{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T10:27:48Z","timestamp":1776162468864,"version":"3.50.1"},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100013101","name":"Scientific Research Plan Projects of Shaanxi Education Department","doi-asserted-by":"publisher","award":["23JP058"],"award-info":[{"award-number":["23JP058"]}],"id":[{"id":"10.13039\/501100013101","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009103","name":"Education Department of Shaanxi Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002288"],"award-info":[{"award-number":["62002288"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372370"],"award-info":[{"award-number":["62372370"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012270","name":"Shaanxi Key Science and Technology Innovation Team Project","doi-asserted-by":"publisher","award":["25JP178"],"award-info":[{"award-number":["25JP178"]}],"id":[{"id":"10.13039\/501100012270","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012270","name":"Shaanxi Key Science and Technology Innovation Team Project","doi-asserted-by":"publisher","award":["23JP160"],"award-info":[{"award-number":["23JP160"]}],"id":[{"id":"10.13039\/501100012270","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012270","name":"Shaanxi Key Science and Technology Innovation Team Project","doi-asserted-by":"publisher","award":["24JP180"],"award-info":[{"award-number":["24JP180"]}],"id":[{"id":"10.13039\/501100012270","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.sysarc.2026.103772","type":"journal-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T08:23:47Z","timestamp":1772699027000},"page":"103772","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A lattice-based linkable authentication scheme for privacy-preserving vehicular systems"],"prefix":"10.1016","volume":"175","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9923-068X","authenticated-orcid":false,"given":"Wen","family":"Gao","sequence":"first","affiliation":[]},{"given":"Kuan-he","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Hao-yuan","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Si-meng","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiao-li","family":"Dong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.sysarc.2026.103772_b1","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.1109\/JIOT.2017.2690902","article-title":"Internet of vehicles: architecture, protocols, and security","volume":"5","author":"Contreras-Castillo","year":"2017","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.sysarc.2026.103772_b2","doi-asserted-by":"crossref","first-page":"16563","DOI":"10.1007\/s11042-022-12386-1","article-title":"Internet of vehicles: concept, process, security aspects and solutions","volume":"81","author":"El Madani","year":"2022","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.sysarc.2026.103772_b3","doi-asserted-by":"crossref","first-page":"153969","DOI":"10.1109\/ACCESS.2019.2948972","article-title":"Identity-based linkable ring signature scheme","volume":"7","author":"Deng","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.sysarc.2026.103772_b4","series-title":"2019 IEEE Vehicular Networking Conference","first-page":"1","article-title":"IBRS: an efficient identity-based batch verification scheme for vanets based on ring signature","author":"Liu","year":"2019"},{"issue":"5","key":"10.1016\/j.sysarc.2026.103772_b5","first-page":"2559","article-title":"Identity verifiable ring signature scheme for privacy protection in blockchain","volume":"15","author":"Devidas","year":"2023","journal-title":"Int. J. Inf. Technol."},{"issue":"8","key":"10.1016\/j.sysarc.2026.103772_b6","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.1109\/TII.2018.2794991","article-title":"Provably secure and lightweight certificateless signature scheme for iIoT environments","volume":"14","author":"Karati","year":"2018","journal-title":"IEEE Trans. Ind. Informat."},{"key":"10.1016\/j.sysarc.2026.103772_b7","doi-asserted-by":"crossref","first-page":"54641","DOI":"10.1109\/ACCESS.2020.2981360","article-title":"Certificateless linkable ring signature scheme","volume":"8","author":"Deng","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.sysarc.2026.103772_b8","doi-asserted-by":"crossref","first-page":"102669","DOI":"10.1016\/j.jisa.2020.102669","article-title":"A certificateless ring signature scheme with batch verification for applications in VANET","volume":"55","author":"Bouakkaz","year":"2020","journal-title":"Journal of Information Security and Applications","ISSN":"https:\/\/id.crossref.org\/issn\/2214-2126","issn-type":"print"},{"issue":"2","key":"10.1016\/j.sysarc.2026.103772_b9","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1007\/s11277-022-09809-5","article-title":"A lightweight certificateless aggregate ring signature scheme for privacy protection in smart grids","volume":"126","author":"Wang","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.sysarc.2026.103772_b10","series-title":"Annual International Cryptology Conference","first-page":"251","article-title":"DualRing: generic construction of ring signatures with efficient instantiations","author":"Yuen","year":"2021"},{"key":"10.1016\/j.sysarc.2026.103772_b11","series-title":"Advances in Cryptology\u2014ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9\u201313, 2001 Proceedings 7","first-page":"552","article-title":"How to leak a secret","author":"Rivest","year":"2001"},{"issue":"1","key":"10.1016\/j.sysarc.2026.103772_b12","article-title":"Identity-based linkable ring signature on NTRU lattice","volume":"2021","author":"Tang","year":"2021","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"10.1016\/j.sysarc.2026.103772_b13","first-page":"232","article-title":"Identity-based linkable ring signature on lattice","volume":"8","author":"Tang","year":"2021","journal-title":"J. Cryptologic Res."