{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:09Z","timestamp":1778605809613,"version":"3.51.4"},"reference-count":89,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111174","type":"journal-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T07:43:29Z","timestamp":1776066209000},"page":"111174","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A comprehensive review of ECC-based certificateless aggregate signature for Vehicular Ad-Hoc Networks (VANETs) and cryptanalysis of quantum-secure CLAS"],"prefix":"10.1016","volume":"135","author":[{"given":"Vijaya","family":"Lode","sequence":"first","affiliation":[]},{"given":"Anil","family":"Pinapati","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2026.111174_b1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"Raya","year":"2007","journal-title":"J Comput Secur"},{"issue":"89","key":"10.1016\/j.compeleceng.2026.111174_b2","article-title":"LTE and IEEE 802.11p for vehicular networking: A performance evaluation","volume":"2014","author":"Mir","year":"2014","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"10.1016\/j.compeleceng.2026.111174_b3","series-title":"Proceedings of the 48th IEEE vehicular technology conference (vTC\u201998): pathway to global wireless revolution","first-page":"2095","article-title":"Architecture of the dedicated short-range communications (DSRC) protocol","volume":"vol. 3","author":"Cseh","year":"1998"},{"key":"10.1016\/j.compeleceng.2026.111174_b4","series-title":"Dedicated short range communications (DSRC)","author":"Author","year":"2003"},{"key":"10.1016\/j.compeleceng.2026.111174_b5","series-title":"Advances in cryptology \u2013 ASIACRYPT 2003","first-page":"452","article-title":"Certificateless public key cryptography","volume":"vol. 2894","author":"Al-Riyami","year":"2003"},{"key":"10.1016\/j.compeleceng.2026.111174_b6","series-title":"Advances in cryptology \u2013 EUROCRYPT 2003","first-page":"416","article-title":"Aggregate and verifiably encrypted signatures from bilinear maps","volume":"vol. 2656","author":"Boneh","year":"2003"},{"key":"10.1016\/j.compeleceng.2026.111174_b7","series-title":"Recommendation for key management: Part 1 \u2013 general","author":"Barker","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.111174_b8","series-title":"Recommendation for key management: Part 1 \u2013 general (revision 5)","author":"Barker","year":"2020"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111174_b9","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1109\/TVT.2013.2294032","article-title":"Efficient privacy-preserving authentication for vehicular ad hoc networks","volume":"63","author":"Zhu","year":"2014","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.compeleceng.2026.111174_b10","article-title":"A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks","volume":"39","author":"Huang","year":"2023","journal-title":"Veh Commun"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111174_b11","first-page":"1","article-title":"A survey of two signature aggregation techniques","volume":"6","author":"Boneh","year":"2003","journal-title":"CryptoBytes"},{"key":"10.1016\/j.compeleceng.2026.111174_b12","series-title":"Proceedings of the 36th international conference on telecommunications and signal processing","first-page":"57","article-title":"Trade-off between signature aggregation and batch verification","author":"Malina","year":"2013"},{"key":"10.1016\/j.compeleceng.2026.111174_b13","series-title":"Elliptic curve cryptography: An implementation guide","author":"Anoop","year":"2007"},{"key":"10.1016\/j.compeleceng.2026.111174_b14","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1080\/02564602.2021.2017800","article-title":"Extensive review of certificateless aggregate signature mechanisms for vehicular ad hoc networks","volume":"39","author":"Cahyadi","year":"2022","journal-title":"IETE Tech Rev"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111174_b15","first-page":"1","article-title":"An efficient certificateless conditional privacy-preserving authentication method for vehicular ad hoc networks","volume":"2019","author":"Farash","year":"2019","journal-title":"Mob Inf Syst"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111174_b16","first-page":"5854","article-title":"Enhanced and efficient anonymous authentication scheme with conditional privacy preservation for VANETs","volume":"16","author":"Cahyadi","year":"2022","journal-title":"IEEE Syst J"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111174_b17","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","article-title":"The security and privacy of smart vehicles","volume":"2","author":"Hubaux","year":"2004","journal-title":"IEEE Secur Priv"},{"key":"10.1016\/j.compeleceng.2026.111174_b18","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Zhu H, Ho P-H, Shen X. ECPP: An Efficient Protocol for Conditional Privacy Preservation in Secure Vehicular Communication. In: Proceedings of IEEE INFOCOM 2008 - the 27th conference on computer communications. Phoenix, AZ, USA; 2008, p. 1229\u201337. http:\/\/dx.doi.org\/10.1109\/INFOCOM.2008.179.","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"10.1016\/j.compeleceng.2026.111174_b19","series-title":"Advances