{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:56:10Z","timestamp":1762876570197,"version":"3.45.0"},"reference-count":32,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities","award":["2018ZD06"],"award-info":[{"award-number":["2018ZD06"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>As electric vehicles (EVs) gain popularity, the existing public charging infrastructure is struggling to keep pace with the rapidly growing demand for the immediate charging needs of EVs. V2V power trading has gradually attracted widespread attention and development. EVs need to transmit sensitive information, such as transaction plans, through communication entities in the Internet of Vehicles (IoV). This could lead to leaks of sensitive information, thereby threatening the fairness of transactions. In addition, due to the differences in the cryptographic systems of entities, communication between entities faces challenges. Therefore, a privacy-preserving scheme for V2V double auction power trading based on heterogeneous signcryption and IoV is proposed. Firstly, a heterogeneous signcryption algorithm is designed to realize secure communication from certificateless cryptography to identity-based cryptography. Secondly, the scheme employs a pseudonym mechanism to protect the real identities of EVs. Furthermore, a verification algorithm is designed to verify the information sent by EVs and ensure the traceability and revocation of malicious EVs. The theoretical analysis shows that the proposed scheme could serve common security functions, and the experiment demonstrates that the proposed scheme reduces communication costs by about 14.56% and the computational cost of aggregate decryption by 80.51% compared with other schemes in recent years.<\/jats:p>","DOI":"10.3390\/cryptography9040071","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T14:28:59Z","timestamp":1762871339000},"page":"71","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy-Preserving Scheme for V2V Double Auction Power Trading Based on Heterogeneous Signcryption and IoV"],"prefix":"10.3390","volume":"9","author":[{"given":"Shaomin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Baoding 071003, China"},{"name":"Engineering Research Center of Intelligent Computing for Complex Energy Systems, Ministry of Education, Baoding 071003, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3301-9107","authenticated-orcid":false,"given":"Yiheng","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Baoding 071003, China"},{"name":"Engineering Research Center of Intelligent Computing for Complex Energy Systems, Ministry of Education, Baoding 071003, China"}]},{"given":"Baoyi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Baoding 071003, China"},{"name":"Hebei Key Laboratory of Knowledge Computing for Energy & Power, North China Electric Power University, Baoding 071003, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/TSG.2020.3016597","article-title":"Hierarchical bipartite graph matching method for transactive V2V power exchange in distribution power system","volume":"12","author":"Zeng","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_2","first-page":"1","article-title":"Electric vehicles in China, Europe, and the United States: Current trend and market comparison","volume":"2","author":"Khaleel","year":"2024","journal-title":"Int. J. Electr. Eng. Sustain."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/JSYST.2022.3145155","article-title":"A Reservation-Based Vehicle-to-Vehicle Charging Service Under Constraint of Parking Duration","volume":"17","author":"Liu","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_4","first-page":"51","article-title":"A review on optimization of V2V charging services in intelligent transportation environment","volume":"9","author":"Zhang","year":"2025","journal-title":"Chin. J. Internet Things"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MNET.2024.3391618","article-title":"Vehicle-to-Vehicle Energy Sharing Scheme: A Privacy-Preserving Solution Based on Local Differential Privacy Method","volume":"38","author":"Ju","year":"2024","journal-title":"IEEE Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"107667","DOI":"10.1016\/j.epsr.2021.107667","article-title":"Electricity trade strategy of regional electric vehicle coalitions based on blockchain","volume":"204","author":"Zhang","year":"2022","journal-title":"Electr. Power Syst. Res."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"109789","DOI":"10.1016\/j.ijepes.2024.109789","article-title":"A V2V electricity transaction scheme with privacy protection based on the Internet of vehicles and consortium blockchain","volume":"157","author":"Zhang","year":"2024","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"41248","DOI":"10.1109\/JIOT.2024.3458077","article-title":"Efficient and Provably Secure Offline\/Online Heterogeneous Signcryption Scheme for VANETs","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"137586","DOI":"10.1016\/j.jclepro.2023.137586","article-title":"A genuine V2V market mechanism aiming for maximum revenue of each EV owner based on non-cooperative game model","volume":"414","author":"Li","year":"2023","journal-title":"J. Clean. Prod."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"160546","DOI":"10.1109\/ACCESS.2019.2951057","article-title":"Electric Vehicle Power Trading Mechanism Based on Blockchain and Smart Contract in V2G Network","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"8105","DOI":"10.1109\/JIOT.2021.3082769","article-title":"Blockchain-enabled two-way auction mechanism for electricity trading in internet of electric vehicles","volume":"9","author":"Luo","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wang, S., and Long, C. (2021, January 18\u201321). A Vehicle-to-vehicle Energy Trading Platform Using Double Auction with High Flexibility. Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Espoo, Finland.","DOI":"10.1109\/ISGTEurope52324.2021.9640018"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., and Shacham, H. (2003, January 4\u20138). Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland. Proceedings 22.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zheng, Y. (1997, January 17\u201321). Digital signcryption or how to achieve cost (signature & encryption) \u226a cost (signature)+ cost (encryption). Proceedings of the Advances in Cryptology\u2014CRYPTO\u201997: 17th Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/BFb0052234"},{"key":"ref_15","first-page":"2519","article-title":"Certificateless Aggregate Signcryption Scheme with Publicly Verifiable Pairless Operation","volume":"16","author":"Chen","year":"2022","journal-title":"J. Front. Comput. Sci. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6349","DOI":"10.1109\/TII.2022.3142306","article-title":"Certificateless Aggregated Signcryption Scheme (CLASS) for Cloud-Fog Centric Industry 4.0","volume":"18","author":"Dohare","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5063","DOI":"10.1109\/JIOT.2022.3222237","article-title":"Pairing-Free Certificateless Aggregate Signcryption Scheme for Vehicular Sensor Networks","volume":"10","author":"Dai","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"102522","DOI":"10.1016\/j.sysarc.2022.102522","article-title":"Heterogeneous online\/offline signcryption for secure communication in Internet of Things","volume":"127","author":"Jin","year":"2022","journal-title":"J. Syst. Archit."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"11266","DOI":"10.1109\/TVT.2020.3008781","article-title":"An Efficient Hybrid Signcryption Scheme with Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs","volume":"69","author":"Ali","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","unstructured":"Niu, S., Yan, S., Lu, R., Zhou, S., and Zhang, M. (2022). Privacy-Preserving Heterogeneous Aggregated Signcryption Scheme in V2V Internet of Vehicles. Comput. Eng., 48."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"19426","DOI":"10.1109\/JIOT.2022.3167102","article-title":"A pairing-free heterogeneous signcryption scheme for unmanned aerial vehicles","volume":"9","author":"Pan","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_22","unstructured":"Zhou, M., and Fan, X. (2025). Online\/offline heterogeneous signcryption scheme with multi-ciphertext equalitytest in internet of vehicles. Chin. J. Telecommun. Sci., 1\u201317. Available online: https:\/\/link.cnki.net\/urlid\/11.2103.TN.20250925.1828.002."},{"key":"ref_23","first-page":"3608","article-title":"Distributed power transaction privacy settlement model based on blockchain","volume":"47","author":"Li","year":"2023","journal-title":"Power Syst. Technol."},{"key":"ref_24","first-page":"15028","article-title":"Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V","volume":"72","author":"Yu","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.sysarc.2019.02.014","article-title":"ECASS: Edge computing based auxiliary sensing system for self-driving vehicles","volume":"97","author":"Wang","year":"2019","journal-title":"J. Syst. Archit."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"8485","DOI":"10.1109\/JIOT.2021.3116039","article-title":"Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks","volume":"9","author":"Zhong","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3101816","DOI":"10.1109\/TQE.2022.3174547","article-title":"A divide-and-conquer approach to Dicke state preparation","volume":"3","author":"Aktar","year":"2022","journal-title":"IEEE Trans. Quantum Eng."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TDSC.2020.2975157","article-title":"Towards incentive for electrical vehicles demand response with location privacy guaranteeing in microgrids","volume":"19","author":"Yang","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"33509","DOI":"10.1109\/ACCESS.2023.3264011","article-title":"A scalable Byzantine fault tolerance algorithm based on a tree topology network","volume":"11","author":"Jiang","year":"2023","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","article-title":"Security arguments for digital signatures and blind signatures","volume":"13","author":"Pointcheval","year":"2000","journal-title":"J. Cryptol."},{"key":"ref_31","unstructured":"Cremers, C.J. (2008, January 7\u201314). The scyther tool: Verification, falsification, and analysis of securityprotocols: Tool paper. Proceedings of the International Conference on Computer Aided Verification, Princeton, NJ, USA."},{"key":"ref_32","first-page":"100504","article-title":"ECDSA-based certificateless conditional privacy-preserving authentication scheme in Vehicular Ad Hoc Network","volume":"37","author":"Imghoure","year":"2022","journal-title":"Veh. Commun."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/71\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T14:38:45Z","timestamp":1762871925000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":32,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["cryptography9040071"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9040071","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,11]]}}}