{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T05:42:56Z","timestamp":1771911776405,"version":"3.50.1"},"reference-count":29,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172307"],"award-info":[{"award-number":["62172307"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:p> There is a potential risk of privacy issues due to the disclosure of sensitive information about vehicles in Vehicular ad hoc networks (VANETs), including their real identities and driving trajectories. Anonymous authentication is an effective method to solve the above problems. Ring signature, a cryptographic primitive, offers the ability to create anonymous authentication schemes wherein the verifier can verify the signer\u2019s legitimacy without having knowledge of their actual identity. Researchers have proposed several schemes that aim to protect privacy and maintain anonymity using ring signatures. However, a major drawback of most of these schemes is the linear correlation between the length of the signature and the number of ring members. Our proposed solution involves the construction of a certificateless anonymous authentication scheme that utilizes ring signature with a significantly reduced signature size, which follows a logarithmic relationship with the number of ring members. Through our analysis and comparison, it can be concluded that the privacy information of vehicles is well protected in our scheme, and the communication cost is significantly reduced compared with the existing protocols. <\/jats:p>","DOI":"10.1142\/s0218126624500531","type":"journal-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T07:44:37Z","timestamp":1689925477000},"source":"Crossref","is-referenced-by-count":7,"title":["A Certificateless Anonymous Authentication Scheme for VANETs Based on Ring Signature"],"prefix":"10.1142","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0916-6340","authenticated-orcid":false,"given":"Jiabin","family":"Bao","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, P. R. China"},{"name":"Shanghai Technology Innovation Centre of Distributed, Privacy-Preserving Artificial Intelligence, Matrix Elements Technologies, Shanghai 201204, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1819-9332","authenticated-orcid":false,"given":"Min","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, P. R. China"},{"name":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250014, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7454-1802","authenticated-orcid":false,"given":"Yitao","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan Maritime Communication Research Institute, Wuhan 430205, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9958-3255","authenticated-orcid":false,"given":"Cong","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2145-9713","authenticated-orcid":false,"given":"Zijian","family":"Bao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2023,9,29]]},"reference":[{"key":"S0218126624500531BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"S0218126624500531BIB002","first-page":"7","volume":"7","author":"Hasrouny H.","year":"2017","journal-title":"Veh. Commun."},{"key":"S0218126624500531BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.246"},{"key":"S0218126624500531BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726769"},{"key":"S0218126624500531BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070773"},{"key":"S0218126624500531BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"S0218126624500531BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2997840"},{"key":"S0218126624500531BIB008","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6679882"},{"key":"S0218126624500531BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876126"},{"key":"S0218126624500531BIB010","doi-asserted-by":"publisher","DOI":"10.3390\/sym12122009"},{"key":"S0218126624500531BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977048"},{"key":"S0218126624500531BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2010.5520765"},{"key":"S0218126624500531BIB014","first-page":"867","volume-title":"2013 IEEE Global Communications Conf. (GLOBECOM)","author":"Pan H.","year":"2013"},{"key":"S0218126624500531BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7502-7_18"},{"key":"S0218126624500531BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3095192"},{"key":"S0218126624500531BIB017","first-page":"135","volume":"17","author":"Zeng S.","year":"2015","journal-title":"Int. J. Netw. Secur."},{"key":"S0218126624500531BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/VNC48660.2019.9062800"},{"key":"S0218126624500531BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07396-x"},{"key":"S0218126624500531BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037252"},{"key":"S0218126624500531BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"S0218126624500531BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_13"},{"key":"S0218126624500531BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_5"},{"key":"S0218126624500531BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_10"},{"key":"S0218126624500531BIB025","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2405853"},{"key":"S0218126624500531BIB027","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3008781"},{"key":"S0218126624500531BIB028","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC.2018.8577477"},{"key":"S0218126624500531BIB029","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101636"},{"key":"S0218126624500531BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019304"},{"key":"S0218126624500531BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126624500531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T07:44:10Z","timestamp":1709883850000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126624500531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,29]]},"references-count":29,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["10.1142\/S0218126624500531"],"URL":"https:\/\/doi.org\/10.1142\/s0218126624500531","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"value":"0218-1266","type":"print"},{"value":"1793-6454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,29]]},"article-number":"2450053"}}