{"id":"https://openalex.org/W4366310289","doi":"https://doi.org/10.1109/icite56321.2022.10101468","title":"Lightweight Lattice-Based Signature for VANET","display_name":"Lightweight Lattice-Based Signature for VANET","publication_year":2022,"publication_date":"2022-11-11","ids":{"openalex":"https://openalex.org/W4366310289","doi":"https://doi.org/10.1109/icite56321.2022.10101468"},"language":"en","primary_location":{"id":"doi:10.1109/icite56321.2022.10101468","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icite56321.2022.10101468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 7th International Conference on Intelligent Transportation Engineering (ICITE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100750867","display_name":"Faguo Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I4210100255","display_name":"Beijing Academy of Artificial Intelligence","ror":"https://ror.org/016a74861","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210100255"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Faguo Wu","raw_affiliation_strings":["Beihang University Zhongguancun Laboratory,Institute of Artificial Intelligence, Bejing Advanced Innovation Center for Future Blockchain and Privacy Computing,Beijing,China","Institute of Artificial Intelligence, Bejing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beihang University Zhongguancun Laboratory,Institute of Artificial Intelligence, Bejing Advanced Innovation Center for Future Blockchain and Privacy Computing,Beijing,China","institution_ids":["https://openalex.org/I4210100255","https://openalex.org/I82880672"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Bejing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103276574","display_name":"Bengang Li","orcid":"https://orcid.org/0000-0003-3365-7896"},"institutions":[{"id":"https://openalex.org/I4210118629","display_name":"NARI Group (China)","ror":"https://ror.org/02egn3136","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bengang Li","raw_affiliation_strings":["Jiangsu Automation Research Institute,Lianyungang,China","Jiangsu Automation Research Institute, Lianyungang, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Automation Research Institute,Lianyungang,China","institution_ids":["https://openalex.org/I4210118629"]},{"raw_affiliation_string":"Jiangsu Automation Research Institute, Lianyungang, China","institution_ids":["https://openalex.org/I4210118629"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100750867"],"corresponding_institution_ids":["https://openalex.org/I4210100255","https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17342275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"406","last_page":"411"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7924603223800659},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7619819641113281},{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.6768199801445007},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5748187899589539},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5604882836341858},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5598557591438293},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4510301351547241},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.43880021572113037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4329392910003662},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4313836991786957},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41247329115867615},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.40852075815200806},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.3160809874534607},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3068036437034607},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24993768334388733},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.22039178013801575},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10696583986282349},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09154623746871948},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08965349197387695}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7924603223800659},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7619819641113281},{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.6768199801445007},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5748187899589539},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5604882836341858},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5598557591438293},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4510301351547241},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.43880021572113037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4329392910003662},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4313836991786957},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41247329115867615},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.40852075815200806},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.3160809874534607},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3068036437034607},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24993768334388733},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.22039178013801575},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10696583986282349},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09154623746871948},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08965349197387695},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icite56321.2022.10101468","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icite56321.2022.10101468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 7th International Conference on Intelligent Transportation Engineering (ICITE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W17137660","https://openalex.org/W121367636","https://openalex.org/W147447691","https://openalex.org/W1675339804","https://openalex.org/W1926641110","https://openalex.org/W1963578159","https://openalex.org/W2043103772","https://openalex.org/W2051698539","https://openalex.org/W2093721992","https://openalex.org/W2156186849","https://openalex.org/W2164736940","https://openalex.org/W2167927798","https://openalex.org/W2262155672","https://openalex.org/W2294366282","https://openalex.org/W2775394419","https://openalex.org/W2783945386","https://openalex.org/W2791664942","https://openalex.org/W2905294008","https://openalex.org/W3002720885","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2949568421","https://openalex.org/W1969963576","https://openalex.org/W3129949498","https://openalex.org/W140041957","https://openalex.org/W2375851210","https://openalex.org/W2396801314","https://openalex.org/W2358970484","https://openalex.org/W2370606154","https://openalex.org/W2120236684","https://openalex.org/W1536986722"],"abstract_inverted_index":{"Vehicle":[0],"ad":[1],"hoc":[2],"network":[3],"(VANET)":[4],"realizes":[5],"information":[6],"sharing":[7],"through":[8],"the":[9,38,41,53,58,66,84,101,160,167,170,210],"interconnection":[10],"between":[11,60],"vehicles,":[12,35,57],"vehicles":[13],"and":[14,16,29,45,78,202],"roads":[15],"other":[17,193],"entities,":[18],"so":[19],"as":[20,221,223],"to":[21,52,74,98,115],"improve":[22,100],"traffic":[23,49],"efficiency.":[24],"However,":[25],"attackers":[26],"can":[27,125,154,165],"steal":[28],"tamper":[30],"with":[31,131,184],"messages":[32],"sent":[33],"by":[34],"thereby":[36],"threatening":[37],"safety":[39],"of":[40,43,56,86,103,108,159,169,199],"Internet":[42,85],"Vehicles":[44],"possibly":[46],"causing":[47],"serious":[48,113],"accidents.":[50],"Due":[51],"high-speed":[54],"mobility":[55],"communication":[59],"nodes":[61],"must":[62],"be":[63,142],"authenticated":[64],"within":[65],"effective":[67,92],"time.":[68],"Therefore,":[69],"it":[70],"is":[71,90,96,189,220],"particularly":[72],"important":[73],"design":[75],"a":[76,112,178],"safe":[77],"efficient":[79,191],"message":[80,161,185],"authentication":[81,93],"scheme":[82,89,183,188],"for":[83],"Vehicles.":[87],"Signature":[88],"an":[91],"method,":[94],"which":[95,140,164],"expected":[97],"greatly":[99],"security":[102,208],"VANET.":[104],"The":[105],"rapid":[106],"development":[107],"quantum":[109,127],"computers":[110],"poses":[111],"threat":[114],"traditional":[116,132],"signature":[117,122,135,138,163,182,195,200],"schemes.":[118],"There":[119],"are":[120],"some":[121,156],"schemes":[123,196],"that":[124,219],"resist":[126],"attacks,":[128],"however,":[129],"compared":[130],"signature,":[133],"lattice-based":[134,181,194],"has":[136],"bigger":[137],"size,":[139],"could":[141],"challenging":[143],"in":[144,197,209],"resource":[145],"constrained":[146],"applications,":[147],"like":[148],"Internet-of-Things":[149],"(IoT).":[150],"Message":[151],"recovery":[152],"technology":[153],"embed":[155],"or":[157],"all":[158],"into":[162],"reduce":[166],"size":[168,201],"signed":[171],"message.":[172],"In":[173],"this":[174],"paper,":[175],"we":[176],"present":[177],"new":[179],"NTRU":[180],"recovery.":[186],"This":[187],"more":[190],"than":[192],"terms":[198],"energy":[203],"cost.":[204],"We":[205],"prove":[206],"its":[207],"random":[211],"oracle":[212],"model":[213],"under":[214],"short":[215],"integer":[216],"solution":[217],"assumption":[218],"hard":[222],"approximating":[224],"several":[225],"worst-case":[226],"lattice":[227],"problems.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
