{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:05:38Z","timestamp":1775837138640,"version":"3.50.1"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002183","name":"Department of Electronics and Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["AAA-22\/2\/2021-CSRD-MeitY"],"award-info":[{"award-number":["AAA-22\/2\/2021-CSRD-MeitY"]}],"id":[{"id":"10.13039\/501100002183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02122-3","type":"journal-article","created":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T13:01:41Z","timestamp":1691067701000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Privacy-Preserving Authentication Protocols in Vanet"],"prefix":"10.1007","volume":"4","author":[{"given":"Himun Jyoti","family":"Nath","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1831-8343","authenticated-orcid":false,"given":"Hiten","family":"Choudhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,3]]},"reference":[{"key":"2122_CR1","doi-asserted-by":"crossref","unstructured":"Singh A, Kumar M, Rishi R, Madan D. A relative study of manet and vanet: its applications, broadcasting approaches and challenging issues. In: International Conference on Computer Science and Information Technology. 2011;627\u2013632. Springer","DOI":"10.1007\/978-3-642-17878-8_63"},{"key":"2122_CR2","doi-asserted-by":"crossref","unstructured":"Mansour MB, Salama C, Mohamed HK, Hammad SA. Vanet security and privacy-an overview. Int J Netw Secur Appl (IJNSA) 2018;10","DOI":"10.2139\/ssrn.3290553"},{"issue":"2","key":"2122_CR3","first-page":"356","volume":"5","author":"SS Kaushik","year":"2013","unstructured":"Kaushik SS. Review of different approaches for privacy scheme in vanets. Int J Adva Eng Technol. 2013;5(2):356.","journal-title":"Int J Adva Eng Technol"},{"key":"2122_CR4","doi-asserted-by":"publisher","unstructured":"Sommer C, Dressler F. Vehicular networking. Cambridge University Press, Cambridge. 2014. https:\/\/doi.org\/10.1017\/CBO9781107110649","DOI":"10.1017\/CBO9781107110649"},{"key":"2122_CR5","doi-asserted-by":"crossref","unstructured":"Biswas S, Mi\u0161i\u0107 J, Mi\u0161i\u0107 V. Ddos attack on wave-enabled vanet through synchronization. In: 2012 IEEE Global Communications Conference (GLOBECOM). 2012;1079\u20131084. IEEE","DOI":"10.1109\/GLOCOM.2012.6503256"},{"issue":"6","key":"2122_CR6","doi-asserted-by":"publisher","first-page":"3337","DOI":"10.1109\/TVT.2007.906873","volume":"56","author":"T Taleb","year":"2007","unstructured":"Taleb T, Sakhaee E, Jamalipour A, Hashimoto K, Kato N, Nemoto Y. A stable routing protocol to support its services in vanet networks. IEEE Trans Veh Technol. 2007;56(6):3337\u201347.","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"2122_CR7","doi-asserted-by":"publisher","first-page":"44","DOI":"10.20943\/01201602.4455","volume":"13","author":"V Jindal","year":"2016","unstructured":"Jindal V, Bedi P. Vehicular ad-hoc networks: introduction, standards, routing protocols and challenges. Int J Comput Sci Issues (IJCSI). 2016;13(2):44.","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"key":"2122_CR8","first-page":"19","volume":"9","author":"SS Manvi","year":"2017","unstructured":"Manvi SS, Tangade S. A survey on authentication schemes in vanets for secured communication. Veh Commun. 2017;9:19\u201330.","journal-title":"Veh Commun"},{"key":"2122_CR9","doi-asserted-by":"crossref","unstructured":"Sheikh MS, Liang J. A comprehensive survey on vanet security services in traffic management system. Wirel Commun Mob Comput. 2019;2019.","DOI":"10.1155\/2019\/2423915"},{"key":"2122_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100411","volume":"41","author":"P Mundhe","year":"2021","unstructured":"Mundhe P, Verma S, Venkatesan S. A comprehensive survey on authentication and privacy-preserving schemes in vanets. Comput Sci Rev. 2021;41: 100411.","journal-title":"Comput Sci Rev"},{"key":"2122_CR11","doi-asserted-by":"publisher","first-page":"31309","DOI":"10.1109\/ACCESS.2021.3060046","volume":"9","author":"F Azam","year":"2021","unstructured":"Azam F, Yadav SK, Priyadarshi N, Padmanaban S, Bansal R. A comprehensive review of authentication schemes in vehicular ad-hoc network. IEEE Access. 