021.9500334"},{"key":"2142_CR37","doi-asserted-by":"crossref","unstructured":"Shor P\u00a0W (1994) Algorithms for quantum computation: discrete logarithms and factoring, in: Proceedings 35th annual symposium on foundations of computer science, IEEE, pp 124\u2013134","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"2","key":"2142_CR38","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303\u2013332","journal-title":"SIAM Rev"},{"key":"2142_CR39","doi-asserted-by":"crossref","unstructured":"Annabi M, Zeroual A, Messai N (2024) Towards zero trust security in connected vehicles: A comprehensive survey, Comput Secur 104018","DOI":"10.1016\/j.cose.2024.104018"},{"key":"2142_CR40","doi-asserted-by":"crossref","unstructured":"Zhou L, Diro A, Saini A, Kaisar S, Hiep PC (2024) Leveraging zero knowledge proofs for blockchain-based identity sharing: a survey of advancements, challenges and opportunities. J Inf Secur Appl 80:103678","DOI":"10.1016\/j.jisa.2023.103678"},{"key":"2142_CR41","doi-asserted-by":"crossref","unstructured":"Kaur K, Garg S, Kaddoum G, Gagnon F, Ahmed SH, Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure, in, (2019) Ieee international conference on communications workshops (icc workshops). IEEE 2019:1\u20136","DOI":"10.1109\/INFOCOMWKSHPS47286.2019.9093756"},{"issue":"2","key":"2142_CR42","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TDSC.2019.2904274","volume":"18","author":"J Zhang","year":"2019","unstructured":"Zhang J, Cui J, Zhong H, Chen Z, Liu L (2019) Pa-crt: chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans Depend Secure Comput 18(2):722\u2013735","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"3","key":"2142_CR43","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TDSC.2020.3047872","volume":"19","author":"H Xiong","year":"2020","unstructured":"Xiong H, Chen J, Mei Q, Zhao Y (2020) Conditional privacy-preserving authentication protocol with dynamic membership updating for vanets. IEEE Trans Depend Secure Comput 19(3):2089\u20132104","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2142_CR44","doi-asserted-by":"publisher","first-page":"144957","DOI":"10.1109\/ACCESS.2020.3014678","volume":"8","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda MA, Anbar M, Hasbullah IH, Manickam S, Hanshi SM (2020) Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access 8:144957\u2013144968","journal-title":"IEEE Access"},{"issue":"1","key":"2142_CR45","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/JSYST.2021.3051435","volume":"15","author":"P Wang","year":"2021","unstructured":"Wang P, Liu Y (2021) Sema: secure and efficient message authentication protocol for vanets. IEEE Syst J 15(1):846\u2013855","journal-title":"IEEE Syst J"},{"issue":"2","key":"2142_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425708","volume":"22","author":"H Yang","year":"2021","unstructured":"Yang H, Shen J, Zhou T, Ji S, Vijayakumar P (2021) A flexible and privacy-preserving collaborative filtering scheme in cloud computing for vanets. ACM Trans Internet Technol (TOIT) 22(2):1\u201319","journal-title":"ACM Trans Internet Technol (TOIT)"},{"issue":"2","key":"2142_CR47","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1109\/TNSM.2020.3042526","volume":"18","author":"T Limbasiya","year":"2020","unstructured":"Limbasiya T, Das D (2020) Vcom: secure and efficient vehicle-to-vehicle message communication protocol. IEEE Trans Netw Serv Manage 18(2):2365\u20132376","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"6","key":"2142_CR48","doi-asserted-by":"publisher","first-page":"5752","DOI":"10.1109\/TITS.2023.3249833","volume":"24","author":"T Limbasiya","year":"2023","unstructured":"Limbasiya T, Das D (2023) Querycom: secure message communication and data searching protocols for smart transportation. IEEE Trans Intell Transp Syst 24(6):5752\u20135764","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"2142_CR49","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11277-023-10727-3","volume":"132","author":"P Rewal","year":"2023","unstructured":"Rewal P, Mishra D (2023) Comparative analysis of handover authentication techniques in vanets. Wirel Pers Commun 132(4):2487\u20132506","journal-title":"Wirel Pers Commun"},{"key":"2142_CR50","doi-asserted-by":"crossref","unstructured":"Almazroi AA, Alqarni MA, Al-Shareeda MA, Alkinani MH, Almazroey AA, Gaber T (2024) Fca-vbn: fog computing-based authentication scheme for 5g-assisted vehicular blockchain network. Internet of Things 25:101096","DOI":"10.1016\/j.iot.2024.101096"},{"key":"2142_CR51","doi-asserted-by":"publisher","first-page":"68648","DOI":"10.1109\/ACCESS.2024.3400530","volume":"12","author":"S Naskar","year":"2024","unstructured":"Naskar S, Brunetta C, Hancke G, Zhang T, Gidlund M (2024) A scheme for distributed vehicle authentication and revocation in decentralized vanets. IEEE Access 12:68648\u201368667","journal-title":"IEEE Access"},{"issue":"18","key":"2142_CR52","doi-asserted-by":"publisher","first-page":"3918","DOI":"10.3390\/math11183918","volume":"11","author":"NAS Amir","year":"2023","unstructured":"Amir NAS, Othman WAM, Wong KB (2023) Securing an authenticated privacy preserving protocol in a group signature scheme based on a group ring. Mathematics 11(18):3918","journal-title":"Mathematics"},{"key":"2142_CR53","unstructured":"Al-Mekhlafi Z\u00a0G, Lashari S\u00a0A, Altmemi J, Al-Shareeda M\u00a0A, Mohammed B\u00a0A, Sallam A\u00a0A, Al-Qatab B\u00a0A, Alshammari M\u00a0T, Alayba A\u00a0M (2024) Oblivious transfer-based authentication and privacy-preserving protocol for 5g-enabled vehicular fog computing, IEEE Access"},{"key":"2142_CR54","doi-asserted-by":"crossref","unstructured":"Al-Mekhlafi, Z\u00a0G, Al-Janabi H\u00a0D\u00a0K, Khalil A, Al-Shareeda M\u00a0A, Mohammed B A, Alsadhan A\u00a0A, Alayba A\u00a0M, Saleh A\u00a0M\u00a0S, Al-Reshidi H\u00a0A, Almekhlafi K (2024) Lattice-based cryptography and fog computing based efficient anonymous authentication scheme for 5g-assisted vehicular communications, IEEE Access","DOI":"10.1109\/ACCESS.2024.3402336"},{"issue":"6","key":"2142_CR55","doi-asserted-by":"publisher","first-page":"4146","DOI":"10.1109\/TII.2019.2948053","volume":"16","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D, Zeadally S, Liang K (2019) Bpas: blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans Industr Inf 16(6):4146\u20134155","journal-title":"IEEE Trans Industr Inf"},{"key":"2142_CR56","doi-asserted-by":"publisher","first-page":"6251","DOI":"10.1109\/ACCESS.2024.3351278","volume":"12","author":"BA Mohammed","year":"2024","unstructured":"Mohammed BA, Al-Shareeda MA, Al-Mekhlafi ZG, Alshudukhi JS, Aldhlan KA (2024) Hafc: handover authentication scheme based on fog computing for 5g-assisted vehicular blockchain networks. IEEE Access 12:6251\u20136261","journal-title":"IEEE Access"},{"issue":"1","key":"2142_CR57","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1080\/23335777.2018.1431960","volume":"4","author":"Y Yao","year":"2018","unstructured":"Yao Y, Chang X, Li L, Yang R (2018) Clam: lightweight certificateless anonymous authentication mechanism for vehicular cloud services. Cyber-Phys Syst 4(1):17\u201338","journal-title":"Cyber-Phys Syst"},{"key":"2142_CR58","doi-asserted-by":"crossref","unstructured":"Liu G, Li W, Yuan C, Wang N, Ma C, Mu N, Liu Z, Liu Y, Xiang T (2024) Lbraka: Lattice-based robust authenticated key agreement for vanets, IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2024.3515072"},{"key":"2142_CR59","doi-asserted-by":"crossref","unstructured":"Ahmad A, Jagatheswari S (2023) Lba-pake: Lattice-based anonymous password based authentication key exchange scheme for vanet, In: 2023 12th International Conference on Advanced Computing (ICoAC), IEEE, pp 1\u20138","DOI":"10.1109\/ICoAC59537.2023.10249969"},{"key":"2142_CR60","doi-asserted-by":"crossref","unstructured":"Khalid H, Hashim S\u00a0J, Hashim F, Al-Jawher W\u00a0A\u00a0M, Chaudhary M\u00a0A, Altarturi H\u00a0H (2024) Raven: Robust anonymous vehicular end-to-end encryption and efficient mutual authentication for post-quantum intelligent transportation systems, IEEE Trans Intell Transport Syst","DOI":"10.1109\/TITS.2024.3416060"},{"issue":"12","key":"2142_CR61","doi-asserted-by":"publisher","first-page":"34581","DOI":"10.1007\/s11042-023-17002-4","volume":"83","author":"SS Sahoo","year":"2024","unstructured":"Sahoo SS, Chaurasiya VK (2024) Easb: ecc based aggregate signature without bilinear pairing for blockchain. Multimed Tools Appl 83(12):34581\u201334600","journal-title":"Multimed Tools Appl"},{"key":"2142_CR62","doi-asserted-by":"publisher","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","volume":"6","author":"Z Lu","year":"2018","unstructured":"Lu Z, Liu W, Wang