in cryptology \u2014 CRYPTO \u201984","first-page":"47","article-title":"Identity-based cryptosystems and digital signature schemes","volume":"vol. 196","author":"Shamir","year":"1985"},{"key":"10.1016\/j.compeleceng.2026.111174_b20","series-title":"Lightweight certificateless signature scheme with support for aggregation","author":"Castro","year":"2007"},{"key":"10.1016\/j.compeleceng.2026.111174_b21","doi-asserted-by":"crossref","unstructured":"Gong Z, Long Y, Hong X, Chen K. Two Certificateless Aggregate Signature Schemes Based on Bilinear Pairings. In: Proceedings of the 8th ACIS international conference on SNPD 2007. Qingdao, China; 2007, p. 188\u201393. http:\/\/dx.doi.org\/10.1109\/SNPD.2007.132.","DOI":"10.1109\/SNPD.2007.132"},{"key":"10.1016\/j.compeleceng.2026.111174_b22","series-title":"Proceedings of the international conference on computational intelligence and security","first-page":"364","article-title":"Security model for certificateless aggregate signature schemes","author":"Zhang","year":"2008"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111174_b23","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1016\/j.comcom.2008.12.042","article-title":"A novel certificateless aggregate signature scheme","volume":"32","author":"Zhang","year":"2008","journal-title":"Comput Commun","ISSN":"https:\/\/id.crossref.org\/issn\/0140-3664","issn-type":"print"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.111174_b24","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/LCOMM.2011.081011.111214","article-title":"On the security of a certificateless aggregate signature scheme","volume":"15","author":"Shim","year":"2011","journal-title":"IEEE Commun Lett"},{"key":"10.1016\/j.compeleceng.2026.111174_b25","series-title":"Applied algebra, algebraic algorithms and error-correcting codes (AAECC 2009)","first-page":"259","article-title":"An efficient certificateless aggregate signature scheme","volume":"vol. 5527","author":"Zhang","year":"2009"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111174_b26","first-page":"2093","article-title":"Practical certificateless aggregate signatures from bilinear maps","volume":"26","author":"Gong","year":"2010","journal-title":"J Inf Sci Eng"},{"issue":"14","key":"10.1016\/j.compeleceng.2026.111174_b27","doi-asserted-by":"crossref","first-page":"2482","DOI":"10.1016\/j.comnet.2010.04.008","article-title":"Efficient many-to-one authentication with certificateless aggregate signatures","volume":"54","author":"Zhang","year":"2010","journal-title":"Comput Netw"},{"key":"10.1016\/j.compeleceng.2026.111174_b28","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.ins.2012.07.004","article-title":"An efficient certificateless aggregate signature with constant pairing computations","volume":"219","author":"Xiong","year":"2013","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111174_b29","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.ins.2013.09.032","article-title":"Insecurity of an efficient certificateless aggregate signature with constant pairing computations","volume":"268","author":"He","year":"2014","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111174_b30","doi-asserted-by":"crossref","DOI":"10.1155\/2014\/343715","article-title":"Reattack of a certificateless aggregate signature scheme with constant pairing computations","volume":"2014","author":"Tu","year":"2014","journal-title":"Sci World J"},{"key":"10.1016\/j.compeleceng.2026.111174_b31","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.ins.2014.07.019","article-title":"Notes on the security of certificateless aggregate signature schemes","volume":"287","author":"Zhang","year":"2014","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111174_b32","first-page":"92","article-title":"Strong security enabled certificateless aggregate signatures applicable to mobile computation","author":"Xiong","year":"2011","journal-title":"Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems (INCoS)"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111174_b33","first-page":"689","article-title":"An efficient and provably secure certificateless aggregate signature scheme","volume":"35","author":"Xiong","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.compeleceng.2026.111174_b34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/6059834","article-title":"Cryptanalysis of a certificateless aggregate signature scheme for healthcare wireless sensor network","volume":"2019","author":"Zhan","year":"2019","journal-title":"Secur Commun Netw"},{"key":"10.1016\/j.compeleceng.2026.111174_b35","first-page":"80","article-title":"A certificateless aggregate signature scheme for healthcare wireless sensor network","volume":"18","author":"Kumar","year":"2018","journal-title":"Sustain Comput: Inform Syst"},{"key":"10.1016\/j.compeleceng.2026.111174_b36","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0205453","article-title":"A short certificateless aggregate signature against coalition attacks","author":"Yang","year":"2018","journal-title":"PLOS ONE"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111174_b37","first-page":"643","article-title":"Cryptanalysis