{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:57:01Z","timestamp":1755838621483,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402199","U1636209","61472165","61373158"],"award-info":[{"award-number":["61402199","U1636209","61472165","61373158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Nature Science Funds of Guangdong","award":["2015A030310017"],"award-info":[{"award-number":["2015A030310017"]}]},{"name":"Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence","award":["2014B090904067"],"award-info":[{"award-number":["2014B090904067"]}]},{"name":"Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve","award":["2016B010124009"],"award-info":[{"award-number":["2016B010124009"]}]},{"name":"Zhuhai Top Discipline\u2013Information Security, and Guangzhou Key Laboratory of Data Security and Privacy Preserving, Guangdong Key Laboratory of Data Security and Privacy Preserving"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2737957","type":"journal-article","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T18:10:15Z","timestamp":1503339015000},"page":"16314-16323","source":"Crossref","is-referenced-by-count":17,"title":["HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4073-6349","authenticated-orcid":false,"given":"Zhuo","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yang","family":"Yanjiang","sequence":"additional","affiliation":[]},{"given":"Yongdong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Specification of Implementation for Integrated Circuit(s) Cards","year":"2005","key":"ref33"},{"journal-title":"Identification Cards Contactless Integrated Circuit(S) Cards Vicinity Cards","year":"2000","key":"ref32"},{"journal-title":"Identification Cards Contactless Integrated Circuit Cards Proximity Cards","year":"2001","key":"ref31"},{"journal-title":"Information Technology Telecommunications and Information Exchange Between Systems Near Field Communication Interface and Protocol 2","year":"2005","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2014.2323421"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21236\/ADA457095"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517970"},{"key":"ref14","first-page":"51","article-title":"MVSec: Secure and easy-to-use pairing of mobile devices with vehicles","author":"han","year":"2014","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435382"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5220\/0006280601730180"},{"journal-title":"A Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access Control","year":"2017","author":"elkins","key":"ref17"},{"key":"ref18","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Crypto"},{"key":"ref19","first-page":"111","article-title":"Public-key systems based on the difficulty of tampering","author":"desmedt","year":"1987","journal-title":"Proc Crypto"},{"key":"ref28","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"2001","journal-title":"Advances in CryptologyCRYPTO"},{"journal-title":"car2go","year":"2017","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","article-title":"A one round protocol for tripartite Diffie-Hellman","author":"joux","year":"2000","journal-title":"Algorithmic Number Theory First International Symposium"},{"journal-title":"Drive On","year":"2017","key":"ref3"},{"journal-title":"RelayRides","year":"2017","key":"ref6"},{"journal-title":"Information Technology Telecommunications and Information Exchange Between Systems Near Field Communication Interface and Protocol 1","year":"2004","key":"ref29"},{"journal-title":"Zipcar","year":"2017","key":"ref5"},{"journal-title":"Joint News Release by the Land Transport Authority (LTA) and EDB&#x2014;Electric Vehicles (EVS) in Every HDB Town by 2020","year":"2017","key":"ref8"},{"journal-title":"Car Club","year":"2017","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2015.10.006"},{"journal-title":"Is Near Field Communication (NFC) Finally Coming to Cars?","year":"2017","key":"ref9"},{"key":"ref1","article-title":"TCRP report 108: Car-Sharing: Where and how it succeeds","volume":"108","author":"millard-ball","year":"2005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF00129771"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.605586"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/49.17709"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_16"},{"key":"ref25","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"fiat","year":"1987","journal-title":"Proc Crypto"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08013676.pdf?arnumber=8013676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:55Z","timestamp":1642004995000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8013676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2737957","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}