Q, Qu G, Liu Z (2018) A privacy-preserving trust model based on blockchain for vanets, ieee. Access 6:45655\u201345664","journal-title":"Access"},{"key":"2142_CR63","doi-asserted-by":"publisher","first-page":"58241","DOI":"10.1109\/ACCESS.2018.2890736","volume":"7","author":"X Zhang","year":"2019","unstructured":"Zhang X, Chen X (2019) Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network, ieee. Access 7:58241\u201358254","journal-title":"Access"},{"key":"2142_CR64","doi-asserted-by":"crossref","unstructured":"Al-Janabi H\u00a0D\u00a0K, Lashari S\u00a0A, Khalil A, Al-Shareeda M\u00a0A, Alsadhan A\u00a0A, Almaiah M\u00a0A, Alkhdour T (2024) D-blockauth: An authentication scheme based dual blockchain for 5g-assisted vehicular fog computing, IEEE Access","DOI":"10.1109\/ACCESS.2024.3428830"},{"issue":"11","key":"2142_CR65","doi-asserted-by":"publisher","first-page":"22630","DOI":"10.1109\/TITS.2022.3183379","volume":"23","author":"J Liu","year":"2022","unstructured":"Liu J, Zhang L, Li C, Bai J, Lv H, Lv Z (2022) Blockchain-based secure communication of intelligent transportation digital twins system. IEEE Trans Intell Transp Syst 23(11):22630\u201322640","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2142_CR66","doi-asserted-by":"crossref","unstructured":"Roy S, Nandi S, Maheshwari R, Shetty S, Das A\u00a0K, Lorenz P (2023) Blockchain-based efficient access control with handover policy in iov-enabled intelligent transportation system, IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2023.3322637"},{"issue":"1","key":"2142_CR67","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3390\/electronics12010139","volume":"12","author":"Q Li","year":"2022","unstructured":"Li Q, Su W, Zhang P, Cheng X, Li M, Liu Y (2022) Blockchain-based method for pre-authentication and handover authentication of iov vehicles. Electronics 12(1):139","journal-title":"Electronics"},{"issue":"12","key":"2142_CR68","doi-asserted-by":"publisher","first-page":"15200","DOI":"10.1109\/TVT.2023.3289175","volume":"72","author":"Q Xie","year":"2023","unstructured":"Xie Q, Ding Z, Tang W, He D, Tan X (2023) Provable secure and lightweight blockchain-based v2i handover authentication and v2v broadcast protocol for vanets. IEEE Trans Veh Technol 72(12):15200\u201315212","journal-title":"IEEE Trans Veh Technol"},{"key":"2142_CR69","doi-asserted-by":"crossref","unstructured":"Prajapat S, Gautam D, Kumar P, Jangirala S, Das A\u00a0K, Park Y, Lorenz P (2024) Secure lattice-based aggregate signature scheme for vehicular ad hoc networks, IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2024.3383967"},{"issue":"2","key":"2142_CR70","doi-asserted-by":"publisher","first-page":"399","DOI":"10.3390\/math11020399","volume":"11","author":"ZG Al-Mekhlafi","year":"2023","unstructured":"Al-Mekhlafi ZG, Al-Shareeda MA, Manickam S, Mohammed BA, Qtaish A (2023) Lattice-based lightweight quantum resistant scheme in 5g-enabled vehicular networks. Mathematics 11(2):399","journal-title":"Mathematics"},{"key":"2142_CR71","unstructured":"Verma G\u00a0K, Wani N\u00a0M, Gope P (2024) Quantum-secure certificate-less conditional privacy-preserving authentication for vanet, arXiv:2403.13743"},{"key":"2142_CR72","unstructured":"Wani N\u00a0M, Verma G\u00a0K, Chamola V (2024) Dynamic anonymous quantum-secure batch-verifiable authentication scheme for vanet, IEEE Trans Consum Electron"},{"key":"2142_CR73","doi-asserted-by":"crossref","unstructured":"Nath HJ, Choudhury H (2024) Lbpv: lattice-based privacy-preserving mutual authentication scheme for vanet. Comput Electr Eng 120:109765","DOI":"10.1016\/j.compeleceng.2024.109765"},{"key":"2142_CR74","doi-asserted-by":"crossref","unstructured":"Shahidinejad A, Abawajy J, Huda S (2024) Anonymous lattice-based authentication protocol for vehicular communications, Veh Commun 100803","DOI":"10.1016\/j.vehcom.2024.100803"},{"key":"2142_CR75","unstructured":"Castro M, Liskov B, et\u00a0al (1999) Practical byzantine fault tolerance, In: OsDI, Vol\u00a099, pp 173\u2013186"},{"issue":"2","key":"2142_CR76","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1109\/JIOT.2019.2892009","volume":"6","author":"Y Yao","year":"2019","unstructured":"Yao Y, Chang X, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Li L (2019) Bla: blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J 6(2):3775\u20133784","journal-title":"IEEE