{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:28:04Z","timestamp":1775312884041,"version":"3.50.1"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172436"],"award-info":[{"award-number":["62172436"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1016\/j.sysarc.2025.103345","type":"journal-article","created":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T17:30:43Z","timestamp":1737653443000},"page":"103345","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["A hash-based post-quantum ring signature scheme for the Internet of Vehicles"],"prefix":"10.1016","volume":"160","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8188-2820","authenticated-orcid":false,"given":"Shuanggen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiayi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zixuan","family":"Yan","sequence":"additional","affiliation":[]},{"given":"He","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yurui","family":"Cao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sysarc.2025.103345_b1","article-title":"Car production: Number of cars produced worldwide","author":"Wanger","year":"2020","journal-title":"Statista"},{"key":"10.1016\/j.sysarc.2025.103345_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.jtrangeo.2024.103817","article-title":"Car harm: A global review of automobility\u2019s harm to people and the environment","volume":"115","author":"Miner","year":"2024","journal-title":"J. Transp. Geogr."},{"issue":"5","key":"10.1016\/j.sysarc.2025.103345_b3","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.1109\/JIOT.2017.2690902","article-title":"Internet of vehicles: Architecture, protocols, and security","volume":"5","author":"Contreras-Castillo","year":"2018","journal-title":"IEEE Internet Things J."},{"issue":"1818","key":"10.1016\/j.sysarc.2025.103345_b4","first-page":"97","article-title":"Quantum theory, the Church\u2013Turing principle and the universal quantum computer","volume":"400","author":"Deutsch","year":"1985","journal-title":"Proc. R. Soc. A"},{"key":"10.1016\/j.sysarc.2025.103345_b5","series-title":"2024 5th International Conference on Mobile Computing and Sustainable Informatics","first-page":"132","article-title":"A survey on NIST 3 rd round post quantum digital signature algorithms","author":"Shajahan","year":"2024"},{"issue":"208","key":"10.1016\/j.sysarc.2025.103345_b6","first-page":"208","article-title":"Recommendation for stateful hash-based signature schemes","volume":"800","author":"Cooper","year":"2020","journal-title":"NIST Spec. Publ."},{"issue":"12","key":"10.1016\/j.sysarc.2025.103345_b7","doi-asserted-by":"crossref","first-page":"16563","DOI":"10.1007\/s11042-022-12386-1","article-title":"Internet of vehicles: concept, process, security aspects and solutions","volume":"81","author":"El Madani","year":"2022","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.sysarc.2025.103345_b8","series-title":"2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications","first-page":"1093","article-title":"Energy efficient merkle trees for blockchains","author":"Castellon","year":"2021"},{"key":"10.1016\/j.sysarc.2025.103345_b9","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein, Andreas H\u00fclsing, Stefan K\u00f6lbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe, The SPHINCS+ signature framework, in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 2129\u20132146.","DOI":"10.1145\/3319535.3363229"},{"key":"10.1016\/j.sysarc.2025.103345_b10","series-title":"SPHINCS-\u03b1: A compact stateless hash-based signature scheme","author":"Zhang","year":"2022"},{"key":"10.1016\/j.sysarc.2025.103345_b11","series-title":"SPHINCS+ C: Compressing SPHINCS+ with (almost) no cost","author":"Kudinov","year":"2022"},{"issue":"1","key":"10.1016\/j.sysarc.2025.103345_b12","first-page":"46","article-title":"SM3-based post-quantum digital signature schemes","volume":"10","author":"Siwei","year":"2023","journal-title":"J. Cryptologic Res."},{"key":"10.1016\/j.sysarc.2025.103345_b13","series-title":"International Conference on the Theory and Application of Cryptology and Information Security","first-page":"3","article-title":"Recovering the tight security proof of SPHINCS+","author":"H\u00fclsing","year":"2022"},{"key":"10.1016\/j.sysarc.2025.103345_b14","doi-asserted-by":"crossref","unstructured":"Andreas H\u00fclsing, Denis Butin, Stefan Gazdag, Joost Rijneveld, Aziz Mohaisen, XMSS: Extended Merkle Signature Scheme, Technical Report, 2018.","DOI":"10.17487\/RFC8391"},{"key":"10.1016\/j.sysarc.2025.103345_b15","series-title":"A configurable hardware implementation of XMSS","author":"Thoma","year":"2021"},{"key":"10.1016\/j.sysarc.2025.103345_b16","series-title":"XMSS-SM3 and MT-XMSS-SM3: Instantiating extended Merkle signature schemes with SM3","author":"Sun","year":"2022"},{"key":"10.1016\/j.sysarc.2025.103345_b17","series-title":"Progress in Cryptology\u2013AFRICACRYPT 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings 6","first-page":"173","article-title":"W-OTS+\u2013shorter signatures for hash-based signature schemes","author":"H\u00fclsing","year":"2013"},{"key":"10.1016\/j.sysarc.2025.103345_b18","series-title":"Annual International Cryptology Conference","first-page":"455","article-title":"Revisiting the constant-sum winternitz one-time signature with applications to SPHINCS+ and XMSS","author":"Zhang","year":"2023"},{"issue":"5","key":"10.1016\/j.sysarc.2025.103345_b19","article-title":"Research progress and prospects of ring signature technology.","volume":"17","author":"Jia","year":"2023","journal-title":"J. Front. Comput. Sci. Technol."