{"id":"https://openalex.org/W4386598263","doi":"https://doi.org/10.1109/tifs.2023.3314211","title":"Conditional Privacy-Preserving Multi-Domain Authentication and Pseudonym Management for 6G-Enabled IoV","display_name":"Conditional Privacy-Preserving Multi-Domain Authentication and Pseudonym Management for 6G-Enabled IoV","publication_year":2023,"publication_date":"2023-09-11","ids":{"openalex":"https://openalex.org/W4386598263","doi":"https://doi.org/10.1109/tifs.2023.3314211"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3314211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3314211","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076835003","display_name":"Guanjie Cheng","orcid":"https://orcid.org/0000-0003-2080-3903"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4210149102","display_name":"Sanya University","ror":"https://ror.org/04fa2qd52","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210149102"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guanjie Cheng","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Hangzhou, China","Hainan Institute of Zhejiang University, Sanya, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]},{"raw_affiliation_string":"Hainan Institute of Zhejiang University, Sanya, China","institution_ids":["https://openalex.org/I4210149102","https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086670321","display_name":"Junqin Huang","orcid":"https://orcid.org/0000-0002-1306-9088"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junqin Huang","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115076549","display_name":"Yewei Wang","orcid":"https://orcid.org/0009-0000-3180-2135"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yewei Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071321132","display_name":"Jun Zhao","orcid":"https://orcid.org/0000-0002-3004-7091"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jun Zhao","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Cluny Road, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Cluny Road, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072308822","display_name":"Linghe Kong","orcid":"https://orcid.org/0000-0001-9266-3044"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linghe Kong","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055284175","display_name":"Shuiguang Deng","orcid":"https://orcid.org/0000-0001-5015-6095"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4210149102","display_name":"Sanya University","ror":"https://ror.org/04fa2qd52","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210149102"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuiguang Deng","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Hangzhou, China","Hainan Institute of Zhejiang University, Sanya, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]},{"raw_affiliation_string":"Hainan Institute of Zhejiang University, Sanya, China","institution_ids":["https://openalex.org/I4210149102","https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026573330","display_name":"Xueqiang Yan","orcid":"https://orcid.org/0009-0002-6166-7303"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xueqiang Yan","raw_affiliation_strings":["Wireless Technology Laboratory, Huawei Technologies Company Ltd., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Wireless Technology Laboratory, Huawei Technologies Company Ltd., Shanghai, China","institution_ids":["https://openalex.org/I2250955327"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5076835003"],"corresponding_institution_ids":["https://openalex.org/I168879160","https://openalex.org/I4210149102","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":13.3584,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.98776122,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"10206","last_page":"10220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9621000289916992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9212999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8207447528839111},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.6005585789680481},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5746654272079468},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43938344717025757},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.42594146728515625},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.4141380786895752},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4135262072086334},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37169259786605835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8207447528839111},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.6005585789680481},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5746654272079468},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43938344717025757},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.42594146728515625},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.4141380786895752},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4135262072086334},