{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T13:01:34Z","timestamp":1761570094747,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755902","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"558-567","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Authentication Scheme for V2G in social IoT Based on Certificateless Aggregate Signatures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8827-3884","authenticated-orcid":false,"given":"Zhuoqun","family":"Xia","sequence":"first","affiliation":[{"name":"Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8892-9635","authenticated-orcid":false,"given":"Yutong","family":"Xie","sequence":"additional","affiliation":[{"name":"Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4299-3280","authenticated-orcid":false,"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"Changsha University of Science and Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Ikram Ali Mwitende Gervais Emmanuel Ahene and Fagen Li. 2019. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture 99 (2019) 101636.","DOI":"10.1016\/j.sysarc.2019.101636"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Thar Baker Muhammad Asim Hezekiah Samwini Nauman Shamim Mohammed\u00a0M Alani and Rajkumar Buyya. 2022. A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems. Computer Networks 203 (2022) 108676.","DOI":"10.1016\/j.comnet.2021.108676"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Dmitrii Bogdanov and Christian Breyer. 2024. Role of smart charging of electric vehicles and vehicle-to-grid in integrated renewables-based energy systems on country level. Energy 301 (2024) 131635.","DOI":"10.1016\/j.energy.2024.131635"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Jing Chen Zeyi Zhan Kun He Ruiying Du Donghui Wang and Fei Liu. 2021. XAuth: Efficient privacy-preserving cross-domain authentication. IEEE Transactions on Dependable and Secure Computing 19 5 (2021) 3301\u20133311.","DOI":"10.1109\/TDSC.2021.3092375"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Jie Chen Yueyu Zhang and Wencong Su. 2015. An anonymous authentication scheme for plug-in electric vehicles joining to charging\/discharging station in vehicle-to-Grid (V2G) networks. China Communications 12 3 (2015) 9\u201319.","DOI":"10.1109\/CC.2015.7084359"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Abdullah Dik Siddig Omer and Rabah Boukhanouf. 2022. Electric vehicles: V2G for rapid safe and green EV penetration. Energies 15 3 (2022) 803.","DOI":"10.3390\/en15030803"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Willett Kempton and Jasna Tomi\u0107. 2005. Vehicle-to-grid power fundamentals: Calculating capacity and net revenue. Journal of power sources 144 1 (2005) 268\u2013279.","DOI":"10.1016\/j.jpowsour.2004.12.025"},{"key":"e_1_3_3_1_10_2","first-page":"149","volume-title":"Wireless Algorithms, Systems, and Applications: 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24\u201326, 2019, Proceedings 14","author":"Li Chunlei","year":"2019","unstructured":"Chunlei Li, Qian Wu, Hewu Li, and Jun Liu. 2019. Trustroam: A novel blockchain-based cross-domain authentication scheme for Wi-Fi access. In Wireless Algorithms, Systems, and Applications: 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24\u201326, 2019, Proceedings 14. Springer, 149\u2013161."},{"key":"e_1_3_3_1_11_2","first-page":"1","volume-title":"2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2)","author":"Liu Donglan","year":"2018","unstructured":"Donglan Liu, Dong Li, Xin Liu, Lei Ma, Hao Yu, and Hao Zhang. 2018. Research on a cross-domain authentication scheme based on consortium blockchain in V2G networks of smart grid. In 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE, 1\u20135."},{"key":"e_1_3_3_1_12_2","unstructured":"Bernard Looney et\u00a0al. 2020. Statistical review of world energy 2020|. Bp 69 (2020) 66."},{"key":"e_1_3_3_1_13_2","unstructured":"Lili Lu Weiheng Gu Xi Xu Musen Wang Shangdong Liu and Fei Wu. 2024. Cross-chain Protocol Lightning-C for Internet of Vehicles Environment. IEEE Access (2024)."},{"key":"e_1_3_3_1_14_2","unstructured":"Hongmei Ma Yifan Liu Yi Liu Fan Feng and Zhenpeng Liu. 2025. DPCZK: Enhancing Device Privacy Through Certificate-Free Encryption and Zero Knowledge Proof in Multi-Domain IoT Environments. IEEE Internet of Things Journal (2025)."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Fei Tong Xing Chen Kaiming Wang and Yujian Zhang. 2022. CCAP: A complete cross-domain authentication based on blockchain for Internet of Things. IEEE Transactions on Information Forensics and Security 17 (2022) 3789\u20133800.","DOI":"10.1109\/TIFS.2022.3214733"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Miaomiao Wang Lanlan Rui Yang Yang Zhipeng Gao and Xingyu Chen. 2022. A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network. IEEE Transactions on Network and Service Management 19 3 (2022) 2664\u20132676.","DOI":"10.1109\/TNSM.2022.3180357"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Weizheng Wang Hao Xu Mamoun Alazab Thippa\u00a0Reddy Gadekallu Zhaoyang Han and Chunhua Su. 2021. Blockchain-based reliable and efficient certificateless signature for IIoT devices. IEEE transactions on industrial informatics 18 10 (2021) 7059\u20137067.","DOI":"10.1109\/TII.2021.3084753"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-030-69992-5_8","volume-title":"Cloud Computing: 10th EAI International Conference, CloudComp 2020, Qufu, China, December 11-12, 2020, Proceedings 10","author":"Wang Yanli","year":"2021","unstructured":"Yanli Wang, Xinying Yu, and Fengyin Li. 2021. Lightweight Anonymous Communication Model Based on Anonymous IBE. In Cloud Computing: 10th EAI International Conference, CloudComp 2020, Qufu, China, December 11-12, 2020, Proceedings 10. Springer, 103\u2013110."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Shichang Xuan Haibo Xiao Dapeng Man Wei Wang and Wu Yang. 2021. A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications. Wireless Communications and Mobile Computing 2021 1 (2021) 9942950.","DOI":"10.1155\/2021\/9942950"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","location":"Trondheim Norway","acronym":"Internetware 2025","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:51:21Z","timestamp":1761565881000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755902"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":18,"alternative-id":["10.1145\/3755881.3755902","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755902","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}