{"id":"https://openalex.org/W4391168103","doi":"https://doi.org/10.3390/cryptography8010004","title":"Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks","display_name":"Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks","publication_year":2024,"publication_date":"2024-01-24","ids":{"openalex":"https://openalex.org/W4391168103","doi":"https://doi.org/10.3390/cryptography8010004"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010004","pdf_url":"https://www.mdpi.com/2410-387X/8/1/4/pdf?version=1706069616","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/8/1/4/pdf?version=1706069616","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016700224","display_name":"Ahmad Mohamad Kabil","orcid":"https://orcid.org/0000-0003-3603-8185"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ahmad Mohamad Kabil","raw_affiliation_strings":["School of Information Technology & Computer Science, Nile University, Cairo 3247010, Egypt"],"affiliations":[{"raw_affiliation_string":"School of Information Technology & Computer Science, Nile University, Cairo 3247010, Egypt","institution_ids":["https://openalex.org/I57629906"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086270613","display_name":"Heba K. Aslan","orcid":"https://orcid.org/0000-0002-0821-5378"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Heba Aslan","raw_affiliation_strings":["School of Information Technology & Computer Science, Nile University, Cairo 3247010, Egypt"],"affiliations":[{"raw_affiliation_string":"School of Information Technology & Computer Science, Nile University, Cairo 3247010, Egypt","institution_ids":["https://openalex.org/I57629906"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026193065","display_name":"Marianne A. Azer","orcid":"https://orcid.org/0000-0002-8068-5120"},"institutions":[{"id":"https://openalex.org/I4210165434","display_name":"National Telecommunications Institute","ror":"https://ror.org/05g82f642","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210165434"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Marianne Azer","raw_affiliation_strings":["National Telecommunications Institute, Cairo 3650108, Egypt"],"affiliations":[{"raw_affiliation_string":"National Telecommunications Institute, Cairo 3650108, Egypt","institution_ids":["https://openalex.org/I4210165434"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026193065"],"corresponding_institution_ids":["https://openalex.org/I4210165434"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.4214,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57783343,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"8","issue":"1","first_page":"4","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.659975528717041},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6548789739608765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5339682698249817},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4789769649505615},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4376850128173828},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3583357334136963},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26664024591445923},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0970485508441925},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.05993342399597168}],"concepts":[{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.659975528717041},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6548789739608765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5339682698249817},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4789769649505615},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4376850128173828},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3583357334136963},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26664024591445923},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0970485508441925},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.05993342399597168}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010004","pdf_url":"https://www.mdpi.com/2410-387X/8/1/4/pdf?version=1706069616","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:28d1b401d399422ba7c0c51210dfe68e","is_oa":true,"landing_page_url":"https://doaj.org/article/28d1b401d399422ba7c0c51210dfe68e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 1, p 4 