{"id":"https://openalex.org/W4312865567","doi":"https://doi.org/10.1109/tiv.2022.3216949","title":"An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks","display_name":"An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks","publication_year":2022,"publication_date":"2022-11-03","ids":{"openalex":"https://openalex.org/W4312865567","doi":"https://doi.org/10.1109/tiv.2022.3216949"},"language":"en","primary_location":{"id":"doi:10.1109/tiv.2022.3216949","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tiv.2022.3216949","pdf_url":null,"source":{"id":"https://openalex.org/S4210199657","display_name":"IEEE Transactions on Intelligent Vehicles","issn_l":"2379-8858","issn":["2379-8858","2379-8904"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Vehicles","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100343755","display_name":"Yulin Liu","orcid":"https://orcid.org/0000-0003-1683-0255"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yulin Liu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy- Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy- Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075282181","display_name":"Zijian Bao","orcid":"https://orcid.org/0000-0002-2145-9713"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zijian Bao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100343755"],"corresponding_institution_ids":["https://openalex.org/I152269853","https://openalex.org/I37461747","https://openalex.org/I4210142748"],"apc_list":null,"apc_paid":null,"fwci":1.5665,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.82834819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"8","issue":"4","first_page":"2998","last_page":"3011"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6812019944190979},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6505411863327026},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.6271802186965942},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.6171945333480835},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5603212714195251},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5475373268127441},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.5470465421676636},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.54123455286026},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4964943528175354},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.48997893929481506},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47162866592407227},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4622713029384613},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.44181013107299805},{"id":"https://openalex.org/keywords/mobile-payment","display_name":"Mobile payment","score":0.43660563230514526},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.42017272114753723},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39135438203811646},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.27586543560028076},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09994566440582275},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0949036180973053}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6812019944190979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6505411863327026},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.6271802186965942},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.6171945333480835},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5603212714195251},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5475373268127441},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.5470465421676636},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.54123455286026},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4964943528175354},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.48997893929481506},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47162866592407227},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4622713029384613},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.44181013107299805},{"id":"https://openalex.org/C160949748","wikidata":"https://www.wikidata.org/wiki/Q1365703","display_name":"Mobile payment","level":3,"score":0.43660563230514526},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.42017272114753723},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39135438203811646},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.27586543560028076},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09994566440582275},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0949036180973053},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tiv.2022.3216949","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tiv.2022.3216949","pdf_url":null,"source":{"id":"https://openalex.org/S4210199657","display_name":"IEEE Transactions on Intelligent Vehicles","issn_l":"2379-8858","issn":["2379-8858","2379-8904"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Vehicles","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5449561768","display_name":null,"funder_award_id":"2020CFA052","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G7876586153","display_name":null,"funder_award_id":"62272238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W331197271","https://openalex.org/W827005847","https://openalex.org/W1514360972","https://openalex.org/W1521996283","https://openalex.org/W1528195422","https://openalex.org/W1533905858","https://openalex.org/W1885156594","https://openalex.org/W1998473519","https://openalex.org/W2039008359","https://openalex.org/W2071128014","https://openalex.org/W2092958856","https://openalex.org/W2107401406","https://openalex.org/W2127004097","https://openalex.org/W2128713393","https://openalex.org/W2129483619","https://openalex.org/W2132218667","https://openalex.org/W2292275324","https://openalex.org/W2472488043","https://openalex.org/W2565287832","https://openalex.org/W2596351484","https://openalex.org/W2789659149","https://openalex.org/W2794784663","https://openalex.org/W2801576183","https://openalex.org/W2883748642","https://openalex.org/W2907742243","https://openalex.org/W2931084620","https://openalex.org/W2947254643","https://openalex.org/W2954369705","https://openalex.org/W2984604380","https://openalex.org/W2999379079","https://openalex.org/W3010501990","https://openalex.org/W3032390444","https://openalex.org/W3105960206","https://openalex.org/W3130918512","https://openalex.org/W3166193519","https://openalex.org/W3188666578","https://openalex.org/W3202962202","https://openalex.org/W6801447458"],"related_works":["https://openalex.org/W2088632536","https://openalex.org/W2348693162","https://openalex.org/W2130094368","https://openalex.org/W2347733707","https://openalex.org/W2380366838","https://openalex.org/W2390277677","https://openalex.org/W2388085307","https://openalex.org/W2403363897","https://openalex.org/W2362491778","https://openalex.org/W2378267454"],"abstract_inverted_index":{"Vehicle-to-Grid":[0],"(V2G)":[1],"networks":[2],"are":[3],"potential":[4],"solutions":[5],"to":[6,23,52],"addressing":[7],"energy":[8],"and":[9,35,56,109,127],"environmental":[10],"challenges,":[11],"although":[12],"security":[13,108,114],"remains":[14],"a":[15,88],"key":[16],"concern.":[17],"For":[18],"example,":[19],"attackers":[20],"may":[21],"seek":[22],"obtain":[24],"private":[25],"information":[26],"from":[27],"frequent":[28],"electricity/service":[29],"exchanges":[30],"between":[31],"electric":[32],"vehicles":[33],"(EVs)":[34],"smart":[36],"grids":[37],"(SG)":[38],"in":[39,48,60,123,142],"V2G":[40,61,99,143],"networks.":[41],"While":[42],"there":[43],"have":[44],"been":[45],"successful":[46],"attempts":[47],"using":[49,100],"ring":[50,64,84],"signatures":[51],"achieve":[53],"privacy-preserving":[54],"payment":[55,66,96],"ensure":[57],"reliable":[58],"services":[59],"many":[62],"existing":[63,121],"signature-based":[65],"proposals":[67],"has":[68],"significant":[69],"signature":[70,85],"size.":[71,90],"To":[72],"address":[73],"the":[74,140],"aforementioned":[75],"problem,":[76],"we":[77],"propose":[78],"Emularis,":[79],"an":[80,94],"efficient":[81],"multilayered":[82],"linkable":[83],"scheme":[86,97,118,136],"with":[87],"logarithmic":[89],"We":[91,102],"also":[92],"implement":[93],"anonymous":[95],"for":[98,139],"Emularis.":[101],"then":[103],"prove":[104],"that":[105,134],"Emularis":[106],"guarantees":[107],"privacy":[110],"requirements":[111],"through":[112],"rigorous":[113],"analysis.":[115],"Furthermore,":[116],"our":[117,135],"significantly":[119],"outperforms":[120],"schemes":[122],"terms":[124],"of":[125],"communication":[126],"computation":[128],"costs.":[129],"Extensive":[130],"experimental":[131],"results":[132],"indicate":[133],"is":[137],"suitable":[138],"deployment":[141],"security-related":[144],"applications.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