2021;9:31309\u201321.","journal-title":"IEEE Access"},{"issue":"4","key":"2122_CR12","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.dcan.2016.10.003","volume":"2","author":"S Gao","year":"2016","unstructured":"Gao S, Lim A, Bevly D. An empirical study of dsrc v2v performance in truck platooning scenarios. Digit Commun Netw. 2016;2(4):233\u201344.","journal-title":"Digit Commun Netw"},{"issue":"7","key":"2122_CR13","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"JB Kenney","year":"2011","unstructured":"Kenney JB. Dedicated short-range communications (dsrc) standards in the united states. Proc IEEE. 2011;99(7):1162\u201382.","journal-title":"Proc IEEE"},{"issue":"4","key":"2122_CR14","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1109\/SURV.2010.033010.00024","volume":"12","author":"YL Morgan","year":"2010","unstructured":"Morgan YL. Notes on dsrc & wave standards suite: its architecture, design, and characteristics. IEEE Commun Surv Tutor. 2010;12(4):504\u201318.","journal-title":"IEEE Commun Surv Tutor"},{"key":"2122_CR15","doi-asserted-by":"crossref","unstructured":"Bi S, Chen C, Du R, Guan X. Proper handover between vanet and cellular network improves internet access. In: 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). 2014;1\u20135. IEEE","DOI":"10.1109\/VTCFall.2014.6966137"},{"key":"2122_CR16","first-page":"33","volume":"11","author":"C Lai","year":"2018","unstructured":"Lai C, Zheng D, Zhao Q, Jiang X. Segm: a secure group management framework in integrated vanet-cellular networks. Veh Commun. 2018;11:33\u201345.","journal-title":"Veh Commun"},{"key":"2122_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou RG, Bella\u00efche M, Pierre S, Quintero A. Vanet security surveys. Comput Commun. 2014;44:1\u201313.","journal-title":"Comput Commun"},{"issue":"5","key":"2122_CR18","doi-asserted-by":"publisher","first-page":"2182","DOI":"10.1109\/TVT.2013.2238566","volume":"62","author":"S Biswas","year":"2013","unstructured":"Biswas S, Mi\u0161i\u0107 J. A cross-layer approach to privacy-preserving authentication in wave-enabled vanets. IEEE Trans Veh Technol. 2013;62(5):2182\u201392.","journal-title":"IEEE Trans Veh Technol"},{"key":"2122_CR19","doi-asserted-by":"crossref","unstructured":"More HR, Digrase AA, Wayse AV. Linear pid control technique for single wheel abs (anti-lock braking system) of motorcycle. In: 2017 2nd International Conference for Convergence in Technology (i2ct). 2017;277\u2013281. IEEE","DOI":"10.1109\/I2CT.2017.8226135"},{"key":"2122_CR20","doi-asserted-by":"crossref","unstructured":"Luckshetty A, Dontal S, Tangade S, Manvi SS. A survey: comparative study of applications, attacks, security and privacy in vanets. In: 2016 International Conference on Communication and Signal Processing (ICCSP). 2016;1594\u20131598. IEEE","DOI":"10.1109\/ICCSP.2016.7754429"},{"key":"2122_CR21","unstructured":"Sumra IA, Ahmad I, Hasbullah H, et al. Behavior of attacker and some new possible attacks in vehicular ad hoc network (vanet). In: 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 2011;1\u20138. IEEE"},{"key":"2122_CR22","first-page":"7","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny H, Samhat AE, Bassil C, Laouiti A. Vanet security challenges and solutions: a survey. Veh Commun. 2017;7:7\u201320.","journal-title":"Veh Commun"},{"key":"2122_CR23","doi-asserted-by":"publisher","first-page":"21077","DOI":"10.1109\/ACCESS.2020.2966747","volume":"8","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zheng K, Zhang D, Yan B. Aatms: an anti-attack trust management scheme in vanet. IEEE Access. 2020;8:21077\u201390.","journal-title":"IEEE Access"},{"key":"2122_CR24","unstructured":"Papadimitratos P, Gligor V, Hubaux J-P. Securing vehicular communications-assumptions, requirements, and principles 2006."},{"key":"2122_CR25","doi-asserted-by":"crossref","unstructured":"Anita EM, Jenefa J. A survey on authentication schemes of vanets. In: 2016 International Conference on Information Communication and Embedded Systems (ICICES). 