{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:04Z","timestamp":1755225184475,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","funder":[{"name":"HK RGC GRF","award":["PolyU 15226224"],"award-info":[{"award-number":["PolyU 15226224"]}]},{"name":"NSFC","award":["62372106"],"award-info":[{"award-number":["62372106"]}]},{"name":"HK RGC GRF","award":["PolyU 15226224"],"award-info":[{"award-number":["PolyU 15226224"]}]},{"name":"NSFC","award":["62372106"],"award-info":[{"award-number":["62372106"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3736212","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"651-664","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["PSP: A Privacy-Preserving Self-certify Pseudonym Protocol for V2X"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3498-3269","authenticated-orcid":false,"given":"Xuyuan","family":"Cai","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0797-5831","authenticated-orcid":false,"given":"Rui","family":"Song","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5118-3570","authenticated-orcid":false,"given":"Bin","family":"Xie","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8348-6277","authenticated-orcid":false,"given":"Qingjun","family":"Xiao","sequence":"additional","affiliation":[{"name":"Southeast University of China, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4223-8220","authenticated-orcid":false,"given":"Bin","family":"Xiao","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Man\u00a0Ho Au Joseph\u00a0K Liu Willy Susilo and Tsz\u00a0Hon Yuen. 2013. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Theoretical Computer Science 469 (2013) 1\u201314.","DOI":"10.1016\/j.tcs.2012.10.031"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_8"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700631"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_3_2_6_2","first-page":"274","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques","author":"Benaloh Josh","year":"1993","unstructured":"Josh Benaloh and Michael De\u00a0Mare. 1993. One-way accumulators: A decentralized alternative to digital signatures. In Workshop on the Theory and Application of Cryptographic Techniques. Springer, 274\u2013285."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Abdelwahab Boualouache and Thomas Engel. 2023. A survey on machine learning-based misbehavior detection systems for 5g and beyond vehicular networks. IEEE Communications Surveys & Tutorials 25 2 (2023) 1128\u20131172.","DOI":"10.1109\/COMST.2023.3236448"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_31"},{"key":"e_1_3_3_2_10_2","unstructured":"Sean Bowe. 2017. BLS12-381: New zk-SNARK elliptic curve construction. Zcash Company blog URL: https:\/\/z. cash\/blog\/new-snark-curve 22 (2017)."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_22"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_12"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45572-3_1"},{"key":"e_1_3_3_2_14_2","unstructured":"Jan Camenisch and Markus Stadler. 1997. Proof systems for general statements about discrete logarithms. Technical Report\/ETH Zurich Department of Computer Science 260 (1997)."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_5"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"David Chaum. 1985. Security without identification: Transaction systems to make big brother obsolete. Commun. ACM 28 10 (1985) 1030\u20131044.","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Eduardo\u00a0Lopes Cominetti Marcos Vinicius\u00a0M. Silva Marcos\u00a0A. Simplicio Harsh Kupwade\u00a0Patil and Jefferson\u00a0E. Ricardini. 2024. Faster verification of V2X basic safety messages via Message Chaining. Veh. Commun. 44 C (March 2024) 11\u00a0pages. 10.1016\/j.vehcom.2023.100662","DOI":"10.1016\/j.vehcom.2023.100662"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"e_1_3_3_2_19_2","first-page":"445","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Du Changlai","year":"2023","unstructured":"Changlai Du, Hexuan Yu, Yang Xiao, Y\u00a0Thomas Hou, Angelos\u00a0D Keromytis, and Wenjing Lou. 2023. UCBlocker: Unwanted call blocking using anonymous authentication. In 32nd USENIX Security Symposium (USENIX Security 23). 445\u2013462."},{"key":"e_1_3_3_2_20_2","volume-title":"Intelligent Transport Systems (ITS); Security; Security header and certificate formats","year":"2021","unstructured":"ETSI. 2021. Intelligent Transport Systems (ITS); Security; Security header and certificate formats. Technical Specification TS 103 097 V2.1.1. European Telecommunications Standards Institute (ETSI). https:\/\/www.etsi.org\/deliver\/etsi_ts\/103000_103099\/103097\/02.01.01_60\/ts_103097v020101p.pdf"},{"key":"e_1_3_3_2_21_2","unstructured":"TS ETSI. 2012. 102 940: Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management. Technical specification European Telecommunications Standards Institute (2012) 29."