Internet Things J"},{"key":"2142_CR77","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels, In: International conference on the theory and applications of cryptographic techniques, Springer, pp 453\u2013474","DOI":"10.1007\/3-540-44987-6_28"},{"key":"2142_CR78","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis, in: Advances in Cryptology\u2014CRYPTO\u201999: 19th Annual International Cryptology Conference Santa Barbara, California, USA, 15\u201319, August 1999 Proceedings 19, Springer, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"6","key":"2142_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535925","volume":"60","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky V, Peikert C, Regev O (2013) On ideal lattices and learning with errors over rings. J ACM (JACM) 60(6):1\u201335","journal-title":"J ACM (JACM)"},{"issue":"11","key":"2142_CR80","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/TC.2018.2814587","volume":"67","author":"A Karmakar","year":"2018","unstructured":"Karmakar A, Roy SS, Reparaz O, Vercauteren F, Verbauwhede I (2018) Constant-time discrete gaussian sampling. IEEE Trans Comput 67(11):1561\u20131571","journal-title":"IEEE Trans Comput"},{"key":"2142_CR81","doi-asserted-by":"crossref","unstructured":"Ding J, Alsayigh S, Lancrenon J, Rv S, Snook M (2017) Provably secure password authenticated key exchange based on rlwe for the post-quantum world, In: Cryptographers\u2019 Track at the RSA conference, Springer, pp 183\u2013204","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"2142_CR82","doi-asserted-by":"crossref","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions, In: Proceedings of the fortieth annual ACM symposium on Theory of computing, pp 197\u2013206","DOI":"10.1145\/1374376.1374407"},{"issue":"1","key":"2142_CR83","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1137\/S0097539705447360","volume":"37","author":"D Micciancio","year":"2007","unstructured":"Micciancio D, Regev O (2007) Worst-case to average-case reductions based on gaussian measures. SIAM J Comput 37(1):267\u2013302","journal-title":"SIAM J Comput"},{"key":"2142_CR84","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z, Ding J, Snook M, Dagdelen \u00d6 (2015) Authenticated key exchange from ideal lattices, In: Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26-30, April 2015, Proceedings, Part II 34, Springer, pp 719\u2013751","DOI":"10.1007\/978-3-662-46803-6_24"},{"key":"2142_CR85","unstructured":"Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs, cryptology eprint archive"},{"issue":"3","key":"2142_CR86","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/JSYST.2018.2851295","volume":"13","author":"Q Feng","year":"2018","unstructured":"Feng Q, He D, Zeadally S, Kumar N, Liang K (2018) Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Syst J 13(3):2775\u20132785","journal-title":"IEEE Syst J"},{"issue":"2","key":"2142_CR87","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/sat.1417","volume":"40","author":"U Kumar","year":"2022","unstructured":"Kumar U, Garg M (2022) Learning with error-based key agreement and authentication scheme for satellite communication. Int J Satell Commun Netw 40(2):83\u201395","journal-title":"Int J Satell Commun Netw"},{"key":"2142_CR88","doi-asserted-by":"crossref","unstructured":"Aguilar-Melchor C, Barrier J, Guelton S, Guinet A, Killijian M-O, Lepoint T (2016) Nfllib: Ntt-based fast lattice library, In: Topics in Cryptology-CT-RSA 2016: The Cryptographers\u2019 Track at the RSA Conference 2016, San Francisco, CA, USA, February 29-March 4, 2016, Proceedings, Springer, pp 341\u2013356","DOI":"10.1007\/978-3-319-29485-8_20"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02142-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02142-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02142-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T12:02:17Z","timestamp":1765627337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02142-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":88,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2142"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02142-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"26 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"All authors give their Consent to publish.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"304"}}