{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:24:14Z","timestamp":1776115454115,"version":"3.50.1"},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":74,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61520106007"],"award-info":[{"award-number":["61520106007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Development of Internet of Vehicles (IoV) has aroused extensive attention in recent years. The IoV requires an efficient communication mode when the application scenarios are complicated. To reduce the verifying time and cut the length of signature, certificateless aggregate signature (CL\u2010AS) is used to achieve improved performance in resource\u2010constrained environments like vehicular ad hoc networks (VANETs), which is able to make it effective in environments constrained by bandwidth and storage. However, in the real application scenarios, messages should be kept untamed, unleashed, and authentic. In addition, most of the proposed schemes tend to be easy to attack by signers or malicious entities which can be called coalition attack. In this paper, we present an improved certificateless\u2010based authentication and aggregate signature scheme, which can properly solve the coalition attack. Moreover, the proposed scheme not only uses pseudonyms in communications to prevent vehicles from revealing their identity but also achieves considerable efficiency compared with state\u2010of\u2010the\u2010art work, certificateless signature (CLS), and CL\u2010AS schemes. Furthermore, it demonstrates that when focused on the existential forgery on adaptive chosen message attack and coalition attack, the proposed schemes can be proved secure. Also, we show that our scheme exceeds existing certification schemes in both computing and communication costs.<\/jats:p>","DOI":"10.1155\/2021\/6677137","type":"journal-article","created":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T19:10:04Z","timestamp":1615921804000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Certificateless\u2010Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2611-9531","authenticated-orcid":false,"given":"Xin","family":"Ye","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6099-8031","authenticated-orcid":false,"given":"Gencheng","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1976-8285","authenticated-orcid":false,"given":"Xueli","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7496-684X","authenticated-orcid":false,"given":"Yuedi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054724"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3002096"},{"key":"e_1_2_11_3_2","first-page":"3412","article-title":"An approach to identify the Sybil attacks in vehicular ad-hoc networks using path signature","volume":"9","author":"Kumar A.","year":"2020","journal-title":"International Journal of Scientific & Technology Research"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2997840"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/1378202"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.12.004"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"e_1_2_11_8_2","first-page":"351","article-title":"On the security of a secure batch verification with group testing for vanet","volume":"16","author":"Jianhong Z.","year":"2014","journal-title":"International Journal of Network Security"},{"key":"e_1_2_11_9_2","doi-asserted-by":"crossref","unstructured":"LuR. LinX. ZhuH. HoP.-H. andShenX. Ecpp: efficient conditional privacy preservation protocol for secure vehicular communications IEEE INFOCOM 2008-The 27th Conference on Computer Communications 2008 Orlando FL USA 1229\u20131237.","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0109-y"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2312-y"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"YangX. ChenC. MaT. LiY. andWangC. An improved certificateless aggregate signature scheme for vehicular ad-hoc networks 2018 IEEE 3rd Advanced Information Technology Electronic and Automation Control Conference (IAEAC) 2018.","DOI":"10.1109\/IAEAC.2018.8577477"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.03.005"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894895"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907298"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.060"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2018.1463139"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.015"},{"key":"e_1_2_11_22_2","unstructured":"RudackM. MeinckeM. andLottM. On the dynamics of ad hoc networks for inter vehicle communications (ivc) 2 proc. ICWN 2002 Citeseer."},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3708"},{"key":"e_1_2_11_24_2","first-page":"317","article-title":"An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks","volume":"17","author":"Malhi A. K.","year":"2015","journal-title":"Discrete Mathematics and Theoretical Computer Science"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1080\/1206212x.2018.1477320"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6677137.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6677137.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6677137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:27:50Z","timestamp":1723033670000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6677137"}},"subtitle":[],"editor":[{"given":"Zhuojun","family":"Duan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6677137"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6677137","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-12-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6677137"}}