{"id":"https://openalex.org/W3009566674","doi":"https://doi.org/10.1109/comcomap46287.2019.9018809","title":"Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET","display_name":"Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3009566674","doi":"https://doi.org/10.1109/comcomap46287.2019.9018809","mag":"3009566674"},"language":"en","primary_location":{"id":"doi:10.1109/comcomap46287.2019.9018809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comcomap46287.2019.9018809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Computing, Communications and IoT Applications (ComComAp)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076348413","display_name":"Ye Xu","orcid":"https://orcid.org/0000-0002-6406-7832"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ye Xu","raw_affiliation_strings":["Harbin Institute of Technology(Shenzhen), Shenzhen, Guangdong, P.R. China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology(Shenzhen), Shenzhen, Guangdong, P.R. China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101399509","display_name":"Fengying Li","orcid":"https://orcid.org/0000-0002-8119-4294"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengying Li","raw_affiliation_strings":["Harbin Institute of Technology(Shenzhen), Shenzhen, Guangdong, P.R. China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology(Shenzhen), Shenzhen, Guangdong, P.R. China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102709435","display_name":"Bin Cao","orcid":"https://orcid.org/0000-0002-3164-535X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Cao","raw_affiliation_strings":["Harbin Institute of Technology(Shenzhen), Shenzhen, Guangdong, P.R. China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology(Shenzhen), Shenzhen, Guangdong, P.R. China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076348413"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.1192,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5014656,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"157","last_page":"162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.8604387044906616},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.8361337184906006},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7621577978134155},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6876500844955444},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6775923371315002},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6676366925239563},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.58931964635849},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5731245875358582},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5470566749572754},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5066536068916321},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5003924369812012},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.4665880501270294},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.450271338224411},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.3798713982105255},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.36092954874038696},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33781084418296814},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.25505563616752625},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14300218224525452},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.10309085249900818},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09889471530914307},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09783148765563965}],"concepts":[{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.8604387044906616},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.8361337184906006},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7621577978134155},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6876500844955444},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6775923371315002},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6676366925239563},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.58931964635849},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5731245875358582},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5470566749572754},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5066536068916321},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5003924369812012},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.4665880501270294},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.450271338224411},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.3798713982105255},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.36092954874038696},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33781084418296814},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.25505563616752625},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14300218224525452},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.10309085249900818},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09889471530914307},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09783148765563965},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comcomap46287.2019.9018809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comcomap46287.2019.9018809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Computing, Communications and IoT Applications (ComComAp)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W108080453","https://openalex.org/W1610688607","https://openalex.org/W1969035815","https://openalex.org/W1997259914","https://openalex.org/W2001084946","https://openalex.org/W2063968252","https://openalex.org/W2103056119","https://openalex.org/W2112348059","https://openalex.org/W2121247918","https://openalex.org/W2122991569","https://openalex.org/W2128628587","https://openalex.org/W2141420453","https://openalex.org/W2152924492","https://openalex.org/W2153098630","https://openalex.org/W2171846822","https://openalex.org/W2583813644","https://openalex.org/W2597561986","https://openalex.org/W2618481400","https://openalex.org/W6604389750","https://openalex.org/W6636423917"],"related_works":["https://openalex.org/W2294573228","https://openalex.org/W2152646546","https://openalex.org/W2892927944","https://openalex.org/W4389077034","https://openalex.org/W2389225248","https://openalex.org/W2168592352","https://openalex.org/W4200075438","https://openalex.org/W2798638907","https://openalex.org/W4283656462","https://openalex.org/W37565775"],"abstract_inverted_index":{"In":[0,59],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5],"conditional":[6,25],"privacy-preserving":[7],"authentication":[8,130],"scheme":[9,29],"based":[10,33],"on":[11,34,48],"pseudonyms":[12,35],"and":[13,68,73,96,118,129],"(t,n)":[14,54],"threshold":[15,55],"secret":[16,56],"sharing,":[17],"named":[18],"CPPT,":[19],"for":[20],"vehicular":[21],"communications.":[22],"To":[23,40],"achieve":[24],"privacy":[26],"preservation,":[27],"our":[28],"implements":[30],"anonymous":[31],"communications":[32],"generated":[36],"by":[37,105],"hash":[38,64],"chains.":[39],"prevent":[41],"bad":[42],"vehicles":[43,95],"from":[44],"conducting":[45],"framed":[46],"attacks":[47],"honest":[49],"ones,":[50],"CPPT":[51,113],"introduces":[52],"Shamir":[53],"sharing":[57],"technique.":[58],"addition,":[60],"through":[61],"two":[62],"one-way":[63],"chains,":[65],"forward":[66],"security":[67,70],"backward":[69],"are":[71,103],"guaranteed,":[72],"it":[74],"also":[75],"optimize":[76],"the":[77,91,106],"revocation":[78,84,124],"overhead.":[79,131],"The":[80],"size":[81],"of":[82,93,123],"certificate":[83,126],"list":[85],"(CRL)":[86],"is":[87],"only":[88],"proportional":[89],"to":[90,98],"number":[92],"revoked":[94,107],"irrelated":[97],"how":[99],"many":[100],"pseudonymous":[101],"certificates":[102],"held":[104],"vehicles.":[108],"Extensive":[109],"simulations":[110],"demonstrate":[111],"that":[112],"outperforms":[114],"ECPP,":[115],"DCS,":[116],"Hybrid":[117],"EMAP":[119],"schemes":[120],"in":[121],"terms":[122],"overhead,":[125],"updating":[127],"overhead":[128]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