and improvement of a certificateless aggregate signature scheme","volume":"113","author":"Tu","year":"2013","journal-title":"Inform Process Lett"},{"key":"10.1016\/j.compeleceng.2026.111174_b38","series-title":"Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks","author":"Li","year":"2016"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111174_b39","first-page":"2063","article-title":"Efficient certificateless aggregate signature with batch verification for VANETs","volume":"16","author":"Horng","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.compeleceng.2026.111174_b40","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.ins.2015.04.033","article-title":"An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks","volume":"317","author":"Horng","year":"2015","journal-title":"Inform Sci"},{"issue":"1\u20132","key":"10.1016\/j.compeleceng.2026.111174_b41","first-page":"1","article-title":"Cryptanalysis and improvement for certificateless aggregate signature","volume":"157","author":"Li","year":"2018","journal-title":"Fund Inform"},{"key":"10.1016\/j.compeleceng.2026.111174_b42","doi-asserted-by":"crossref","DOI":"10.1002\/sec.1480","article-title":"Cryptanalysis of a certificateless aggregate signature scheme with efficient verification","author":"Shen","year":"2016","journal-title":"Secur Commun Netw"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111174_b43","first-page":"1","article-title":"A certificateless aggregate signature scheme for security and privacy protection in VANET","volume":"18","author":"Cahyadi","year":"2022","journal-title":"Int J Distrib Sens Networks"},{"key":"10.1016\/j.compeleceng.2026.111174_b44","article-title":"A certificateless aggregate signature scheme for VANETs with privacy protection properties","author":"Li","year":"2025","journal-title":"PLOS ONE"},{"key":"10.1016\/j.compeleceng.2026.111174_b45","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.ins.2019.11.037","article-title":"Certificateless aggregate signature scheme secure against fully chosen-key attacks","volume":"514","author":"Wu","year":"2020","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111174_b46","first-page":"1","article-title":"Efficient certificateless aggregate signature scheme for performing secure routing in VANETs","volume":"2020","author":"Xu","year":"2020","journal-title":"Secur Commun Netw"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111174_b47","first-page":"1029","article-title":"Message verification protocol based on bilinear pairings and elliptic curves for enhanced security in vehicular ad hoc networks","volume":"81","author":"Nyangaresi","year":"2024","journal-title":"Comput Mater Contin"},{"key":"10.1016\/j.compeleceng.2026.111174_b48","doi-asserted-by":"crossref","first-page":"27079","DOI":"10.1038\/s41598-024-77992-5","article-title":"An efficient certificateless anonymous signcryption communication scheme for vehicular ad hoc network","volume":"14","author":"Luo","year":"2024","journal-title":"Sci Rep"},{"key":"10.1016\/j.compeleceng.2026.111174_b49","doi-asserted-by":"crossref","first-page":"29225","DOI":"10.1038\/s41598-025-15011-x","article-title":"Vehicular ad hoc networks verification scheme based on bilinear pairings and networks reverse fuzzy extraction","volume":"15","author":"Abduljabbar","year":"2025","journal-title":"Sci Rep"},{"key":"10.1016\/j.compeleceng.2026.111174_b50","first-page":"1","article-title":"An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks","volume":"451\u2013452","author":"Cui","year":"2018","journal-title":"Inform Sci"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111174_b51","doi-asserted-by":"crossref","first-page":"9064","DOI":"10.1109\/JIOT.2019.2927089","article-title":"Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks","volume":"6","author":"Gayathri","year":"2019","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111174_b52","doi-asserted-by":"crossref","first-page":"5256","DOI":"10.1109\/JIOT.2020.2979613","article-title":"Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111174_b53","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2020.3019304","article-title":"Efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks","volume":"8","author":"Thumbur","year":"2021","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111174_b54","article-title":"Cryptanalysis of an efficient and secure certificateless aggregate signature-based authentication scheme for vehicular ad hoc networks","volume":"5","author":"Yang","year":"2022","journal-title":"Secur Priv"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111174_b55","doi-asserted-by":"crossref","first-page":"3822","DOI":"10.1109\/JSYST.2022.3220869","article-title":"A security-enhanced pairing-free certificateless aggregate signature for vehicular ad-hoc networks","volume":"17","author":"Zheng","year":"2023","journal-title":"IEEE Syst J"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111174_b56","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/JSYST.2022.3213245","article-title":"Improved certificateless aggregate signature scheme against collusion attacks for