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010004","pdf_url":"https://www.mdpi.com/2410-387X/8/1/4/pdf?version=1706069616","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4391168103.pdf"},"referenced_works_count":53,"referenced_works":["https://openalex.org/W1552222267","https://openalex.org/W2016358833","https://openalex.org/W2018468667","https://openalex.org/W2021516337","https://openalex.org/W2039768170","https://openalex.org/W2058242263","https://openalex.org/W2073245107","https://openalex.org/W2091804958","https://openalex.org/W2121247918","https://openalex.org/W2128628587","https://openalex.org/W2152924492","https://openalex.org/W2316899877","https://openalex.org/W2791462427","https://openalex.org/W2794799331","https://openalex.org/W2801555828","https://openalex.org/W2804236074","https://openalex.org/W2892192415","https://openalex.org/W2897645146","https://openalex.org/W2905646440","https://openalex.org/W2921960465","https://openalex.org/W2955128325","https://openalex.org/W2966516618","https://openalex.org/W2997804494","https://openalex.org/W3003817629","https://openalex.org/W3005811485","https://openalex.org/W3007971370","https://openalex.org/W3030080700","https://openalex.org/W3049715847","https://openalex.org/W3134621771","https://openalex.org/W3161846591","https://openalex.org/W3176185637","https://openalex.org/W3202394346","https://openalex.org/W4241366606","https://openalex.org/W4300981833","https://openalex.org/W4304688205","https://openalex.org/W4309331204","https://openalex.org/W4312456366","https://openalex.org/W4362514692","https://openalex.org/W4382119219","https://openalex.org/W4386067386","https://openalex.org/W6633418448","https://openalex.org/W6750351774","https://openalex.org/W6751725164","https://openalex.org/W6757846544","https://openalex.org/W6772728137","https://openalex.org/W6773519493","https://openalex.org/W6782131937","https://openalex.org/W6797378719","https://openalex.org/W6801991441","https://openalex.org/W6845021308","https://openalex.org/W6845384191","https://openalex.org/W6846923204","https://openalex.org/W6855803943"],"related_works":["https://openalex.org/W2065606738","https://openalex.org/W1951321098","https://openalex.org/W235656858","https://openalex.org/W2111375262","https://openalex.org/W1991205173","https://openalex.org/W2109048960","https://openalex.org/W2741481635","https://openalex.org/W2038165453","https://openalex.org/W2163664197","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Conditional":[0],"Privacy":[1],"Preserving":[2],"Authentication":[3],"(CPPA)":[4],"schemes":[5,39,161],"are":[6],"an":[7],"effective":[8],"way":[9],"of":[10,44],"securing":[11],"communications":[12],"in":[13,32,37,100,115,129,144,165],"vehicular":[14],"ad":[15],"hoc":[16],"networks":[17],"(VANETs),":[18],"as":[19,21],"well":[20],"ensuring":[22],"user":[23],"privacy":[24],"and":[25,65,77,84,137,154],"accountability.":[26],"Cryptanalysis":[27],"plays":[28],"a":[29,52,119],"crucial":[30],"role":[31],"pointing":[33,140],"out":[34,79,98,141],"the":[35,42,135,142,166],"vulnerabilities":[36,143],"existing":[38],"to":[40,82,104,111,150],"enable":[41],"development":[43],"more":[45],"resilient":[46],"ones.":[47],"In":[48,70,87],"2019,":[49],"Zhang":[50],"proposed":[51,118],"CPPA":[53],"scheme":[54,76,90,124,146],"for":[55],"VANET":[56],"security":[57],"(PA-CRT),":[58],"based":[59],"on":[60],"identity":[61],"batch":[62],"verification":[63],"(IBV)":[64],"Chinese":[66],"Remainder":[67],"Theorem":[68],"(CRT).":[69],"this":[71,130],"paper,":[72],"we":[73,96,108,133],"cryptanalyze":[74],"Zhang\u2019s":[75,89],"point":[78,97],"its":[80],"vulnerability":[81],"impersonation":[83],"repudiation":[85],"attacks.":[86,113],"2023,":[88],"was":[91],"cryptanalyzed":[92,128],"by":[93,139],"Tao;":[94],"however,":[95],"flaws":[99],"Tao\u2019s":[101,112],"cryptanalysis":[102],"due":[103],"invalid":[105],"assumptions;":[106],"hence,":[107],"propose":[109],"countermeasures":[110,138],"Furthermore,":[114],"2021,":[116],"Xiong":[117],"Certificateless":[120],"Aggregate":[121],"Signature":[122],"(CLAS)":[123],"which":[125],"is":[126],"also":[127],"paper.":[131],"Finally,":[132],"analyze":[134],"causes":[136],"each":[145],"that":[147,157],"enabled":[148],"us":[149],"launch":[151],"successful":[152],"attacks":[153,164],"proposing":[155],"changes":[156],"would":[158],"fortify":[159],"these":[160],"against":[162],"similar":[163],"future.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
