{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:55:27Z","timestamp":1773154527322,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T00:00:00Z","timestamp":1704758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62141220, 61972253, U1908212, 72061127001, 62172276, 61972254"],"award-info":[{"award-number":["62141220, 61972253, U1908212, 72061127001, 62172276, 61972254"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Program for Professor of Special Appointment"},{"name":"Shanghai Institutions of Higher Learning, Open Research Projects of Zhejiang Lab","award":["2022NL0AB01"],"award-info":[{"award-number":["2022NL0AB01"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,3,31]]},"abstract":"<jats:p>\n            Internet of Vehicles (IoV) has become an indispensable technology to bridge vehicles, persons, and infrastructures and is promising to make our cities smarter and more connected. It enables vehicles to exchange vehicular data (e.g., GPS, sensors, and brakes) with different entities nearby. However, sharing these vehicular data over the air raises concerns about identity privacy leakage. Besides, the centralized architecture adopted in existing IoV systems is fragile to single point-of-failure and malicious attacks. With the emergence of blockchain technology, there is the chance to solve these problems due to its features of being tamper-proof, traceability, and decentralization. In this article, we propose a privacy-preserving vehicular data sharing framework based on blockchain. In particular, we design an anonymous and auditable data sharing scheme using Zero-Knowledge Proof (ZKP) technology so as to protect the identity privacy of vehicles while preserving the vehicular data auditability for Trusted Authorities (TAs). In response to high mobility of vehicles, we design an efficient multi-sharding protocol to decrease blockchain communication costs without compromising the blockchain security. We implement a prototype of our framework and conduct extensive experiments and simulations on it. Evaluation and analysis results indicate that our framework can not only strengthen system security and data privacy but also reduce communication complexity by\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(O(\\frac{n\\sqrt {m}}{m^2})\\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            times compared to existing sharding protocols.\n          <\/jats:p>","DOI":"10.1145\/3579035","type":"journal-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T12:57:00Z","timestamp":1672837020000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1306-9088","authenticated-orcid":false,"given":"Junqin","family":"Huang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9266-3044","authenticated-orcid":false,"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2276-6915","authenticated-orcid":false,"given":"Jingwei","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6934-1685","authenticated-orcid":false,"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1770-3605","authenticated-orcid":false,"given":"Jianhua","family":"Gao","sequence":"additional","affiliation":[{"name":"Shanghai Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8393-6469","authenticated-orcid":false,"given":"Gang","family":"Huang","sequence":"additional","affiliation":[{"name":"Zhejiang Lab, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-0533","authenticated-orcid":false,"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"King Saud University, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_1_2_2","volume-title":"Network and Distributed System Security Symposium (NDSS\u201918)","author":"Al-Bassam Mustafa","year":"2018","unstructured":"Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, and George Danezis. 2018. Chainspace: A sharded smart contracts platform. In Network and Distributed System Security Symposium (NDSS\u201918). ISOC."},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/SP.2014.36","volume-title":"IEEE Symposium on Security and Privacy (S&P\u201914)","author":"Sasson Eli Ben","year":"2014","unstructured":"Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from Bitcoin. In IEEE Symposium on Security and Privacy (S&P\u201914). 459\u2013474."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322093"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2946611"},{"key":"e_1_3_1_8_2","volume-title":"Financial Cryptography and Data Security (FC\u201916)","year":"2016","unstructured":"Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin G\u00fcn Sirer, Dawn Song, and Roger Wattenhofer. 2016. On scaling decentralized blockchains. In Financial Cryptography and Data Security (FC\u201916). Springer."