{"id":"https://openalex.org/W4402169868","doi":"https://doi.org/10.1109/tce.2024.3453953","title":"Dynamic Anonymous Quantum-Secure Batch-Verifiable Authentication Scheme for VANET","display_name":"Dynamic Anonymous Quantum-Secure Batch-Verifiable Authentication Scheme for VANET","publication_year":2024,"publication_date":"2024-09-03","ids":{"openalex":"https://openalex.org/W4402169868","doi":"https://doi.org/10.1109/tce.2024.3453953"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2024.3453953","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3453953","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094005724","display_name":"Nahida Majeed Wani","orcid":"https://orcid.org/0000-0002-5194-9975"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nahida Majeed Wani","raw_affiliation_strings":["Department of Mathematics, Amity School of Engineering and Technology, Amity University, Gwalior, India","Department of Mathematics, Amity School of Engineering and Technology, Amity University, Madhya Pradesh, Gwalior, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Amity School of Engineering and Technology, Amity University, Gwalior, India","institution_ids":[]},{"raw_affiliation_string":"Department of Mathematics, Amity School of Engineering and Technology, Amity University, Madhya Pradesh, Gwalior, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088607627","display_name":"Girraj Kumar Verma","orcid":"https://orcid.org/0000-0001-8939-9203"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Girraj Kumar Verma","raw_affiliation_strings":["Department of Mathematics, Amity School of Engineering and Technology, Amity University, Gwalior, India","Department of Mathematics, Amity School of Engineering and Technology, Amity University, Madhya Pradesh, Gwalior, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Amity School of Engineering and Technology, Amity University, Gwalior, India","institution_ids":[]},{"raw_affiliation_string":"Department of Mathematics, Amity School of Engineering and Technology, Amity University, Madhya Pradesh, Gwalior, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005020243","display_name":"Vinay Chamola","orcid":"https://orcid.org/0000-0002-6730-3060"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vinay Chamola","raw_affiliation_strings":["Department of Electrical and Electronics Engineering and the APPCAIR, Birla Institute of Technology and Science (Pilani Campus), Pilani, India","Birla Institute of Technology and Science, Department of Electrical and Electronics Engineering, Pilani Campus, Pilani, Rajasthan, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering and the APPCAIR, Birla Institute of Technology and Science (Pilani Campus), Pilani, India","institution_ids":["https://openalex.org/I74796645"]},{"raw_affiliation_string":"Birla Institute of Technology and Science, Department of Electrical and Electronics Engineering, Pilani Campus, Pilani, Rajasthan, India","institution_ids":["https://openalex.org/I74796645"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5094005724"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.9306,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91697072,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"70","issue":"4","first_page":"7112","last_page":"7120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9721999764442444,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8231278657913208},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6740332841873169},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.634943962097168},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5977388024330139},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5437982082366943},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5420118570327759},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4620946943759918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.433065265417099},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41166073083877563},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.20880892872810364},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1700485348701477},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12519219517707825},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11035388708114624}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8231278657913208},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6740332841873169},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.634943962097168},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5977388024330139},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5437982082366943},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5420118570327759},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4620946943759918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.433065265417099},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41166073083877563},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.20880892872810364},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1700485348701477},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12519219517707825},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11035388708114624},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2024.3453953","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3453953","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2006757318","https://openalex.org/W2091804958","https://openalex.org/W2097144372","https://openalex.org/W2121247918","https://openalex.org/W2122991569","https://openalex.org/W2137469879","https://openalex.org/W2142048307","https://openalex.org/W2146813141","https://openalex.org/W2168676717","https://openalex.org/W2360653114","https://openalex.org/W2556252096","https://openalex.org/W2735601075","https://openalex.org/W2903608625","https://openalex.org/W2906146034","https://openalex.org/W2914739373","https://openalex.org/W2991330758","https://openalex.org/W3027424440","https://openalex.org/W3100408509","https://openalex.org/W3120179717","https://openalex.org/W3121520705","https://openalex.org/W4210785486","https://openalex.org/W4210805826","https://openalex.org/W4226149406","https://openalex.org/W4312743818","https://openalex.org/W4316013176","https://openalex.org/W4321368444","https://openalex.org/W4377971468","https://openalex.org/W4382865033","https://openalex.org/W4385486439","https://openalex.org/W4385938106","https://openalex.org/W4387146071","https://openalex.org/W4387609334","https://openalex.org/W4387986831","https://openalex.org/W4388286164","https://openalex.org/W4390905877","https://openalex.org/W4391807598","https://openalex.org/W4391991732","https://openalex.org/W4393373010"],"related_works":["https://openalex.org/W3025994448","https://openalex.org/W2888823465","https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Integrating":[0],"cutting-edge":[1],"communication":[2],"technology":[3],"with":[4],"vehicular":[5],"advancement":[6],"has":[7,113,126],"led":[8],"to":[9,65],"Vehicular":[10],"Ad-Hoc":[11],"Networks":[12],"(VANETs).":[13],"VANET":[14,53],"architecture":[15],"facilitates":[16],"the":[17,27,41,118,133],"exchange":[18],"of":[19,31,120],"vital":[20],"safety-related":[21],"messages":[22,33],"among":[23],"vehicles.":[24,79],"However,":[25,51],"ensuring":[26],"authentication":[28,45,55,93],"and":[29,61,137,145],"integrity":[30],"shared":[32],"over":[34],"wireless":[35],"links":[36],"poses":[37],"challenges.":[38],"To":[39,80,105],"resolve":[40],"issues,":[42,83],"various":[43],"batch-verifiable":[44,54,92],"schemes":[46,56],"have":[47],"been":[48,114,127],"devised":[49],"previously.":[50],"existing":[52],"utilize":[57],"number":[58],"theory-based":[59],"cryptography,":[60],"therefore":[62],"are":[63],"vulnerable":[64],"quantum":[66],"computing":[67],"attacks.":[68],"Additionally,":[69],"storing":[70],"multiple":[71,121],"pseudonyms":[72],"for":[73,147],"anonymity":[74],"incurs":[75],"storage":[76,119],"overhead":[77],"on":[78],"address":[81],"these":[82],"this":[84],"paper":[85],"presents":[86],"a":[87,96,109],"novel":[88],"lattice-based":[89,97],"dynamic":[90,107],"anonymous":[91],"scheme.":[94],"Being":[95],"design,":[98],"it":[99],"is":[100],"robust":[101],"against":[102],"post-quantum":[103],"threats.":[104],"achieve":[106],"anonymity,":[108],"fuzzy":[110],"extractor":[111],"design":[112],"utilized,":[115],"which":[116],"removes":[117],"pseudonyms.":[122],"The":[123],"provable":[124],"security":[125],"achieved":[128],"via":[129],"formal":[130],"analysis":[131],"in":[132],"random":[134],"oracle":[135],"model,":[136],"an":[138],"extensive":[139],"performance":[140],"evaluation":[141],"confirms":[142],"its":[143],"efficiency":[144],"suitability":[146],"VANETs.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
