{"id":"https://openalex.org/W4415593724","doi":"https://doi.org/10.1109/jiot.2025.3625445","title":"A Code-Based Anonymous Authentication Scheme for Vehicular Ad Hoc Networks","display_name":"A Code-Based Anonymous Authentication Scheme for Vehicular Ad Hoc Networks","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W4415593724","doi":"https://doi.org/10.1109/jiot.2025.3625445"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3625445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3625445","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100876896","display_name":"Xin Lin","orcid":"https://orcid.org/0009-0000-6418-3887"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Lin","raw_affiliation_strings":["School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"],"raw_orcid":"https://orcid.org/0009-0000-6418-3887","affiliations":[{"raw_affiliation_string":"School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027845761","display_name":"Yusun Fu","orcid":"https://orcid.org/0000-0003-1569-7640"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yusun Fu","raw_affiliation_strings":["School of Automation and Intelligent Sensing, the Key Laboratory of System Control and Information Processing, the Ministry of Education of China, and Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, Shanghai Jiao Tong University, Shanghai, China","Key Laboratory of System Control and Information Processing, Ministry of Education of China, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0003-1569-7640","affiliations":[{"raw_affiliation_string":"School of Automation and Intelligent Sensing, the Key Laboratory of System Control and Information Processing, the Ministry of Education of China, and Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]},{"raw_affiliation_string":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100413113","display_name":"Zihao Wang","orcid":"https://orcid.org/0009-0008-5588-9931"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihao Wang","raw_affiliation_strings":["School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"],"raw_orcid":"https://orcid.org/0009-0008-5588-9931","affiliations":[{"raw_affiliation_string":"School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101983248","display_name":"Junpeng Yin","orcid":"https://orcid.org/0009-0004-0472-6308"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junpeng Yin","raw_affiliation_strings":["School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"],"raw_orcid":"https://orcid.org/0009-0004-0472-6308","affiliations":[{"raw_affiliation_string":"School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100876896"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.6531,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75977618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"24","first_page":"55708","last_page":"55724"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.958299994468689,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6338000297546387},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5716999769210815},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.4869999885559082},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4830999970436096},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4643000066280365},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4415000081062317},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42649999260902405},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4171999990940094},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.40709999203681946},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3716999888420105}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7954999804496765},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6338000297546387},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5716999769210815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4941999912261963},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.4869999885559082},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4830999970436096},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4643000066280365},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45969998836517334},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4415000081062317},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42649999260902405},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4171999990940094},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.40709999203681946},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3716999888420105},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.3714999854564667},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.36169999837875366},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3555000126361847},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3513999879360199},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3427000045776367},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.3391000032424927},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.33570000529289246},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.33489999175071716},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.325300008058548},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.3240000009536743},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.32339999079704285},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.31839999556541443},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.3034999966621399},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.296999990940094},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.29649999737739563},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.27630001306533813},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3625445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3625445","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2532185403","display_name":null,"funder_award_id":"2024Z111","funder_id":"https://openalex.org/F4320334010","funder_display_name":"Key