{"id":"https://openalex.org/W4412939405","doi":"https://doi.org/10.1109/tdsc.2025.3595141","title":"Sphinx: Certificateless Conditional Privacy-Preserving Authentication With Secure Transmission for VANETs","display_name":"Sphinx: Certificateless Conditional Privacy-Preserving Authentication With Secure Transmission for VANETs","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4412939405","doi":"https://doi.org/10.1109/tdsc.2025.3595141"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3595141","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3595141","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101955228","display_name":"Mengjie Zhou","orcid":"https://orcid.org/0009-0004-6728-1502"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengjie Zhou","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037642352","display_name":"Chao Lin","orcid":"https://orcid.org/0000-0002-0101-8531"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061574999","display_name":"Shengmin Xu","orcid":"https://orcid.org/0000-0002-9121-0171"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengmin Xu","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027626829","display_name":"Wei Wu","orcid":"https://orcid.org/0000-0003-0343-4632"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wei Wu","raw_affiliation_strings":["College of Education Sciences, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Education Sciences, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101955228"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":0.6973,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.73878939,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"22","issue":"6","first_page":"7189","last_page":"7202"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7912613153457642},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6944340467453003},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5642914772033691},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5468353033065796},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4935711622238159},{"id":"https://openalex.org/keywords/sphinx","display_name":"Sphinx","score":0.46492648124694824},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4402419924736023},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33625805377960205},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17938590049743652}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7912613153457642},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6944340467453003},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5642914772033691},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5468353033065796},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4935711622238159},{"id":"https://openalex.org/C2777299493","wikidata":"https://www.wikidata.org/wiki/Q151480","display_name":"Sphinx","level":2,"score":0.46492648124694824},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4402419924736023},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33625805377960205},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17938590049743652},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3595141","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3595141","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4483051032","display_name":null,"funder_award_id":"62402109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5044375712","display_name":null,"funder_award_id":"62372108","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5371332048","display_name":null,"funder_award_id":"62425205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W121987519","https://openalex.org/W1516634197","https://openalex.org/W1546774120","https://openalex.org/W1591524234","https://openalex.org/W1592092778","https://openalex.org/W1667889362","https://openalex.org/W1988650223","https://openalex.org/W2073245107","https://openalex.org/W2075738473","https://openalex.org/W2107846430","https://openalex.org/W2112348059","https://openalex.org/W2117797270","https://openalex.org/W2120271005","https://openalex.org/W2121247918","https://openalex.org/W2122991569","https://openalex.org/W2128628587","https://openalex.org/W2141776264","https://openalex.org/W2586333888","https://openalex.org/W2735601075","https://openalex.org/W2794124131","https://openalex.org/W2911894629","https://openalex.org/W2979779867","https://openalex.org/W2996012538","https://openalex.org/W3038509227","https://openalex.org/W3041497362","https://openalex.org/W3042527829","https://openalex.org/W3108001324","https://openalex.org/W3114307879","https://openalex.org/W3130562791","https://openalex.org/W3161784205","https://openalex.org/W4205383771","https://openalex.org/W4212974603","https://openalex.org/W4226145938","https://openalex.org/W4226149406","https://openalex.org/W4226192813","https://openalex.org/W4294811216","https://openalex.org/W4308642907","https://openalex.org/W4380839239","https://openalex.org/W4385654366","https://openalex.org/W4387011013","https://openalex.org/W4388505035","https://openalex.org/W4388505074","https://openalex.org/W4398151212","https://openalex.org/W4399528510","https://openalex.org/W4401604046","https://openalex.org/W4401633947","https://openalex.org/W4402634982","https://openalex.org/W4406843814"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199","https://openalex.org/W2997078490"],"abstract_inverted_index":{"Conditional":[0],"privacy-preserving":[1],"authentication":[2],"(CPPA)":[3],"has":[4],"been":[5],"widely":[6],"studied":[7],"to":[8,72,88],"ensure":[9],"authentication,":[10,189],"anonymity,":[11,190],"and":[12,40,192,208,214],"traceability":[13],"in":[14,77,146,223],"vehicle":[15],"ad":[16],"hoc":[17],"networks":[18],"(VANETs).":[19],"Among":[20],"CPPA":[21,24],"schemes,":[22],"certificateless":[23],"(CL-CPPA)":[25],"offers":[26],"natural":[27],"advantages":[28],"for":[29,102,122,154],"VANETs":[30],"by":[31,92],"avoiding":[32],"the":[33,41,100,123,152,171,195,212],"complex":[34,155,202],"certificate":[35,75],"management":[36],"of":[37,45,74,126,164,170,197,216],"PKI-based":[38,78],"solutions":[39],"key":[42,114,156,203],"escrow":[43],"problem":[44],"identity-based":[46],"systems.":[47],"However,":[48,105],"many":[49],"existing":[50,106],"CL-CPPA":[51],"schemes":[52,109],"overlook":[53],"secure":[54,143,199],"message":[55,144],"communication.":[56],"When":[57],"confidentiality":[58,193],"is":[59,120],"required,":[60],"they":[61],"often":[62],"rely":[63],"on":[64,167],"additional":[65,198],"encryption,":[66],"which":[67,98,119,141],"adds":[68],"communication":[69,225],"overhead":[70,196],"comparable":[71],"that":[73,187],"transmission":[76],"solutions.":[79],"Anamorphic":[80],"signatures":[81,139],"(proposed":[82],"at":[83],"CRYPTO'23)":[84],"can":[85],"be":[86],"adopted":[87],"address":[89],"this":[90,129],"issue":[91],"embedding":[93],"sensitive":[94],"messages":[95],"within":[96],"signatures,":[97],"eliminates":[99],"need":[101,153],"separate":[103],"encryption.":[104],"anamorphic":[107,138],"signature":[108,173],"are":[110],"symmetric,":[111],"requiring":[112],"extensive":[113],"agreements":[115],"between":[116],"two":[117],"entities,":[118],"impractical":[121],"dynamic":[124],"nature":[125],"VANETs.":[127],"In":[128],"paper,":[130],"we":[131,180],"introduce":[132],"a":[133,147,161,168,185],"new":[134],"cryptographic":[135],"primitive,":[136],"asymmetric":[137],"(AAS),":[140],"enables":[142],"sharing":[145],"public-key":[148],"setting,":[149],"thus":[150],"eliminating":[151],"agreements.":[157,204],"We":[158],"also":[159],"provide":[160],"concrete":[162],"construction":[163],"AAS":[165,177],"based":[166],"variant":[169],"Hohenberger-Waters":[172],"scheme.":[174],"By":[175],"integrating":[176],"with":[178],"CL-CPPA,":[179],"propose":[181],"<italic":[182,217],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[183,218],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Sphinx</i>,":[184,219],"scheme":[186],"ensures":[188],"traceability,":[191],"without":[194],"transmissions":[200],"or":[201],"Our":[205],"security":[206],"proofs":[207],"performance":[209],"evaluations":[210],"demonstrate":[211],"practicality":[213],"efficiency":[215],"particularly":[220],"its":[221],"advantage":[222],"reducing":[224],"overhead.":[226]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