VANETs","volume":"17","author":"Xiong","year":"2023","journal-title":"IEEE Syst J"},{"key":"10.1016\/j.compeleceng.2026.111174_b57","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111084","article-title":"A security-enhanced certificateless conditional privacy-preserving authentication scheme with collusion-resistance for IoV","volume":"259","author":"Ye","year":"2025","journal-title":"Comput Netw","ISSN":"https:\/\/id.crossref.org\/issn\/1389-1286","issn-type":"print"},{"key":"10.1016\/j.compeleceng.2026.111174_b58","first-page":"184","article-title":"An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks","volume":"44","author":"Kamil","year":"2019","journal-title":"J Inf Secur Appl"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111174_b59","article-title":"An efficient certificateless aggregate signature scheme for the internet of vehicles","volume":"31","author":"Zhao","year":"2020","journal-title":"Trans Emerg Tel. Tech"},{"key":"10.1016\/j.compeleceng.2026.111174_b60","series-title":"Proceedings of provSec 2019","first-page":"59","article-title":"An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online\/offline certificateless aggregate signature","volume":"vol. 11821","author":"Li","year":"2019"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111174_b61","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MNET.001.1900035","article-title":"A security-enhanced certificateless aggregate signature authentication protocol for in VANETs","volume":"34","author":"Xu","year":"2020","journal-title":"IEEE Netw"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111174_b62","first-page":"725","article-title":"An efficient certificateless aggregate signature scheme designed for VANET","volume":"63","author":"Li","year":"2020","journal-title":"Comput Mater Contin"},{"key":"10.1016\/j.compeleceng.2026.111174_b63","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.ins.2018.10.021","article-title":"Privacy-preserving authentication scheme with full aggregation in VANET","volume":"476","author":"Zhong","year":"2019","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111174_b64","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1155\/2021\/6677137","article-title":"Certificateless-based anonymous authentication and aggregate signature scheme for vehicular ad hoc networks","volume":"2021","author":"Ye","year":"2021","journal-title":"Wirel Commun Mob Comput"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111174_b65","doi-asserted-by":"crossref","DOI":"10.3390\/s21092900","article-title":"Efficient certificateless aggregate signature scheme with conditional privacy-preservation for vehicular ad hoc networks enhanced smart grid system","volume":"21","author":"Vallent","year":"2021","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111174_b66","doi-asserted-by":"crossref","DOI":"10.1109\/JSYST.2021.3116029","article-title":"eCLAS: An efficient pairing-free certificateless aggregate signature for secure VANET communication","volume":"16","author":"Han","year":"2022","journal-title":"IEEE Syst J"},{"key":"10.1016\/j.compeleceng.2026.111174_b67","article-title":"CLASRM: A lightweight and secure certificateless aggregate signature scheme with revocation mechanism for 5G-enabled vehicular networks","volume":"2022","author":"Wang","year":"2022","journal-title":"Secur Commun Netw"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111174_b68","doi-asserted-by":"crossref","first-page":"7863","DOI":"10.1109\/TVT.2022.3169948","article-title":"Efficient certificateless conditional privacy-preserving authentication for VANETs","volume":"71","author":"Zhou","year":"2022","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111174_b69","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/TVT.2021.3050399","article-title":"An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs","volume":"70","author":"Ali","year":"2021","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.compeleceng.2026.111174_b70","doi-asserted-by":"crossref","DOI":"10.1016\/j.vehcom.2022.100549","article-title":"ELCPAS: A new efficient lightweight certificateless conditional privacy preserving authentication scheme for IoV","volume":"39","author":"Genc","year":"2023","journal-title":"Veh Commun","ISSN":"https:\/\/id.crossref.org\/issn\/2214-2096","issn-type":"print"},{"key":"10.1016\/j.compeleceng.2026.111174_b71","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.103030","article-title":"An efficient and secure certificateless aggregate signature scheme","volume":"147","author":"Xu","year":"2024","journal-title":"J Syst Archit","ISSN":"https:\/\/id.crossref.org\/issn\/1383-7621","issn-type":"print"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111174_b72","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3390\/cryptography8030043","article-title":"CHAM-CLAS: A certificateless aggregate signature scheme with chameleon hashing-based identity authentication for VANETs","volume":"8","author":"Kabil","year":"2024","journal-title":"Cryptography"},{"key":"10.1016\/j.compeleceng.2026.111174_b73","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103134","article-title":"PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs","volume":"144","author":"Gong","year":"2023","journal-title":"Ad