Research and Development Program of Ningxia"},{"id":"https://openalex.org/G7926164290","display_name":null,"funder_award_id":"2019YFB1705703","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320334010","display_name":"Key Research and Development Program of Ningxia","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W18157873","https://openalex.org/W1546841352","https://openalex.org/W1589034595","https://openalex.org/W1595415026","https://openalex.org/W1596956578","https://openalex.org/W1607188293","https://openalex.org/W1763199136","https://openalex.org/W1814391573","https://openalex.org/W1965275036","https://openalex.org/W1970606468","https://openalex.org/W1995783277","https://openalex.org/W2016275857","https://openalex.org/W2023835067","https://openalex.org/W2073210531","https://openalex.org/W2080723908","https://openalex.org/W2112348059","https://openalex.org/W2121247918","https://openalex.org/W2132233293","https://openalex.org/W2137147061","https://openalex.org/W2137693329","https://openalex.org/W2155394186","https://openalex.org/W2159691338","https://openalex.org/W2163614799","https://openalex.org/W2200428489","https://openalex.org/W2254971601","https://openalex.org/W2470757336","https://openalex.org/W2483112678","https://openalex.org/W2524824762","https://openalex.org/W2535577585","https://openalex.org/W2593505894","https://openalex.org/W2611056906","https://openalex.org/W2765584933","https://openalex.org/W2898448716","https://openalex.org/W2905018958","https://openalex.org/W2915454762","https://openalex.org/W2921925211","https://openalex.org/W2944216014","https://openalex.org/W2949110138","https://openalex.org/W2963914627","https://openalex.org/W2989770977","https://openalex.org/W2995835799","https://openalex.org/W3011989826","https://openalex.org/W3091482432","https://openalex.org/W3210129327","https://openalex.org/W3217572366","https://openalex.org/W4388262770","https://openalex.org/W4389857660","https://openalex.org/W4391311013","https://openalex.org/W4400417325","https://openalex.org/W4403291154"],"related_works":[],"abstract_inverted_index":{"Currently,":[0],"the":[1,22,40,68,199],"majority":[2],"of":[3,24,60,70],"authentication":[4,91,142,205],"mechanisms":[5],"in":[6,53],"Vehicular":[7],"Ad":[8],"Hoc":[9],"Networks":[10],"(VANETs)":[11],"are":[12],"predominantly":[13],"based":[14],"on":[15,67],"Elliptic":[16],"Curve":[17],"Cryptography":[18],"(ECC).":[19],"However,":[20],"with":[21,75,209],"rise":[23],"quantum":[25,150],"computing,":[26],"traditional":[27],"cryptographic":[28,45,73,156],"algorithms":[29],"such":[30,183],"as":[31,79,184],"RSA":[32],"and":[33,62,106,112,122,149,170,179,188],"ECC":[34],"face":[35],"significant":[36],"security":[37,51,148,178],"threats,":[38],"underscoring":[39],"need":[41],"for":[42,94,207],"exploring":[43],"alternative":[44],"approaches":[46],"that":[47,173,195],"can":[48],"provide":[49],"robust":[50],"guarantees":[52],"a":[54,80,88],"post-quantum":[55],"era.":[56],"The":[57],"National":[58],"Institute":[59],"Standards":[61],"Technology":[63],"(NIST)":[64],"is":[65,198],"working":[66],"standardization":[69],"quantum-resistant":[71],"public-key":[72],"algorithms,":[74],"code-based":[76,89,99,155,203],"cryptosystems":[77],"emerging":[78],"promising":[81],"alternative.":[82],"In":[83],"this":[84],"paper,":[85],"we":[86,127],"introduce":[87],"anonymous":[90,204],"scheme":[92,159,175,206],"tailored":[93],"VANETs.":[95],"Our":[96],"approach":[97],"leverages":[98],"group":[100,117],"signatures":[101],"to":[102,135,138,153,201],"ensure":[103],"both":[104],"anonymity":[105],"traceability,":[107,186],"facilitating":[108],"efficient":[109],"user":[110],"registration":[111],"revocation":[113],"through":[114],"fully":[115],"dynamic":[116],"signatures.":[118],"By":[119],"utilizing":[120],"punctured":[121],"randomly":[123],"inserted":[124],"QC-MDPC":[125],"codes,":[126],"significantly":[128],"reduce":[129],"key":[130,162],"sizes":[131,163],"while":[132],"enhancing":[133],"resistance":[134],"attacks.":[136],"Compared":[137,152],"conventional":[139],"number-theoretic":[140],"VANET":[141],"schemes,":[143],"our":[144,158,174,196],"method":[145],"exhibits":[146],"strong":[147],"resistance.":[151],"recent":[154],"solutions,":[157],"notably":[160],"decreases":[161],"without":[164],"increasing":[165],"signature":[166,211],"lengths.":[167],"Security":[168],"proofs":[169],"analyses":[171],"validate":[172],"offers":[176],"high":[177],"meets":[180],"essential":[181],"requirements":[182],"anonymity,":[185],"nonframeability,":[187],"tracing":[189],"soundness.":[190],"Efficiency":[191],"evaluations":[192],"further":[193],"demonstrate":[194],"proposal":[197],"first":[200],"achieve":[202],"VANETs":[208],"constant":[210],"size.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-11T23:09:37.256380","created_date":"2025-10-28T00:00:00"}