},{"key":"10.1016\/j.sysarc.2026.103772_b14","first-page":"1","article-title":"Identity-based linkable ring signature from lattice in random oracle model","author":"Xie","year":"2023","journal-title":"J. Front. Comput. Sci. Technol."},{"key":"10.1016\/j.sysarc.2026.103772_b15","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"700","article-title":"Trapdoors for lattices: Simpler, tighter, faster, smaller","author":"Micciancio","year":"2012"},{"key":"10.1016\/j.sysarc.2026.103772_b16","series-title":"Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19\u201323, 2021, Proceedings, Part II 7","first-page":"265","article-title":"A post-quantum certificateless ring signature scheme for privacy-preserving of blockchain sharing economy","author":"Zhang","year":"2021"},{"issue":"28","key":"10.1016\/j.sysarc.2026.103772_b17","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.7385","article-title":"A certificateless ring signature scheme based on lattice","volume":"34","author":"Dong","year":"2022","journal-title":"Concurr. Comput.: Pr. Exp."},{"key":"10.1016\/j.sysarc.2026.103772_b18","article-title":"LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET","volume":"50","author":"Xu","year":"2024","journal-title":"Veh. Commun."},{"issue":"1","key":"10.1016\/j.sysarc.2026.103772_b19","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1109\/TVT.2023.3305037","article-title":"Larrs: Lattice-based revocable ring signature and its application for VANETs","volume":"73","author":"Wen","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"10.1016\/j.sysarc.2026.103772_b20","doi-asserted-by":"crossref","first-page":"48","DOI":"10.3390\/cryptography8040048","article-title":"Post-quantum secure ID-based (threshold) linkable dual-ring signature and its application in blockchain transactions","volume":"8","author":"Gao","year":"2024","journal-title":"Cryptography"},{"issue":"5","key":"10.1016\/j.sysarc.2026.103772_b21","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1145\/1089023.1089025","article-title":"Lattice problems in NP \u2229 conp","volume":"52","author":"Aharonov","year":"2005","journal-title":"J. ACM"},{"issue":"1","key":"10.1016\/j.sysarc.2026.103772_b22","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1137\/S0097539705447360","article-title":"Worst-case to average-case reductions based on Gaussian measures","volume":"37","author":"Micciancio","year":"2007","journal-title":"SIAM J. Comput."},{"issue":"6","key":"10.1016\/j.sysarc.2026.103772_b23","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1145\/1039488.1039490","article-title":"New lattice-based cryptographic constructions","volume":"51","author":"Regev","year":"2004","journal-title":"J. ACM"},{"key":"10.1016\/j.sysarc.2026.103772_b24","series-title":"Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing","first-page":"99","article-title":"Generating hard instances of lattice problems","author":"Ajtai","year":"1996"},{"key":"10.1016\/j.sysarc.2026.103772_b25","series-title":"Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3","first-page":"145","article-title":"Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices","author":"Peikert","year":"2006"},{"key":"10.1016\/j.sysarc.2026.103772_b26","series-title":"International Conference on the Theory and Application of Cryptology and Information Security","first-page":"452","article-title":"Certificateless public key cryptography","author":"Al-Riyami","year":"2003"},{"key":"10.1016\/j.sysarc.2026.103772_b27","series-title":"International Conference on Cryptology in India","first-page":"266","article-title":"Forking lemmas for ring signature schemes","author":"Herranz","year":"2003"},{"key":"10.1016\/j.sysarc.2026.103772_b28","doi-asserted-by":"crossref","unstructured":"C. Gentry, C. Peikert, V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions, in: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, 2008, pp. 197\u2013206.","DOI":"10.1145\/1374376.1374407"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762126000901?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762126000901?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T09:34:39Z","timestamp":1776159279000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762126000901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":28,"alternative-id":["S1383762126000901"],"URL":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103772","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A lattice-based linkable authentication scheme for privacy-preserving vehicular systems","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems Architecture","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103772","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103772"}}