2016;1\u20137. IEEE","DOI":"10.1109\/ICICES.2016.7518946"},{"key":"2122_CR26","volume":"25","author":"D Manivannan","year":"2020","unstructured":"Manivannan D, Moni SS, Zeadally S. Secure authentication and privacy-preserving techniques in vehicular ad-hoc networks (vanets). Veh Commun. 2020;25: 100247.","journal-title":"Veh Commun"},{"key":"2122_CR27","doi-asserted-by":"crossref","unstructured":"Mishra R, Singh A, Kumar R. Vanet security: Issues, challenges and solutions. In: 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). 2016;1050\u20131055. IEEE","DOI":"10.1109\/ICEEOT.2016.7754846"},{"key":"2122_CR28","doi-asserted-by":"crossref","unstructured":"Wagan AA, Jung LT. Security framework for low latency vanet applications. In: 2014 International Conference on Computer and Information Sciences (ICCOINS). 2014;1\u20136. IEEE","DOI":"10.1109\/ICCOINS.2014.6868395"},{"key":"2122_CR29","doi-asserted-by":"publisher","first-page":"12014","DOI":"10.1109\/ACCESS.2017.2717999","volume":"5","author":"U Rajput","year":"2017","unstructured":"Rajput U, Abbas F, Eun H, Oh H. A hybrid approach for efficient privacy-preserving authentication in vanet. IEEE Access. 2017;5:12014\u201330.","journal-title":"IEEE Access"},{"issue":"12","key":"2122_CR30","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Xu B, Huang X. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inform Foren Secur. 2015;10(12):2681\u201391.","journal-title":"IEEE Trans Inform Foren Secur"},{"key":"2122_CR31","doi-asserted-by":"crossref","unstructured":"Sakai Y, Emura K, Hanaoka G, Kawai Y, Matsuda T, Omote K. Group signatures with message-dependent opening. In: International Conference on Pairing-Based Cryptography. 2012;270\u2013294. Springer","DOI":"10.1007\/978-3-642-36334-4_18"},{"key":"2122_CR32","doi-asserted-by":"crossref","unstructured":"Shrestha R, Kim S. Integration of iot with blockchain and homomorphic encryption: Challenging issues and opportunities. In: Advances in Computers. 2019;115:293\u2013331. Elsevier","DOI":"10.1016\/bs.adcom.2019.06.002"},{"key":"2122_CR33","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comcom.2016.06.006","volume":"91","author":"W Han","year":"2016","unstructured":"Han W, Xiao Y. Privacy preservation for v2g networks in smart grid: a survey. Comput Commun. 2016;91:17\u201328.","journal-title":"Comput Commun"},{"issue":"8","key":"2122_CR34","doi-asserted-by":"publisher","first-page":"22","DOI":"10.4236\/jcc.2020.88003","volume":"8","author":"EE Bunese","year":"2020","unstructured":"Bunese EE, Todt E, Albini LCP. Vanet security through group broadcast encryption. J Comput Commun. 2020;8(8):22\u201335.","journal-title":"J Comput Commun"},{"issue":"6","key":"2122_CR35","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1016\/j.jcss.2014.12.016","volume":"81","author":"N Kumar","year":"2015","unstructured":"Kumar N, Iqbal R, Misra S, Rodrigues JJ. An intelligent approach for building a secure decentralized public key infrastructure in vanet. J Comput Syst Sci. 2015;81(6):1042\u201358.","journal-title":"J Comput Syst Sci"},{"issue":"2","key":"2122_CR36","first-page":"912","volume":"5","author":"M Alimohammadi","year":"2014","unstructured":"Alimohammadi M, Pouyan A. Performance analysis of cryptography methods for secure message exchanging in vanet. Int J Sci Eng Res. 2014;5(2):912.","journal-title":"Int J Sci Eng Res"},{"issue":"7","key":"2122_CR37","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s00607-014-0393-x","volume":"98","author":"M Wang","year":"2016","unstructured":"Wang M, Liu D, Zhu L, Xu Y, Wang F. Lespp: lightweight and efficient strong privacy preserving authentication scheme for secure vanet communication. Computing. 2016;98(7):685\u2013708.","journal-title":"Computing"},{"issue":"4","key":"2122_CR38","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1109\/TVT.2006.877704","volume":"55","author":"K Ren","year":"2006","unstructured":"Ren K, Lou W, Kim K, Deng R. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Trans Veh Technol. 