{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:03:40Z","timestamp":1767647020083,"version":"3.48.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3282024052"],"award-info":[{"award-number":["3282024052"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3282024058"],"award-info":[{"award-number":["3282024058"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s44443-025-00348-0","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T10:49:39Z","timestamp":1764154179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unlinkable V2V communication protocol with cross-domain anonymity preservation"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2032-9439","authenticated-orcid":false,"given":"Ronglei","family":"Hu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"YaTao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,26]]},"reference":[{"issue":"10","key":"348_CR1","doi-asserted-by":"publisher","first-page":"13407","DOI":"10.1109\/TITS.2024.3410114","volume":"25","author":"D Abbasinezhad-Mood","year":"2024","unstructured":"Abbasinezhad-Mood D, Ghaemi H (2024) Dual-signature blockchain-based key sharing protocol for secure V2V communications in multi-domain IoV environments. IEEE Trans Intell Transp Syst 25(10):13407\u201313416","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"348_CR2","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless Public Key Cryptography. Springer. Advances in Cryptology - ASIACRYPT 2003, 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"348_CR3","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00665-1","volume":"13","author":"M Awais","year":"2024","unstructured":"Awais M, Saeed Y, Ali A et al (2024) Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for vehicular ad-hoc 5G networks. J Cloud Comput 13:130","journal-title":"J Cloud Comput"},{"issue":"3","key":"348_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/info12030112","volume":"12","author":"Q Chen","year":"2021","unstructured":"Chen Q, Wu T, Hu C, Chen A, Zheng Q (2021) An identity-based cross-domain authenticated asymmetric group key agreement. Information 12(3):112","journal-title":"Information"},{"key":"348_CR5","doi-asserted-by":"crossref","unstructured":"Cheng W, Luo E, Tang Y et al (2021) A survey on privacy-security in internet of vehicles. 2021 IEEE International Conference on Dependable, Autonomic and Secure Computing, 644\u2013650","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech52372.2021.00109"},{"issue":"452","key":"348_CR6","first-page":"1","volume":"451","author":"J Cui","year":"2018","unstructured":"Cui J, Zhang J, Zhong H et al (2018) An Efficient Certificateless Aggregate Signature without Pairings for Vehicular Ad Hoc Networks. Inf Sci 451(452):1\u201315","journal-title":"Inf Sci"},{"key":"348_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114958","volume":"183","author":"S Gao","year":"2024","unstructured":"Gao S, Herbert Ho-Ching Iu, Mou J et al (2024) Temporal action segmentation for video encryption. Chaos, Solitons Fractals 183:114958","journal-title":"Chaos, Solitons Fractals"},{"issue":"8","key":"348_CR8","doi-asserted-by":"publisher","first-page":"7706","DOI":"10.1109\/TCSVT.2025.3545868","volume":"35","author":"S Gao","year":"2025","unstructured":"Gao S et al (2025) A 3D memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption. IEEE Trans Circuits Syst Video Technol 35(8):7706\u20137718","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"10","key":"348_CR9","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1002\/dac.2457","volume":"27","author":"P Gong","year":"2014","unstructured":"Gong P, Li P (2014) Further improvement of a certificateless signature scheme without pairing. Int J Commun Syst 27(10):2083\u20132091","journal-title":"Int J Commun Syst"},{"issue":"7","key":"348_CR10","doi-asserted-by":"publisher","first-page":"3997","DOI":"10.1109\/TITS.2020.3002462","volume":"22","author":"M Kamal","year":"2021","unstructured":"Kamal M, Srivastava G, Tariq M (2021) Blockchain-based lightweight and secured V2V communication in the internet of vehicles. IEEE Trans Intell Transp Syst 22(7):3997\u20134004","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"348_CR11","doi-asserted-by":"publisher","first-page":"1700","DOI":"10.26599\/TST.2024.9010083","volume":"30","author":"E