{"id":"https://openalex.org/W4385300809","doi":"https://doi.org/10.1109/tifs.2023.3299466","title":"Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs","display_name":"Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385300809","doi":"https://doi.org/10.1109/tifs.2023.3299466"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3299466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3299466","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100701249","display_name":"Jing Zhang","orcid":"https://orcid.org/0000-0001-7417-9689"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065464152","display_name":"Shuangshuang Su","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuangshuang Su","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100701249"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":8.6515,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.98332758,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"4830","last_page":"4842"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.841046154499054},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.728043794631958},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7177599668502808},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6874929070472717},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6656782627105713},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.6430822014808655},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5592672228813171},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5232328772544861},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4734886586666107},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.46474000811576843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45115506649017334},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4500466287136078},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4406234622001648},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.4215725064277649},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4201130270957947},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30041277408599854},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09950441122055054},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07194700837135315}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.841046154499054},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.728043794631958},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7177599668502808},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6874929070472717},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6656782627105713},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.6430822014808655},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5592672228813171},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5232328772544861},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4734886586666107},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.46474000811576843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45115506649017334},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4500466287136078},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4406234622001648},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.4215725064277649},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4201130270957947},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30041277408599854},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09950441122055054},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07194700837135315},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3299466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3299466","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1765855239","display_name":null,"funder_award_id":"62202008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4383131963","display_name":null,"funder_award_id":"ESSCKF 2022\u201304","funder_id":"https://openalex.org/F4320330479","funder_display_name":"Key Laboratory of Embedded System and Service Computing Ministry of Education (Tonji University)"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8841839404","display_name":null,"funder_award_id":"2208085QF196","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320330479","display_name":"Key Laboratory of Embedded System and Service Computing Ministry of Education (Tonji University)","ror":null},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1498599941","https://openalex.org/W1569083856","https://openalex.org/W1963941691","https://openalex.org/W1993310758","https://openalex.org/W2051108754","https://openalex.org/W2053797511","https://openalex.org/W2086042811","https://openalex.org/W2135825595","https://openalex.org/W2402799701","https://openalex.org/W2811094379","https://openalex.org/W2890173132","https://openalex.org/W2912211337","https://openalex.org/W2928224894","https://openalex.org/W2983694339","https://openalex.org/W2997239008","https://openalex.org/W2997854921","https://openalex.org/W3003703236","https://openalex.org/W3007400813","https://openalex.org/W3013008354","https://openalex.org/W3014625547","https://openalex.org/W3091074232","https://openalex.org/W3096547803","https://openalex.org/W3104151607","https://openalex.org/W3112090628","https://openalex.org/W3118241334","https://openalex.org/W3128779213","https://openalex.org/W3159116648","https://openalex.org/W3172959128","https://openalex.org/W3199373481","https://openalex.org/W3200796075","https://openalex.org/W4214547157","https://openalex.org/W4226339489","https://openalex.org/W4285724896","https://openalex.org/W4362672264","https://openalex.org/W4365129214","https://openalex.org/W6629567917","https://openalex.org/W6772816594","https://openalex.org/W6810616473"],"related_works":["https://openalex.org/W2792978874","https://openalex.org/W2396704985","https://openalex.org/W3042932947","https://openalex.org/W1972631883","https://openalex.org/W2997442751","https://openalex.org/W2035692780","https://openalex.org/W2516093999","https://openalex.org/W2068013785","https://openalex.org/W2531200144","https://openalex.org/W1987493859"],"abstract_inverted_index":{"Data":[0,123],"sharing":[1,151],"is":[2,57,140,179],"an":[3,91],"integral":[4],"part":[5],"of":[6,63,69,133],"vehicular":[7],"ad":[8],"hoc":[9],"networks":[10],"(VANETs),":[11],"which":[12],"provide":[13],"drivers":[14],"with":[15],"safe":[16],"and":[17,100,166],"comfortable":[18],"driving":[19],"environments.":[20],"However,":[21,46],"when":[22],"data":[23,64,78,106,150],"are":[24],"shared":[25],"among":[26],"multiple":[27,33],"vehicles,":[28],"they":[29],"must":[30,72],"be":[31,73,114],"encrypted":[32],"times.":[34],"Some":[35],"solutions":[36],"have":[37,49],"used":[38],"identity-based":[39,92],"broadcast":[40,93],"encryption":[41],"to":[42,60,97,152],"solve":[43],"this":[44],"problem.":[45],"these":[47,86],"schemes":[48],"two":[50],"major":[51],"limitations.":[52],"First,":[53],"the":[54,61,67,77,82,131,137],"decryption":[55,138],"cost":[56],"linearly":[58],"related":[59],"number":[62],"receivers,":[65,135],"where":[66,136],"identity":[68],"other":[70,134],"receivers":[71,124],"known.":[74],"Second,":[75],"only":[76],"sender":[79,107],"can":[80,113,125,146],"forward":[81],"data.":[83],"To":[84],"address":[85],"important":[87],"deficiencies,":[88],"we":[89],"propose":[90],"proxy":[94],"re-encryption":[95],"scheme":[96,145,162,173,178],"realize":[98],"flexible":[99],"efficient":[101],"data-sharing":[102],"in":[103],"VANETs.":[104,184],"The":[105],"generates":[108],"a":[109,167],"fixed":[110],"ciphertext":[111,127],"that":[112,160,171],"obtained":[115],"by":[116],"newly":[117],"added":[118],"vehicles":[119],"through":[120],"authorized":[121],"vehicles.":[122],"decrypt":[126],"directly":[128],"without":[129],"knowing":[130],"identities":[132],"overhead":[139],"constant.":[141],"In":[142],"addition,":[143],"our":[144,161,172],"achieve":[147],"complete":[148],"anonymous":[149],"protect":[153],"vehicle":[154],"privacy.":[155],"A":[156],"security":[157],"proof":[158],"shows":[159,170],"has":[163],"sufficient":[164],"security,":[165],"performance":[168],"analysis":[169],"performs":[174],"well.":[175],"Our":[176],"proposed":[177],"thus":[180],"suitable":[181],"for":[182],"securing":[183]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":26},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