2006;55(4):1373\u201384.","journal-title":"IEEE Trans Veh Technol"},{"issue":"8","key":"2122_CR39","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1016\/j.jcss.2016.05.006","volume":"82","author":"X Liu","year":"2016","unstructured":"Liu X, Xia Y, Chen W, Xiang Y, Hassan MM, Alelaiwi A. Semd: secure and efficient message dissemination with policy enforcement in vanet. J Comput Syst Sci. 2016;82(8):1316\u201328.","journal-title":"J Comput Syst Sci"},{"key":"2122_CR40","doi-asserted-by":"crossref","unstructured":"Lim K, Tuladhar KM, Wang X, Liu W. A scalable and secure key distribution scheme for group signature based authentication in vanet. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). 2017;478\u2013483. IEEE","DOI":"10.1109\/UEMCON.2017.8249091"},{"issue":"10","key":"2122_CR41","doi-asserted-by":"publisher","first-page":"7868","DOI":"10.1109\/TVT.2016.2541862","volume":"65","author":"MH Eiza","year":"2016","unstructured":"Eiza MH, Ni Q, Shi Q. Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol. 2016;65(10):7868\u201381.","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"2122_CR42","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","volume":"17","author":"P Vijayakumar","year":"2015","unstructured":"Vijayakumar P, Azees M, Kannan A, Deborah LJ. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst. 2015;17(4):1015\u201328.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"2122_CR43","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees M, Vijayakumar P, Deboarh LJ. Eaap: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst. 2017;18(9):2467\u201376.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"3","key":"2122_CR44","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2015","unstructured":"Shao J, Lin X, Lu R, Zuo C. A threshold anonymous authentication protocol for vanets. IEEE Trans Veh Technol. 2015;65(3):1711\u201320.","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"2122_CR45","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TC.2012.188","volume":"63","author":"TW Chim","year":"2012","unstructured":"Chim TW, Yiu S-M, Hui LC, Li VO. Vspn: Vanet-based secure and privacy-preserving navigation. IEEE Trans Comput. 2012;63(2):510\u201324.","journal-title":"IEEE Trans Comput"},{"key":"2122_CR46","doi-asserted-by":"publisher","first-page":"62785","DOI":"10.1109\/ACCESS.2019.2915794","volume":"7","author":"Z Wei","year":"2019","unstructured":"Wei Z, Li J, Wang X, Gao C-Z. A lightweight privacy-preserving protocol for vanets based on secure outsourcing computing. IEEE Access. 2019;7:62785\u201393.","journal-title":"IEEE Access"},{"key":"2122_CR47","doi-asserted-by":"crossref","unstructured":"Malik A, Pandey B. Asymmetric encryption based secure and efficient data gathering technique in vanet. In: 2017 7th International Conference on Cloud Computing, Data Science and Engineering-Confluence. 2017;369\u2013372. IEEE","DOI":"10.1109\/CONFLUENCE.2017.7943177"},{"issue":"5","key":"2122_CR48","first-page":"3687","volume":"9","author":"MH Alwan","year":"2019","unstructured":"Alwan MH, Ramli KN, Al-Jawher YA, Sameen AZ, Mahdi HF. Performance comparison between 802.11 and 802.11 p for high speed vehicle in vanet. Int J Elect Comput Eng. 2019;9(5):3687.","journal-title":"Int J Elect Comput Eng"},{"key":"2122_CR49","doi-asserted-by":"crossref","unstructured":"Goyal AK, Tripathi AK, Agarwal G. Security attacks, requirements and authentication schemes in vanet. In: 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). 2019;1:1\u20135. IEEE","DOI":"10.1109\/ICICT46931.2019.8977656"},{"issue":"5","key":"2122_CR50","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M El-Hajj","year":"2019","unstructured":"El-Hajj M, Fadlallah A, Chamoun M, Serhrouchni A. A survey of internet of things (IoT) authentication schemes. Sensors. 2019;19(5):1141.","journal-title":"Sensors"},{"key":"2122_CR51","doi-asserted-by":"publisher","first-page":"14966","DOI":"10.1109\/ACCESS.2017.2723265","volume":"5","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das AK, Kumar N, Odelu V, Reddy AG, Park K, Park Y. Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access. 2017;5:14966\u201380.","journal-title":"IEEE Access"},{"key":"2122_CR52","doi-asserted-by":"publisher","first-page":"71424","DOI":"10.1109\/ACCESS.2019.2919973","volume":"7","author":"MA Alazzawi","year":"2019","unstructured":"Alazzawi MA, Lu H, Yassin AA, Chen K. Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access. 2019;7:71424\u201335.","journal-title":"IEEE Access"},{"key":"2122_CR53","first-page":"15","volume":"14","author":"J Cui","year":"2018","unstructured":"Cui J, Tao X, Zhang J, Xu Y, Zhong H. Hcpa-gka: a hash function-based conditional privacy-preserving authentication and group-key agreement scheme for vanets. Veh Commun. 2018;14:15\u201325.","journal-title":"Veh Commun"},{"key":"2122_CR54","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.future.2017.07.002","volume":"84","author":"SH Islam","year":"2018","unstructured":"Islam SH, Obaidat MS, Vijayakumar P, Abdulhay E, Li F, Reddy MKC. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Fut Gen Comput Syst. 2018;84:216\u201327.","journal-title":"Fut Gen Comput Syst"},{"issue":"4","key":"2122_CR55","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3390\/fi12040063","volume":"12","author":"N Gupta","year":"2020","unstructured":"Gupta N, Manaswini R, Saikrishna B, Silva F, Teles A. Authentication-based secure data dissemination protocol and framework for 5g-enabled vanet. Fut Internet. 2020;12(4):63.","journal-title":"Fut Internet"},{"key":"2122_CR56","doi-asserted-by":"crossref","unstructured":"Shamir A. Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques. 1984;47\u201353. Springer","DOI":"10.1007\/3-540-39568-7_5"},{"issue":"1","key":"2122_CR57","doi-asserted-by":"publisher","first-page":"77","DOI":"10.28991\/esj-2021-01259","volume":"5","author":"M Patel","year":"2021","unstructured":"Patel M, Patel R. Improved identity based encryption system (iibes): a mechanism for eliminating the key-escrow problem. Emerg Sci J. 2021;5(1):77\u201384.","journal-title":"Emerg Sci J"},{"key":"2122_CR58","doi-asserted-by":"crossref","unstructured":"Gentry C. \u201cA fully homomorphic encryption scheme\". PhD dissertation, Stanford university (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"15","key":"2122_CR59","doi-asserted-by":"publisher","first-page":"4253","DOI":"10.3390\/s20154253","volume":"20","author":"X Sun","year":"2020","unstructured":"Sun X, Yu FR, Zhang P, Xie W, Peng X. A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks. Sensors. 2020;20(15):4253.","journal-title":"Sensors"},{"issue":"2","key":"2122_CR60","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120\u20136.","journal-title":"Commun ACM"},{"issue":"2","key":"2122_CR61","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/s11036-018-1095-y","volume":"24","author":"N Prema","year":"2019","unstructured":"Prema N. Efficient secure aggregation in vanets using fully homomorphic encryption (FHE). Mob Netw Appl. 2019;24(2):434\u201342.","journal-title":"Mob Netw Appl"},{"key":"2122_CR62","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.pmcj.2018.01.004","volume":"44","author":"J Kang","year":"2018","unstructured":"Kang J, Lin D, Jiang W, Bertino E. Highly efficient randomized authentication in vanets. Pervas Mob Comput. 2018;44:31\u201344.","journal-title":"Pervas Mob Comput"},{"key":"2122_CR63","doi-asserted-by":"publisher","first-page":"60101","DOI":"10.1109\/ACCESS.2020.2982636","volume":"8","author":"F Farouk","year":"2020","unstructured":"Farouk F, Alkady Y, Rizk R. Efficient privacy-preserving scheme for location based services in vanet system. IEEE Access. 2020;8:60101\u201316.","journal-title":"IEEE Access"},{"issue":"10","key":"2122_CR64","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.3390\/electronics9101683","volume":"9","author":"H Tan","year":"2020","unstructured":"Tan H, Kim P, Chung I. Practical homomorphic authentication in cloud-assisted vanets with blockchain-based healthcare monitoring for pandemic control. Electronics. 2020;9(10):1683.","journal-title":"Electronics"},{"key":"2122_CR65","doi-asserted-by":"crossref","unstructured":"Aggarwal S, Kumar N. Basics of blockchain. In: Advances in Computers vol. 121, pp. 129\u2013146. Elsevier (2021)","DOI":"10.1016\/bs.adcom.2020.08.007"},{"issue":"2","key":"2122_CR66","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.infoandorg.2019.03.001","volume":"29","author":"M Zachariadis","year":"2019","unstructured":"Zachariadis M, Hileman G, Scott SV. Governance and control in distributed ledgers: understanding the challenges facing blockchain technology in financial services. Inform Organ. 