},{"key":"e_1_3_3_2_22_2","first-page":"186","volume-title":"Conference on the theory and application of cryptographic techniques","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Conference on the theory and application of cryptographic techniques. Springer, 186\u2013194."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"AI Gonz\u00e1lez-Tablas Almudena Alcaide Jos\u00e9\u00a0Mar\u00eda de Fuentes and Jos\u00e9 Montero. 2013. Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations. Ad hoc networks 11 8 (2013) 2693\u20132709.","DOI":"10.1016\/j.adhoc.2013.05.008"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761300"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Sohan Gyawali Yi Qian and Rose\u00a0Qingyang Hu. 2020. Machine learning and reputation based misbehavior detection in vehicular communication networks. IEEE Transactions on Vehicular Technology 69 8 (2020) 8871\u20138885.","DOI":"10.1109\/TVT.2020.2996620"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Zohaib Hassan Amjad Mehmood Carsten Maple Muhammad\u00a0Altaf Khan and Abdulaziz Aldegheishem. 2020. Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access 8 (2020) 199618\u2013199628.","DOI":"10.1109\/ACCESS.2020.3034327"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00036"},{"key":"e_1_3_3_2_28_2","unstructured":"IEEE Standards Association. 2016. IEEE Standard for Wireless Access in Vehicular Environments\u2014Security Services for Applications and Management Messages. 240\u00a0pages. https:\/\/standards.ieee.org\/ieee\/1609.2\/6038\/"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245328"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Xuehan Li Tao Jing Ruinian Li Hui Li Xiaoxuan Wang and Dequan Shen. 2022. BDRA: Blockchain and decentralized identifiers assisted secure registration and authentication for VANETs. IEEE Internet of Things Journal 10 14 (2022) 12140\u201312155.","DOI":"10.1109\/JIOT.2022.3164147"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46513-8_14"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00038"},{"key":"e_1_3_3_2_34_2","unstructured":"MarketsandMarkets. 2024. Automotive V2X Market by Connectivity (DSRC and C-V2X) Communication (V2V V2I V2P V2G V2C) Vehicle Type (Passenger Cars & Commercial Vehicles) Propulsion Offering (Hardware and Software) Unit Technology and Region - Global Forecast to 2030. https:\/\/www.marketsandmarkets.com\/Market-Reports\/automotive-vehicle-to-everything-v2x-market-90013236.html Accessed: 2025-01-19."},{"key":"e_1_3_3_2_35_2","first-page":"369","volume-title":"Conference on the theory and application of cryptographic techniques","author":"Merkle Ralph\u00a0C","year":"1987","unstructured":"Ralph\u00a0C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques. Springer, 369\u2013378."},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Panagiotis Papadimitratos Levente Buttyan Tam\u00e1s Holczer Elmar Schoch Julien Freudiger Maxim Raya Zhendong Ma Frank Kargl Antonio Kung and Jean-Pierre Hubaux. 2008. Secure vehicular communication systems: design and architecture. IEEE Communications magazine 46 11 (2008) 100\u2013109.","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7589-5.ch005"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179430"},{"key":"e_1_3_3_2_40_2","volume-title":"Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS\u201924)","author":"Scopelliti Gianluca","year":"2023","unstructured":"Gianluca Scopelliti, Christoph Baumann, Fritz Alder, Eddy Truyen, and Jan\u00a0Tobias M\u00fchlberg. 2023. Efficient and timely revocation of v2x credentials. In Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS\u201924). Internet Society."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_32"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30589-4_24"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00029"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_31"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3532105.3535027"},{"key":"e_1_3_3_2_48_2","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Yu Hexuan","year":"2023","unstructured":"Hexuan Yu, Changlai Du, Yang Xiao, Angelos Keromytis, Chonggang Wang, Robert Gazda, Y\u00a0Thomas Hou, and Wenjing Lou. 2023. AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_25"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179292"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3736212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:33:19Z","timestamp":1755070399000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3736212"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":49,"alternative-id":["10.1145\/3708821.3736212","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3736212","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}