Khezri","year":"2025","unstructured":"Khezri E, Hassanzadeh H, Yahya RO, Mir M (2025) Security challenges in internet of vehicles (IoV) for ITS: a survey. Tsinghua Sci Technol 30(4):1700\u20131723","journal-title":"Tsinghua Sci Technol"},{"issue":"8","key":"348_CR12","doi-asserted-by":"publisher","first-page":"7992","DOI":"10.1109\/TVT.2021.3087557","volume":"70","author":"X Li","year":"2021","unstructured":"Li X, Liu J, Obaidat MS, Vijayakumar P, Jiang Q, Amin R (2021) An unlinkable authenticated key agreement with collusion resistant for VANETs. IEEE Trans Veh Technol 70(8):7992\u20138006","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"348_CR13","first-page":"1","volume":"9","author":"Hu Li Ruiqin","year":"2024","unstructured":"Li Ruiqin Hu, Xiaoya ZJ et al (2024) Research on Privacy Protection Technology of IoV. J Cyber Secur 9(2):1\u201318","journal-title":"J Cyber Secur"},{"issue":"9","key":"348_CR14","doi-asserted-by":"publisher","first-page":"10138","DOI":"10.1109\/TITS.2023.3271110","volume":"24","author":"Y Liang","year":"2023","unstructured":"Liang Y, Yan H, Liu Y (2023) Unlinkable signcryption scheme for multi-receiver in VANETs. IEEE Trans Intell Transp Syst 24(9):10138\u201310154","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"16","key":"348_CR15","doi-asserted-by":"publisher","first-page":"27744","DOI":"10.1109\/JIOT.2024.3400320","volume":"11","author":"H-T Lin","year":"2024","unstructured":"Lin H-T, Jhuang W-L (2024) Blockchain-based lightweight certificateless authenticated key agreement protocol for V2V communications in IoV. IEEE Internet Things J 11(16):27744\u201327759","journal-title":"IEEE Internet Things J"},{"key":"348_CR16","doi-asserted-by":"crossref","unstructured":"Meddeb N, Makhlouf AM, Ayed MAB (2021) Secure and efficient video transmission in VANET. Int J Commun Net Inform Secur. 13(4):151\u2013157","DOI":"10.17762\/ijcnis.v13i1.4888"},{"issue":"3","key":"348_CR17","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361\u2013396","journal-title":"J Cryptol"},{"issue":"1","key":"348_CR18","first-page":"245","volume":"15","author":"M Qian","year":"2020","unstructured":"Qian M, Xiong Hu, Chen J, Yang M, Kumari S, Khan MK (2020) Efficient certificateless aggregate signature with conditional privacy preservation in IoV. IEEE Syst J 15(1):245\u2013256","journal-title":"IEEE Syst J"},{"issue":"1","key":"348_CR19","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/JSYST.2020.2966526","volume":"15","author":"M Qian","year":"2021","unstructured":"Qian M, Hu X, Jinhao C et al (2021) Efficient Certificateless Aggregate Signature with Conditional Privacy Preservation in IoV[J]. IEEE Syst J 15(1):245\u2013256","journal-title":"IEEE Syst J"},{"key":"348_CR20","doi-asserted-by":"crossref","unstructured":"Raya M, Hubaux JP (2005) The security of vehicular Ad Hoc networks. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks,\u00a011\u201321","DOI":"10.1145\/1102219.1102223"},{"key":"348_CR21","doi-asserted-by":"crossref","unstructured":"Schaub F, Kargl F, Ma Z et al., (2010) V-tokens for conditional pppppseudonymity in VANETs. 2010 IEEE Wireless Communication and Networking Conference,\u00a01-6","DOI":"10.1109\/WCNC.2010.5506126"},{"issue":"5","key":"348_CR22","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen M et al (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942\u2013954","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"348_CR23","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"K-A Shim","year":"2012","unstructured":"Shim K-A (2012) CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Technol 61(4):1874\u20131883","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"348_CR24","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/CC.2014.6969774","volume":"11","author":"J Song","year":"2014","unstructured":"Song J, He C, Zhang L, Tang S, Zhang H (2014) Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Commun 11(9):93\u2013103","journal-title":"China Commun"},{"key":"348_CR25","doi-asserted-by":"crossref","unstructured":"Tan CH, Teo JCM (2006) Energy-efficient ID-based group key agreement protocols for wireless networks. In Proceedings of the 20th IEEE International Parallel & Distributed Processing, 