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37169259786605835},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3314211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3314211","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G5147415844","display_name":null,"funder_award_id":"2022YFB4500100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5151241140","display_name":null,"funder_award_id":"U20A20173","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5604630631","display_name":null,"funder_award_id":"62125206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W2127004097","https://openalex.org/W2131789459","https://openalex.org/W2169194339","https://openalex.org/W2528950352","https://openalex.org/W2660887482","https://openalex.org/W2792045232","https://openalex.org/W3010858269","https://openalex.org/W3011989826","https://openalex.org/W3021462936","https://openalex.org/W3045974732","https://openalex.org/W3082335637","https://openalex.org/W3084999539","https://openalex.org/W3135398899","https://openalex.org/W3155946113","https://openalex.org/W3174304286","https://openalex.org/W3174306128","https://openalex.org/W3188554269","https://openalex.org/W3192880923","https://openalex.org/W3195696782","https://openalex.org/W3201410046","https://openalex.org/W3211884550","https://openalex.org/W3211928361","https://openalex.org/W4205383771","https://openalex.org/W4207078917","https://openalex.org/W4210357908","https://openalex.org/W4210388377","https://openalex.org/W4210975871","https://openalex.org/W4214728329","https://openalex.org/W4220782410","https://openalex.org/W4223646336","https://openalex.org/W4225439776","https://openalex.org/W4226014446","https://openalex.org/W4226192813","https://openalex.org/W4226217485","https://openalex.org/W4281389235","https://openalex.org/W4283651860","https://openalex.org/W4285123037","https://openalex.org/W4285226905","https://openalex.org/W4285289117","https://openalex.org/W4310009742","https://openalex.org/W4312304622","https://openalex.org/W4312768612","https://openalex.org/W4313461186"],"related_works":["https://openalex.org/W4253825384","https://openalex.org/W2383532021","https://openalex.org/W2130966263","https://openalex.org/W4385451301","https://openalex.org/W4384080261","https://openalex.org/W2963285411","https://openalex.org/W3080258714","https://openalex.org/W4285170105","https://openalex.org/W2810652557","https://openalex.org/W3011490454"],"abstract_inverted_index":{"With":[0],"the":[1,4,9,18,27,30,36,45,84,123,167,171,180,184],"emergence":[2],"of":[3,11,35,67,188],"sixth-generation":[5],"(6G)":[6],"communication":[7],"technologies,":[8],"Internet":[10],"Vehicles":[12],"(IoV)":[13],"is":[14],"rapidly":[15],"developing":[16],"with":[17,100],"coordination":[19],"between":[20],"intelligent":[21],"networked":[22],"vehicles,":[23],"road":[24],"infrastructures,":[25],"and":[26,32,41,69,114,186,191],"cloud.":[28],"However,":[29],"openness":[31],"dynamic":[33],"nature":[34],"IoV":[37,60],"raise":[38],"significant":[39],"security":[40,154,172,177],"privacy":[42,102],"concerns,":[43],"highlighting":[44],"need":[46],"for":[47,58,138],"efficient":[48,139],"authentication":[49,52,78,98],"schemes.":[50],"Conventional":[51],"schemes":[53],"are":[54],"no":[55],"longer":[56],"suitable":[57],"6G-enabled":[59],"due":[61],"to":[62,150],"high":[63],"latency,":[64],"single":[65],"point":[66],"failure,":[68],"heavy":[70],"management":[71,147],"costs.":[72],"Additionally,":[73,141],"existing":[74],"literature":[75],"on":[76],"multi-domain":[77,97],"mainly":[79],"investigates":[80],"vehicle":[81,88],"mobility,":[82],"ignoring":[83],"challenges":[85],"posed":[86],"by":[87,155],"heterogeneity.":[89],"To":[90],"fill":[91],"this":[92],"gap,":[93],"we":[94,127,142],"propose":[95,143],"a":[96,129,144,157],"scheme":[99,133,148],"conditional":[101],"preservation":[103],"(MACPP)":[104],"that":[105,166],"considers":[106],"administrative":[107],"domains":[108,116],"(":[109,117],"<italic":[110,118],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[111,119],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AD</i>":[112],")":[113,121],"geographic":[115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">GD</i>":[120],"in":[122],"IoV.":[124],"In":[125],"MACPP,":[126],"design":[128],"novel":[130],"identity-based":[131],"signature":[132],"without":[134],"requiring":[135],"bilinear":[136],"pairing":[137],"authentication.":[140],"blockchain-assisted":[145],"pseudonym":[146],"(BAPM)":[149],"further":[151],"improve":[152],"system":[153],"designing":[156],"dynamical":[158],"sparse":[159],"Merkle":[160],"tree":[161],"structure":[162],"(DSMT).":[163],"We":[164],"demonstrate":[165,183],"proposed":[168],"MACPP":[169,190],"satisfies":[170],"requirements":[173],"through":[174],"an":[175],"in-depth":[176],"analysis.":[178],"Moreover,":[179],"experimental":[181],"results":[182],"effectiveness":[185],"efficiency":[187],"both":[189],"BAPM.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":12}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
