{"id":"https://openalex.org/W4411232294","doi":"https://doi.org/10.1109/tvt.2025.3579252","title":"A CCA-Secure Pairing-Free Broadcast Proxy Re-Encryption Scheme for VANETs","display_name":"A CCA-Secure Pairing-Free Broadcast Proxy Re-Encryption Scheme for VANETs","publication_year":2025,"publication_date":"2025-06-12","ids":{"openalex":"https://openalex.org/W4411232294","doi":"https://doi.org/10.1109/tvt.2025.3579252"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2025.3579252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2025.3579252","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113428630","display_name":"Binhan Li","orcid":"https://orcid.org/0009-0003-6276-4321"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Binhan Li","raw_affiliation_strings":["School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042776527","display_name":"Lunzhi Deng","orcid":"https://orcid.org/0000-0002-9688-1062"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lunzhi Deng","raw_affiliation_strings":["School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100338905","display_name":"Huan Liu","orcid":"https://orcid.org/0000-0001-8694-3736"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Liu","raw_affiliation_strings":["School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114463319","display_name":"Yiming Mou","orcid":null},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiming Mou","raw_affiliation_strings":["School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010284059","display_name":"Yunyun Qu","orcid":"https://orcid.org/0000-0002-1999-8638"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunyun Qu","raw_affiliation_strings":["School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Guizhou Provincial Specialized Key Laboratory of Information Security Technology in Higher Education Institutions, Guizhou Normal University, Guiyang, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100461419","display_name":"Na Wang","orcid":"https://orcid.org/0000-0002-8687-8820"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Na Wang","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5113428630"],"corresponding_institution_ids":["https://openalex.org/I154893126"],"apc_list":null,"apc_paid":null,"fwci":2.2473,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.88478772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"74","issue":"11","first_page":"17999","last_page":"18011"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.7916340827941895},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.6392254829406738},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6148378849029541},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6144834756851196},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6107532382011414},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6090623736381531},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5190489888191223},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5019526481628418},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35371851921081543},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.33367788791656494},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.2066650390625},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19802069664001465}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.7916340827941895},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.6392254829406738},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6148378849029541},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6144834756851196},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6107532382011414},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6090623736381531},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5190489888191223},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5019526481628418},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35371851921081543},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33367788791656494},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.2066650390625},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19802069664001465},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2025.3579252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2025.3579252","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1569083856","https://openalex.org/W1590823599","https://openalex.org/W1890078278","https://openalex.org/W1980669413","https://openalex.org/W1987493859","https://openalex.org/W2014671777","https://openalex.org/W2060583899","https://openalex.org/W2114428623","https://openalex.org/W2152924492","https://openalex.org/W2332376784","https://openalex.org/W2524864610","https://openalex.org/W2610388846","https://openalex.org/W2898459335","https://openalex.org/W2904103940","https://openalex.org/W2912211337","https://openalex.org/W3013008354","https://openalex.org/W3022461538","https://openalex.org/W3110422524","https://openalex.org/W3155408793","https://openalex.org/W3159761532","https://openalex.org/W3170680081","https://openalex.org/W3196423474","https://openalex.org/W3200072650","https://openalex.org/W4285241838","https://openalex.org/W4312270844","https://openalex.org/W4362689999","https://openalex.org/W4364320740","https://openalex.org/W4365129214","https://openalex.org/W4379116771","https://openalex.org/W4381886295","https://openalex.org/W4384434280","https://openalex.org/W4385300809","https://openalex.org/W4386322364","https://openalex.org/W4389474225","https://openalex.org/W4390120191","https://openalex.org/W4391093111","https://openalex.org/W4394627600","https://openalex.org/W4405815970"],"related_works":["https://openalex.org/W3015473028","https://openalex.org/W3201176751","https://openalex.org/W1993094293","https://openalex.org/W2029180842","https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W2158897804","https://openalex.org/W2286370870","https://openalex.org/W3173222018","https://openalex.org/W767161385"],"abstract_inverted_index":{"In":[0,80],"VANETs,":[1],"vehicles":[2,23],"encrypt":[3],"collected":[4],"data":[5,46,51,124],"(such":[6],"as":[7],"vehicle":[8],"status,":[9],"road":[10],"congestion,":[11],"temperature,":[12],"etc.)":[13],"and":[14,36,114,123,134],"send":[15,37],"the":[16,27,33,121,129],"ciphertext":[17,35],"to":[18,31,39,94,107],"roadside":[19,28],"units.":[20],"When":[21],"other":[22,95],"request":[24],"this":[25,81],"data,":[26],"units":[29],"need":[30],"re-encrypt":[32],"corresponding":[34],"it":[38,57,103,115,127],"these":[40],"vehicles.":[41,125],"Broadcast":[42],"proxy":[43,65,88,122],"re-encryption":[44,66,89],"ensures":[45],"confidentiality":[47],"while":[48],"facilitating":[49],"encrypted":[50],"sharing":[52],"among":[53],"multiple":[54],"users,":[55],"making":[56],"suitable":[58,75],"for":[59,76,91],"VANETs.":[60,92],"However,":[61],"most":[62],"existing":[63],"broadcast":[64,87],"schemes":[67],"rely":[68],"on":[69],"pairing":[70,133],"operations,":[71,136],"which":[72],"are":[73],"not":[74],"vehicular":[77],"communication":[78],"devices.":[79],"paper,":[82],"we":[83],"propose":[84],"an":[85],"identity-based":[86],"scheme":[90,98],"Compared":[93],"schemes,":[96],"our":[97],"has":[99,104],"two":[100],"advantages.":[101],"First,":[102],"been":[105],"proven":[106],"be":[108],"indistinguishable":[109],"against":[110],"chosen-ciphertext":[111],"attacks":[112,119],"(CCAs),":[113],"can":[116],"resist":[117],"collusion":[118],"by":[120],"Second,":[126],"avoids":[128],"use":[130],"of":[131],"bilinear":[132],"hash-to-point":[135],"thereby":[137],"reducing":[138],"computational":[139],"costs.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-23T23:15:26.331081","created_date":"2025-10-10T00:00:00"}