8","DOI":"10.1109\/IPDPS.2006.1639684"},{"key":"348_CR26","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.comcom.2017.09.005","volume":"112","author":"S Wang","year":"2017","unstructured":"Wang S, Yao N (2017) LIAP: a local identity-based anonymous message authentication protocol in VANETs. Comput Commun 112:154\u2013164","journal-title":"Comput Commun"},{"issue":"6","key":"348_CR27","doi-asserted-by":"publisher","first-page":"5114","DOI":"10.1109\/JIOT.2022.3222469","volume":"10","author":"Z Wang","year":"2023","unstructured":"Wang Z et al (2023) An anonymous and revocable authentication protocol for vehicle-to-vehicle communications. IEEE Internet Things J 10(6):5114\u20135127","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"348_CR28","first-page":"462","volume":"10","author":"WJ Xiong","year":"2023","unstructured":"Xiong WJ, Wang RM, Wang YJ, Zhou F et al (2023) A conditional privacy-preserving batch authentication scheme based on certificateless aggregate signature for VANETs. Journal of Cryptologic Research 10(3):462\u2013475","journal-title":"Journal of Cryptologic Research"},{"issue":"3","key":"348_CR29","doi-asserted-by":"publisher","first-page":"2409","DOI":"10.1109\/TNSM.2022.3146929","volume":"19","author":"L Xue","year":"2022","unstructured":"Xue L, Huang H, Xiao F, Wang W (2022) A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums. IEEE Trans Netw Serv Manag 19(3):2409\u20132420","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"05","key":"348_CR30","first-page":"213","volume":"44","author":"L Xuejiao","year":"2023","unstructured":"Xuejiao L, Qiang Z, Yingjie X (2023) Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain. J Commun 44(05):213\u2013223","journal-title":"J Commun"},{"issue":"1","key":"348_CR31","first-page":"295","volume":"44","author":"L Xueyan","year":"2022","unstructured":"Xueyan L, Li W, Lijuan H, Xiaoni DU et al (2022) Certificateless Anonymous Authentication Scheme for Internet of Vehicles. J Electron Inform Technol 44(1):295\u2013304","journal-title":"J Electron Inform Technol"},{"issue":"11","key":"348_CR32","doi-asserted-by":"publisher","first-page":"8078","DOI":"10.1109\/JIOT.2021.3107443","volume":"9","author":"Y Yang","year":"2022","unstructured":"Yang Y, Wei L, Wu J, Long C, Li B (2022) A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet Things J 9(11):8078\u20138090","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"348_CR33","first-page":"983","volume":"24","author":"L Yidan","year":"2024","unstructured":"Yidan L, Yongliu M, Yibin D et al (2024) A Certificateless Anonymous Authentication Key Agreement Protocol for VANET. Netinfo Secur 24(7):983\u2013992","journal-title":"Netinfo Secur"},{"issue":"13","key":"348_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/s20133627","volume":"20","author":"J Yun","year":"2020","unstructured":"Yun J, Kim M (2020) JLVEA: Lightweight real-time video stream encryption algorithm for Internet of Things. Sensors 20(13):3627","journal-title":"Sensors"},{"issue":"22","key":"348_CR35","doi-asserted-by":"publisher","first-page":"22501","DOI":"10.1109\/JIOT.2022.3176192","volume":"9","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Li B, Wu J, Liu B, Chen R, Chang J (2022) Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IoT. IEEE Internet Things J 9(22):22501\u201322515","journal-title":"IEEE Internet Things J"},{"key":"348_CR36","doi-asserted-by":"crossref","unstructured":"Zhang C, Lu R, Lin X et al., (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. IEEE INFOCOM 2008-The 27th Conference on Computer Communications,\u00a0 246-250","DOI":"10.1109\/INFOCOM.2008.58"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00348-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00348-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00348-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T18:48:27Z","timestamp":1767638907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00348-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,26]]},"references-count":36,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["348"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00348-0","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,11,26]]},"assertion":[{"value":"9 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"335"}}