{"id":"https://openalex.org/W4404135947","doi":"https://doi.org/10.1145/3686540.3686541","title":"Multi-receiver Conditional Anonymous Signcryption Mechanism based on Multi-dimensional Decision Attributes for IoV","display_name":"Multi-receiver Conditional Anonymous Signcryption Mechanism based on Multi-dimensional Decision Attributes for IoV","publication_year":2024,"publication_date":"2024-05-29","ids":{"openalex":"https://openalex.org/W4404135947","doi":"https://doi.org/10.1145/3686540.3686541"},"language":"en","primary_location":{"id":"doi:10.1145/3686540.3686541","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3686540.3686541","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101883999","display_name":"Jiangjiang Zhang","orcid":"https://orcid.org/0000-0003-3308-5656"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiangjiang Zhang","raw_affiliation_strings":["Faculty of Information Technology,, Beijing University of Technology, China"],"raw_orcid":"https://orcid.org/0000-0003-3308-5656","affiliations":[{"raw_affiliation_string":"Faculty of Information Technology,, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049086178","display_name":"Yihang Luo","orcid":"https://orcid.org/0009-0007-0150-1906"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yihang Luo","raw_affiliation_strings":["Faculty of Information Technology,, Beijing University of Technology, China"],"raw_orcid":"https://orcid.org/0009-0007-0150-1906","affiliations":[{"raw_affiliation_string":"Faculty of Information Technology,, Beijing University of Technology, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101883999"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.3311,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67514027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.7772587537765503},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7714159488677979},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6278179883956909},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3474041223526001},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34258097410202026},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.15942242741584778},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10410058498382568}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.7772587537765503},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7714159488677979},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6278179883956909},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3474041223526001},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34258097410202026},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.15942242741584778},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10410058498382568},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3686540.3686541","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3686540.3686541","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G6157340375","display_name":null,"funder_award_id":"61971014","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2995611908","https://openalex.org/W3023755596","https://openalex.org/W3087229012","https://openalex.org/W3088631669","https://openalex.org/W3112926755","https://openalex.org/W3179090579","https://openalex.org/W3206749114","https://openalex.org/W4213455517","https://openalex.org/W4225594710","https://openalex.org/W4288430645","https://openalex.org/W4295935146","https://openalex.org/W4312727058","https://openalex.org/W4362597614","https://openalex.org/W4365130618","https://openalex.org/W4378376423","https://openalex.org/W4381302572","https://openalex.org/W4387042328","https://openalex.org/W4388505035"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2384216712","https://openalex.org/W54013283","https://openalex.org/W4247729863","https://openalex.org/W2361261002","https://openalex.org/W2003570966","https://openalex.org/W2030294917","https://openalex.org/W2162823500"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,10,30,52,126,146,154,172,188],"Vehicles":[3],"(IoV)":[4],"is":[5],"a":[6,53,80],"wireless":[7],"network":[8],"composed":[9],"intelligent":[11],"driving":[12],"vehicles":[13],"and":[14,37,46,58,78,123,134,150,179],"roadside":[15],"units":[16],"that":[17,164],"collaborate":[18],"to":[19,114],"improve":[20],"transportation":[21,31],"services.":[22],"On":[23,39],"the":[24,40,50,144,152,165,169,185],"one":[25],"hand,":[26,42],"this":[27,68,70],"revolutionary":[28],"mode":[29],"optimizes":[32],"traffic":[33],"efficiency,":[34],"reducing":[35],"congestion":[36],"accidents.":[38],"other":[41],"it":[43,102,137],"raises":[44],"security":[45,161],"privacy":[47],"concerns.":[48],"Therefore,":[49],"design":[51],"method":[54],"adopting":[55],"anonymous":[56,105],"techniques":[57],"secure":[59,93,139],"data":[60,97,112,131,141,149],"processing":[61],"procedures":[62],"becomes":[63],"particularly":[64],"urgent.":[65],"To":[66],"address":[67],"issue,":[69],"paper":[71],"combines":[72],"attribute-based":[73],"credentials":[74],"with":[75,107],"multi-receiver":[76],"encryption":[77,133],"proposes":[79],"Multi-Receiver":[81],"Conditional":[82],"Anonymous":[83],"Signcryption":[84],"based":[85],"on":[86],"Multi-Dimensional":[87],"Decision":[88],"Attributes":[89],"(MRCAS-MDDA)":[90],"scheme":[91,167],"for":[92,95],"challenges":[94],"trustworthy":[96],"transmission":[98],"in":[99],"IoV.":[100],"Specifically,":[101],"achieves":[103,168],"conditional":[104],"authentication":[106],"selective":[108],"attribute":[109,121],"disclosure,":[110],"allowing":[111],"owners":[113],"self-disclose":[115],"certain":[116],"attributes,":[117],"anonymously":[118],"authenticate":[119],"their":[120],"qualifications,":[122],"achieve":[124],"traceability":[125],"malicious":[127],"behavior.":[128],"Simultaneously,":[129],"through":[130],"signature":[132],"non-signature":[135],"encryption,":[136],"enables":[138],"one-to-many":[140],"sharing,":[142],"preventing":[143],"leakage":[145],"sensitive":[147],"IoV":[148],"alleviating":[151],"waste":[153],"limited":[155],"computational":[156,186],"resources.":[157],"In":[158],"addition,":[159],"rigorous":[160],"analysis":[162],"indicates":[163],"MRCAS-MDDA":[166],"expected":[170],"properties":[171],"confidentiality,":[173],"anonymity,":[174],"fine-grained":[175],"identity":[176],"verification,":[177],"traceability,":[178],"non-repudiation.":[180],"Experimental":[181],"results":[182],"further":[183],"demonstrate":[184],"effectiveness":[187],"MRCAS-MDDA.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