Hoc Netw","ISSN":"https:\/\/id.crossref.org\/issn\/1570-8705","issn-type":"print"},{"key":"10.1016\/j.compeleceng.2026.111174_b74","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2024.103175","article-title":"IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs","volume":"152","author":"Wu","year":"2024","journal-title":"J Syst Archit"},{"key":"10.1016\/j.compeleceng.2026.111174_b75","series-title":"A security-enhanced pairing-free certificateless aggregate signature for vehicular ad-hoc networks, revisited","author":"Cao","year":"2025"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.111174_b76","doi-asserted-by":"crossref","first-page":"10456","DOI":"10.1109\/TITS.2023.3275077","article-title":"A security-enhanced certificateless conditional privacy-preserving authentication scheme for vehicular ad hoc networks","volume":"24","author":"Zhu","year":"2023","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111174_b77","doi-asserted-by":"crossref","first-page":"12256","DOI":"10.1109\/TITS.2024.3367925","article-title":"Efficient and security-enhanced certificateless aggregate signature-based authentication scheme with conditional privacy preservation for VANETs","volume":"25","author":"Yang","year":"2024","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111174_b78","first-page":"15028","article-title":"Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V","volume":"72","author":"Yu","year":"2023","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.compeleceng.2026.111174_b79","series-title":"Proc. ADCIS","first-page":"499","article-title":"Security in VANETs with insider attack resistance and signature aggregation","author":"Lode","year":"2024"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111174_b80","doi-asserted-by":"crossref","first-page":"3738","DOI":"10.1109\/TII.2023.3313527","article-title":"A provably secure lightweight authentication based on elliptic curve signcryption for vehicle-to-vehicle communication in VANETs","volume":"20","author":"Shao","year":"2024","journal-title":"IEEE Trans Ind Informatics"},{"key":"10.1016\/j.compeleceng.2026.111174_b81","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/s12083-025-02029-1","article-title":"A security enhanced certificateless aggregate signcryption scheme for VANETs","volume":"18","author":"Liu","year":"2025","journal-title":"Peer-To-Peer Netw Appl"},{"key":"10.1016\/j.compeleceng.2026.111174_b82","doi-asserted-by":"crossref","DOI":"10.1016\/j.vehcom.2024.100763","article-title":"DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks","volume":"47","author":"Guo","year":"2024","journal-title":"Veh Commun","ISSN":"https:\/\/id.crossref.org\/issn\/2214-2096","issn-type":"print"},{"key":"10.1016\/j.compeleceng.2026.111174_b83","series-title":"On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks","author":"Cao","year":"2025"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111174_b84","first-page":"51","article-title":"Authentication in VANETs with conditional privacy-preserving property using certificateless aggregate signature schemes","volume":"10","author":"Rastegari","year":"2024","journal-title":"Int J Math Sci Comput (IJMSC)"},{"key":"10.1016\/j.compeleceng.2026.111174_b85","doi-asserted-by":"crossref","first-page":"15605","DOI":"10.1109\/ACCESS.2022.3147595","article-title":"A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111174_b86","first-page":"124","article-title":"A secure and efficient certificateless aggregate signature authentication scheme with pseudonyms for VANETs","volume":"12","author":"Wu","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111174_b87","article-title":"Efficient lightweight anonymous authentication scheme with certificateless aggregation for VANETs","volume":"125","author":"Imam","year":"2025","journal-title":"Ad Hoc Netw"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111174_b88","doi-asserted-by":"crossref","first-page":"10052","DOI":"10.1109\/JIOT.2023.3236699","article-title":"An efficient identity authentication scheme with dynamic anonymity for VANETs","volume":"10","author":"Zhou","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111174_b89","doi-asserted-by":"crossref","first-page":"23663","DOI":"10.1038\/s41598-025-08656-1","article-title":"A lightweight certificateless aggregate signature scheme without pairing for VANETs","volume":"15","author":"Yue","year":"2025","journal-title":"Sci Rep"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002466?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002466?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:27:09Z","timestamp":1778603229000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":89,"alternative-id":["S0045790626002466"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111174","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A comprehensive review of ECC-based certificateless aggregate signature for Vehicular Ad-Hoc Networks (VANETs) and cryptanalysis of quantum-secure CLAS","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111174","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111174"}}