2019;29(2):105\u201317.","journal-title":"Inform Organ"},{"issue":"6","key":"2122_CR67","doi-asserted-by":"publisher","first-page":"3632","DOI":"10.1109\/TII.2019.2897133","volume":"15","author":"Y Xu","year":"2019","unstructured":"Xu Y, Ren J, Wang G, Zhang C, Yang J, Zhang Y. A blockchain-based nonrepudiation network computing service scheme for industrial iot. IEEE Trans Ind Inform. 2019;15(6):3632\u201341.","journal-title":"IEEE Trans Ind Inform"},{"issue":"12","key":"2122_CR68","doi-asserted-by":"publisher","first-page":"2792","DOI":"10.1109\/TVLSI.2019.2929420","volume":"27","author":"Z Lu","year":"2019","unstructured":"Lu Z, Wang Q, Qu G, Zhang H, Liu Z. A blockchain-based privacy-preserving authentication scheme for vanets. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2019;27(12):2792\u2013801.","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"2122_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101636","volume":"99","author":"I Ali","year":"2019","unstructured":"Ali I, Gervais M, Ahene E, Li F. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in vanets. J Syst Architect. 2019;99: 101636.","journal-title":"J Syst Architect"},{"issue":"6","key":"2122_CR70","doi-asserted-by":"publisher","first-page":"5836","DOI":"10.1109\/TVT.2020.2972923","volume":"69","author":"Z Ma","year":"2020","unstructured":"Ma Z, Zhang J, Guo Y, Liu Y, Liu X, He W. An efficient decentralized key management mechanism for vanet with blockchain. IEEE Trans Veh Technol. 2020;69(6):5836\u201349.","journal-title":"IEEE Trans Veh Technol"},{"issue":"12","key":"2122_CR71","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1109\/JAS.2021.1004225","volume":"8","author":"SK Dwivedi","year":"2021","unstructured":"Dwivedi SK, Amin R, Vollala S. Blockchain-based secured ipfs-enable event storage technique with authentication protocol in vanet. IEEE\/CAA J Autom Sinica. 2021;8(12):1913\u201322.","journal-title":"IEEE\/CAA J Autom Sinica"},{"key":"2122_CR72","doi-asserted-by":"publisher","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","volume":"6","author":"Z Lu","year":"2018","unstructured":"Lu Z, Liu W, Wang Q, Qu G, Liu Z. A privacy-preserving trust model based on blockchain for vanets. IEEE Access. 2018;6:45655\u201364.","journal-title":"IEEE Access"},{"issue":"01","key":"2122_CR73","doi-asserted-by":"publisher","first-page":"12","DOI":"10.4236\/cn.2013.51B004","volume":"5","author":"V Kumar","year":"2013","unstructured":"Kumar V, Mishra S, Chand N, et al. Applications of VANETs: present and future. Commun Netw. 2013;5(01):12.","journal-title":"Commun Netw"},{"issue":"5","key":"2122_CR74","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/TMC.2016.2592915","volume":"16","author":"D Lin","year":"2016","unstructured":"Lin D, Kang J, Squicciarini A, Wu Y, Gurung S, Tonguz O. Mozo: a moving zone based routing protocol using pure v2v communication in vanets. IEEE Trans Mob Comput. 2016;16(5):1357\u201370.","journal-title":"IEEE Trans Mob Comput"},{"issue":"11","key":"2122_CR75","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1109\/TIFS.2013.2277471","volume":"8","author":"S-J Horng","year":"2013","unstructured":"Horng S-J, Tzeng S-F, Pan Y, Fan P, Wang X, Li T, Khan MK. b-specs+: batch verification for secure pseudonymous authentication in vanet. IEEE Trans Inform Foren Secur. 2013;8(11):1860\u201375.","journal-title":"IEEE Trans Inform Foren Secur"},{"issue":"3","key":"2122_CR76","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JSAC.2011.110311","volume":"29","author":"Y Hao","year":"2011","unstructured":"Hao Y, Cheng Y, Zhou C, Song W. A distributed key management framework with cooperative message authentication in vanets. IEEE J Select Areas Commun. 