},{"key":"10.1016\/j.sysarc.2025.103345_b20","series-title":"IACR International Conference on Public-Key Cryptography","first-page":"407","article-title":"A note on the post-quantum security of (ring) signatures","author":"Chatterjee","year":"2022"},{"key":"10.1016\/j.sysarc.2025.103345_b21","series-title":"European Symposium on Research in Computer Security","first-page":"435","article-title":"Efficient linkable ring signatures: new framework and post-quantum instantiations","author":"Xue","year":"2024"},{"key":"10.1016\/j.sysarc.2025.103345_b22","series-title":"Public-Key Cryptography\u2013PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4\u20137, 2020, Proceedings, Part II 23","first-page":"423","article-title":"Threshold ring signatures: new definitions and post-quantum security","author":"Haque","year":"2020"},{"key":"10.1016\/j.sysarc.2025.103345_b23","series-title":"International Conference on Applied Cryptography and Network Security","first-page":"892","article-title":"Post-quantum id-based ring signatures from symmetric-key primitives","author":"Buser","year":"2022"},{"key":"10.1016\/j.sysarc.2025.103345_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2022.102786","article-title":"Linked or unlinked: A systematic review of linkable ring signature schemes","volume":"134","author":"Odoom","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103345_b25","article-title":"Post-quantum anonymous, traceable and linkable authentication scheme based on blockchain for intelligent vehicular transportation systems","author":"Xu","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.sysarc.2025.103345_b26","series-title":"2022 IEEE 7th International Conference on Intelligent Transportation Engineering","first-page":"586","article-title":"Blockchain application on the internet of vehicles (iov)","author":"Aung","year":"2022"},{"issue":"3","key":"10.1016\/j.sysarc.2025.103345_b27","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1109\/TETC.2020.3033532","article-title":"Blockchain-based trust management for internet of vehicles","volume":"9","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.sysarc.2025.103345_b28","series-title":"2019 International Conference on Intelligent Computing and Its Emerging Applications","first-page":"5","article-title":"Implementing blockchain technology in the internet of vehicle (IoV)","author":"Labrador","year":"2019"},{"key":"10.1016\/j.sysarc.2025.103345_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102935","article-title":"An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity","volume":"142","author":"Liu","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103345_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.103029","article-title":"A distributed message authentication scheme with reputation mechanism for internet of vehicles","volume":"145","author":"Feng","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103345_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102937","article-title":"Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system","volume":"142","author":"Thapliyal","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103345_b32","series-title":"2022 International Conference on IoT and Blockchain Technology","first-page":"1","article-title":"Post quantum digital signature change in iota to reduce latency in internet of vehicles (iov) environments","author":"Verma","year":"2022"},{"issue":"5","key":"10.1016\/j.sysarc.2025.103345_b33","first-page":"980","article-title":"Privacy protection of internet of vehicles based on lattice-based ring signature","volume":"42","author":"Yongquan","year":"2019","journal-title":"Chinese J. Comput."},{"key":"10.1016\/j.sysarc.2025.103345_b34","series-title":"2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications","first-page":"1093","article-title":"Energy efficient merkle trees for blockchains","author":"Castellon","year":"2021"},{"key":"10.1016\/j.sysarc.2025.103345_b35","series-title":"Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings 9","first-page":"419","article-title":"Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives","author":"Derler","year":"2018"},{"key":"10.1016\/j.sysarc.2025.103345_b36","series-title":"Australasian Conference on Information Security and Privacy","first-page":"124","article-title":"DualRing-PRF: Post-quantum (linkable) ring signatures from Legendre and power residue PRFs","author":"Zhang","year":"2024"},{"issue":"208","key":"10.1016\/j.sysarc.2025.103345_b37","first-page":"208","article-title":"Recommendation for stateful hash-based signature schemes","volume":"800","author":"Cooper","year":"2020","journal-title":"NIST Spec. Publ."},{"key":"10.1016\/j.sysarc.2025.103345_b38","series-title":"Conference on the Theory and Application of Cryptology","first-page":"218","article-title":"A certified digital signature","author":"Merkle","year":"1989"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762125000177?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762125000177?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T10:17:34Z","timestamp":1740565054000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762125000177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":38,"alternative-id":["S1383762125000177"],"URL":"https:\/\/doi.org\/10.1016\/j.sysarc.2025.103345","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A hash-based post-quantum ring signature scheme for the Internet of Vehicles","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems Architecture","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sysarc.2025.103345","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103345"}}