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013631"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3037804"},{"issue":"2","key":"e_1_3_1_12_2","first-page":"44","article-title":"A survey of state-of-the-art on blockchains: Theories, modelings, and tools","volume":"54","author":"Huang Huawei","year":"2021","unstructured":"Huawei Huang, Wei Kong, Sicong Zhou, Zibin Zheng, and Song Guo. 2021. A survey of state-of-the-art on blockchains: Theories, modelings, and tools. ACM Comput. Surv. 54, 2, Article 44 (March 2021), 42 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.907273"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236266"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874398"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842165"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00061"},{"key":"e_1_3_1_18_2","first-page":"463","volume-title":"USENIX Security Symposium (Security\u201918)","author":"Kappos George","year":"2018","unstructured":"George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn. 2018. An empirical analysis of anonymity in Zcash. In USENIX Security Symposium (Security\u201918). USENIX Association, Baltimore, MD, 463\u2013477."},{"key":"e_1_3_1_19_2","volume-title":"IEEE Symposium on Security and Privacy (S&P\u201918)","author":"Kokoris-Kogias Eleftherios","year":"2018","unstructured":"Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, and Bryan Ford. 2018. OmniLedger: A secure, scale-out, decentralized ledger via sharding. In IEEE Symposium on Security and Privacy (S&P\u201918)."},{"key":"e_1_3_1_20_2","first-page":"839","volume-title":"IEEE Symposium on Security and Privacy (S&P\u201916)","author":"Kosba Ahmed","year":"2016","unstructured":"Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy (S&P\u201916). 839\u2013858."},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"e_1_3_1_23_2","first-page":"783","volume-title":"USENIX Security Symposium (Security\u201919)","author":"Matetic Sinisa","year":"2019","unstructured":"Sinisa Matetic, Karl W\u00fcst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. 2019. BITE: Bitcoin lightweight client privacy using trusted execution. In USENIX Security Symposium (Security\u201919). USENIX Association, Santa Clara, CA, 783\u2013800."},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/SP.2013.34","volume-title":"IEEE Symposium on Security and Privacy (S&P\u201913)","author":"Miers Ian","year":"2013","unstructured":"Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. 2013. Zerocoin: Anonymous distributed E-Cash from Bitcoin. In IEEE Symposium on Security and Privacy (S&P\u201913). 397\u2013411."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452825"},{"key":"e_1_3_1_26_2","article-title":"Ring Signature Confidential Transactions for Monero","author":"Noether Shen","year":"2015","unstructured":"Shen Noether. 2015. Ring Signature Confidential Transactions for Monero. Cryptology ePrint Archive, Paper 2015\/1098. (2015). https:\/\/eprint.iacr.org\/2015\/1098.","journal-title":"Cryptology ePrint Archive, Paper 2015\/1098"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340723"},{"key":"e_1_3_1_28_2","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable Off-chain Instant Payments. (2016). https:\/\/www.bitcoinlightning.com\/wp-content\/uploads\/2018\/03\/lightning-network-paper.pdf."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102471"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2980255"},{"key":"e_1_3_1_31_2","first-page":"456","volume-title":"European Symposium on Research in Computer Security (ESORICS\u201917)","author":"Sun Shi-Feng","year":"2017","unstructured":"Shi-Feng Sun, Man Ho Au, Joseph K. Liu, and Tsz Hon Yuen. 2017. RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In European Symposium on Research in Computer Security (ESORICS\u201917). Springer International Publishing, Cham, 456\u2013474."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2011.146"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510736"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457248"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3074974"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_1_38_2","volume-title":"IEEE International Parallel and Distributed Processing Symposium (IPDPS\u201920)","author":"Zhang M.","year":"2020","unstructured":"M. Zhang, J. Li, Z. Chen, H. Chen, and X. Deng. 2020. CycLedger: A scalable and secure parallel protocol for distributed ledger via sharding. In IEEE International Parallel and Distributed Processing Symposium (IPDPS\u201920)."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:38:05Z","timestamp":1750178285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,9]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3,31]]}},"alternative-id":["10.1145\/3579035"],"URL":"https:\/\/doi.org\/10.1145\/3579035","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,9]]},"assertion":[{"value":"2022-08-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}