2011;29(3):616\u201329.","journal-title":"IEEE J Select Areas Commun"},{"issue":"6","key":"2122_CR77","doi-asserted-by":"publisher","first-page":"3357","DOI":"10.1109\/TVT.2008.928581","volume":"57","author":"C Zhang","year":"2008","unstructured":"Zhang C, Lin X, Lu R, Ho P-H, Shen X. An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol. 2008;57(6):3357\u201368.","journal-title":"IEEE Trans Veh Technol"},{"issue":"7","key":"2122_CR78","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1109\/TVT.2013.2257188","volume":"62","author":"X Lin","year":"2013","unstructured":"Lin X, Li X. Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans Veh Technol. 2013;62(7):3339\u201348.","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"2122_CR79","doi-asserted-by":"publisher","first-page":"155014771770089","DOI":"10.1177\/1550147717700899","volume":"13","author":"L Wu","year":"2017","unstructured":"Wu L, Fan J, Xie Y, Wang J, Liu Q. Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int J Distrib Sens Netw. 2017;13(3):1550147717700899.","journal-title":"Int J Distrib Sens Netw"},{"key":"2122_CR80","doi-asserted-by":"crossref","unstructured":"Chandra S, Paira S, Alam SS, Sanyal G. A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE). 2014;83\u201393. IEEE","DOI":"10.1109\/ICECCE.2014.7086640"},{"issue":"1","key":"2122_CR81","first-page":"16","volume":"14","author":"A Mantri","year":"2016","unstructured":"Mantri A, Razaque A, Makwana H, Parekh P, Soomro TR. Analytical comparison of rsa and rsa with chinese remainder theorem. J Independ Stud Res. 2016;14(1):16.","journal-title":"J Independ Stud Res"},{"key":"2122_CR82","doi-asserted-by":"publisher","first-page":"23277","DOI":"10.1109\/ACCESS.2020.2964040","volume":"8","author":"G Zhang","year":"2020","unstructured":"Zhang G, Liao Y, Fan Y, Liang Y. Security analysis of an identity-based signature from factorization problem. IEEE Access. 2020;8:23277\u201383.","journal-title":"IEEE Access"},{"key":"2122_CR83","doi-asserted-by":"crossref","unstructured":"Nandy T, Idris MYIB, Noor RM, Ahmedy I, Bhattacharyya S. An enhanced two-factor authentication protocol for v2v communication in vanets. In: Proceedings of the 2020 the 3rd International Conference on Information Science and System. 2020;171\u2013176.","DOI":"10.1145\/3388176.3388185"},{"key":"2122_CR84","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.future.2015.09.004","volume":"56","author":"RS Bali","year":"2016","unstructured":"Bali RS, Kumar N. Secure clustering for efficient data dissemination in vehicular cyber-physical systems. Fut Gen Comput Syst. 2016;56:476\u201392.","journal-title":"Fut Gen Comput Syst"},{"issue":"11","key":"2122_CR85","doi-asserted-by":"publisher","first-page":"8391","DOI":"10.1007\/s11227-019-03104-0","volume":"76","author":"P Zhao","year":"2020","unstructured":"Zhao P, Zhang G, Wan S, Liu G, Umer T. A survey of local differential privacy for securing internet of vehicles. J Supercomput. 2020;76(11):8391\u2013412.","journal-title":"J Supercomput"},{"key":"2122_CR86","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Annual International Cryptology Conference. 2001;213\u2013229. Springer","DOI":"10.1007\/3-540-44647-8_13"},{"key":"2122_CR87","doi-asserted-by":"crossref","unstructured":"Barreto PS, Libert B, McCullagh N, Quisquater J-J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: International Conference on the Theory and Application of Cryptology and Information Security. 2005;515\u2013532. Springer","DOI":"10.1007\/11593447_28"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02122-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02122-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02122-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T14:13:25Z","timestamp":1691072005000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02122-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":87,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["2122"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02122-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,3]]},"assertion":[{"value":"7 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declares that there is no conflict of interest in the work presented in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"589"}}