{"id":"https://openalex.org/W4210785486","doi":"https://doi.org/10.1109/tvt.2022.3147875","title":"Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network","display_name":"Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network","publication_year":2022,"publication_date":"2022-02-01","ids":{"openalex":"https://openalex.org/W4210785486","doi":"https://doi.org/10.1109/tvt.2022.3147875"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2022.3147875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2022.3147875","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010928672","display_name":"Quanrun Li","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Quanrun Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002476927","display_name":"Zhichao Yang","orcid":"https://orcid.org/0000-0002-2797-4257"},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhichao Yang","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, China","institution_ids":["https://openalex.org/I2800710378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022673825","display_name":"Qi Xie","orcid":"https://orcid.org/0000-0002-8808-3124"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Xie","raw_affiliation_strings":["Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, and the Department of Electrical and Computer, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, and the Department of Electrical and Computer, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010928672"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":4.6169,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.95534314,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"71","issue":"4","first_page":"4336","last_page":"4347"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7922419309616089},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7568617463111877},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.6934873461723328},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6855928897857666},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6363727450370789},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5640344619750977},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4906665086746216},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.455314040184021},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45349985361099243},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42554113268852234},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4171365201473236},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3510255515575409},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2759058475494385},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22706404328346252}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7922419309616089},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7568617463111877},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.6934873461723328},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6855928897857666},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6363727450370789},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5640344619750977},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4906665086746216},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.455314040184021},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45349985361099243},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42554113268852234},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4171365201473236},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3510255515575409},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2759058475494385},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22706404328346252},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2022.3147875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2022.3147875","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1741003700","display_name":null,"funder_award_id":"2020010601012187","funder_id":"https://openalex.org/F4320326713","funder_display_name":"Wuhan Municipal Science and Technology Bureau"},{"id":"https://openalex.org/G3423709866","display_name":null,"funder_award_id":"61932016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5449561768","display_name":null,"funder_award_id":"2020CFA052","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G6286192115","display_name":null,"funder_award_id":"61972294","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G881984649","display_name":null,"funder_award_id":"2020KJ010301","funder_id":"https://openalex.org/F4320321106","funder_display_name":"Ministry of Education of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321106","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null},{"id":"https://openalex.org/F4320326713","display_name":"Wuhan Municipal Science and Technology Bureau","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W121367636","https://openalex.org/W1667889362","https://openalex.org/W1998473519","https://openalex.org/W2006757318","https://openalex.org/W2016358833","https://openalex.org/W2038761522","https://openalex.org/W2073245107","https://openalex.org/W2121247918","https://openalex.org/W2122991569","https://openalex.org/W2130410178","https://openalex.org/W2135825595","https://openalex.org/W2137469879","https://openalex.org/W2511060964","https://openalex.org/W2556252096","https://openalex.org/W2586333888","https://openalex.org/W2805096948","https://openalex.org/W2893205406","https://openalex.org/W2903608625","https://openalex.org/W2914739373","https://openalex.org/W2921960465","https://openalex.org/W2962412866","https://openalex.org/W2980828401","https://openalex.org/W2991330758","https://openalex.org/W2997804494","https://openalex.org/W3007971370","https://openalex.org/W3011392375","https://openalex.org/W3027424440","https://openalex.org/W3038509227","https://openalex.org/W3206934513"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W2771454953","https://openalex.org/W3046762796","https://openalex.org/W3202102306","https://openalex.org/W3046260513","https://openalex.org/W2998294818","https://openalex.org/W45347327","https://openalex.org/W2020269557"],"abstract_inverted_index":{"Vehicular":[0],"ad":[1],"hoc":[2],"network":[3],"(VANET)":[4],"underpins":[5],"most":[6,46],"intelligent":[7],"transportation":[8],"systems":[9],"and":[10,84],"given":[11],"the":[12,16,23,44,96,102,110],"open":[13],"nature":[14],"of":[15,30,38,47,113],"wireless":[17],"communication":[18],"environment,":[19],"edge":[20],"nodes":[21],"in":[22,43,95],"VANET":[24],"are":[25,34,58],"subject":[26],"to":[27,61,79],"varying":[28],"levels":[29],"attacks.":[31,64],"While":[32],"there":[33],"a":[35,70],"large":[36],"number":[37],"conditional":[39,72],"privacy-preserving":[40,73],"authentication":[41,74,83],"protocols":[42,49],"literature,":[45],"these":[48],"(whose":[50],"security":[51],"is":[52,93],"guaranteed":[53],"by":[54,116],"classical":[55],"cryptographic":[56],"primitives)":[57],"not":[59],"designed":[60,78],"resist":[62],"quantum":[63],"In":[65],"this":[66],"paper,":[67],"we":[68,108],"propose":[69],"lattice-based":[71],"protocol":[75,92,115],"for":[76],"VANETs,":[77],"simultaneously":[80],"achieve":[81],"mutual":[82],"privacy":[85],"protection.":[86],"We":[87],"also":[88],"show":[89],"that":[90],"our":[91,114],"secure":[94],"random":[97],"oracle":[98],"model,":[99],"relying":[100],"on":[101],"small":[103],"integer":[104],"solution":[105],"problem.":[106],"Additionally,":[107],"demonstrate":[109],"potential":[111],"utility":[112],"evaluating":[117],"its":[118],"performance.":[119]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
