{"id":"https://openalex.org/W4402616176","doi":"https://doi.org/10.3390/cryptography8030043","title":"CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs","display_name":"CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs","publication_year":2024,"publication_date":"2024-09-17","ids":{"openalex":"https://openalex.org/W4402616176","doi":"https://doi.org/10.3390/cryptography8030043"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8030043","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030043","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/cryptography8030043","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016700224","display_name":"Ahmad Mohamad Kabil","orcid":"https://orcid.org/0000-0003-3603-8185"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Ahmad Kabil","raw_affiliation_strings":["Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza 12588, Egypt"],"raw_orcid":"https://orcid.org/0000-0003-3603-8185","affiliations":[{"raw_affiliation_string":"Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza 12588, Egypt","institution_ids":["https://openalex.org/I57629906"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086270613","display_name":"Heba K. Aslan","orcid":"https://orcid.org/0000-0002-0821-5378"},"institutions":[{"id":"https://openalex.org/I4210156128","display_name":"Electronics Research Institute","ror":"https://ror.org/0532wcf75","country_code":"EG","type":"facility","lineage":["https://openalex.org/I4210094263","https://openalex.org/I4210156128"]},{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Heba Aslan","raw_affiliation_strings":["Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza 12588, Egypt","Informatics Department, Electronics Research Institute, Cairo 12622, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza 12588, Egypt","institution_ids":["https://openalex.org/I57629906"]},{"raw_affiliation_string":"Informatics Department, Electronics Research Institute, Cairo 12622, Egypt","institution_ids":["https://openalex.org/I4210156128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026193065","display_name":"Marianne A. Azer","orcid":"https://orcid.org/0000-0002-8068-5120"},"institutions":[{"id":"https://openalex.org/I4210165434","display_name":"National Telecommunications Institute","ror":"https://ror.org/05g82f642","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210165434"]},{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Marianne A. Azer","raw_affiliation_strings":["Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza 12588, Egypt","National Telecommunication Institute, Giza 12578, Egypt"],"raw_orcid":"https://orcid.org/0000-0002-8068-5120","affiliations":[{"raw_affiliation_string":"Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza 12588, Egypt","institution_ids":["https://openalex.org/I57629906"]},{"raw_affiliation_string":"National Telecommunication Institute, Giza 12578, Egypt","institution_ids":["https://openalex.org/I4210165434"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004461355","display_name":"Mohamed Rasslan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088986","display_name":"National Telecommunication Regulatory Authority","ror":"https://ror.org/007mwgz28","country_code":"EG","type":"government","lineage":["https://openalex.org/I4210088986"]},{"id":"https://openalex.org/I4210156128","display_name":"Electronics Research Institute","ror":"https://ror.org/0532wcf75","country_code":"EG","type":"facility","lineage":["https://openalex.org/I4210094263","https://openalex.org/I4210156128"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Mohamed Rasslan","raw_affiliation_strings":["Informatics Department, Electronics Research Institute, Cairo 12622, Egypt","National Telecommunications Regulatory Authority, Giza 12577, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Informatics Department, Electronics Research Institute, Cairo 12622, Egypt","institution_ids":["https://openalex.org/I4210156128"]},{"raw_affiliation_string":"National Telecommunications Regulatory Authority, Giza 12577, Egypt","institution_ids":["https://openalex.org/I4210088986"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016700224"],"corresponding_institution_ids":["https://openalex.org/I57629906"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.402,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.81759121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"8","issue":"3","first_page":"43","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6052108407020569},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5446240305900574},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45718759298324585},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4512282609939575},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4372381567955017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2675047516822815},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23258322477340698},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.17287787795066833}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6052108407020569},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5446240305900574},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45718759298324585},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4512282609939575},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4372381567955017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2675047516822815},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23258322477340698},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.17287787795066833},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8030043","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030043","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6a610b333a5b4dd8afdedffe4d4e8f25","is_oa":true,"landing_page_url":"https://doaj.org/article/6a610b333a5b4dd8afdedffe4d4e8f25","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 3, p 43 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8030043","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030043","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2166462813","https://openalex.org/W2567031504","https://openalex.org/W2801555828","https://openalex.org/W2955128325","https://openalex.org/W2966516618","https://openalex.org/W2972982523","https://openalex.org/W3003817629","https://openalex.org/W3080871722","https://openalex.org/W3129844607","https://openalex.org/W3161846591","https://openalex.org/W3166949498","https://openalex.org/W4206530253","https://openalex.org/W4300981833","https://openalex.org/W4312456366","https://openalex.org/W4376456749","https://openalex.org/W4377971468","https://openalex.org/W4380303681","https://openalex.org/W4385502481","https://openalex.org/W4386067386","https://openalex.org/W6751725164","https://openalex.org/W6845021308","https://openalex.org/W6855803943"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2354346723","https://openalex.org/W2978048732","https://openalex.org/W2104321465","https://openalex.org/W4250384982","https://openalex.org/W2393362322"],"abstract_inverted_index":{"Vehicular":[0],"ad":[1],"hoc":[2],"networks":[3],"(VANETs),":[4],"which":[5,24],"are":[6,72,105,174],"the":[7,37,95,143,179,188,193],"backbone":[8],"of":[9,27,39,124],"intelligent":[10],"transportation":[11],"systems":[12],"(ITSs),":[13],"facilitate":[14],"critical":[15,96],"data":[16],"exchanges":[17],"between":[18],"vehicles.":[19],"This":[20,59],"necessitates":[21],"secure":[22],"transmission,":[23],"requires":[25],"guarantees":[26],"message":[28,55],"availability,":[29],"integrity,":[30],"source":[31],"authenticity,":[32],"and":[33,49,90,135,171,220],"user":[34],"privacy.":[35],"Moreover,":[36],"traceability":[38],"network":[40],"participants":[41],"is":[42],"essential":[43],"as":[44],"it":[45,206],"deters":[46],"malicious":[47],"actors":[48],"allows":[50],"lawful":[51],"authorities":[52],"to":[53,74,94,114,131,177,197,217,223],"identify":[54],"senders":[56],"for":[57],"accountability.":[58],"introduces":[60,207],"a":[61,208],"challenge:":[62],"balancing":[63],"privacy":[64],"with":[65,110],"traceability.":[66],"Conditional":[67],"privacy-preserving":[68],"authentication":[69,158],"(CPPA)":[70],"schemes":[71,79,109],"designed":[73],"mitigate":[75],"this":[76,121,203],"conflict.":[77],"CPPA":[78],"utilize":[80],"cryptographic":[81],"protocols,":[82],"including":[83],"certificate-based":[84],"schemes,":[85,89],"group":[86],"signatures,":[87],"identity-based":[88],"certificateless":[91,108,115],"schemes.":[92,119],"Due":[93],"time":[97],"constraints":[98],"in":[99,142,182],"VANETs,":[100],"efficient":[101],"batch":[102,111,144,194],"verification":[103,112,145,172,195],"techniques":[104],"crucial.":[106],"Combining":[107],"leads":[113],"aggregate":[116],"signature":[117,170],"(CLAS)":[118],"In":[120],"paper,":[122],"cryptanalysis":[123],"Xiong\u2019s":[125,183],"CLAS":[126,149],"scheme":[127,150,213],"revealed":[128],"its":[129],"vulnerabilities":[130,181],"partial":[132],"key":[133],"replacement":[134,137],"identity":[136,157],"attacks,":[138],"alongside":[139],"mathematical":[140],"errors":[141],"process.":[146],"Our":[147,212],"proposed":[148],"remedies":[151],"these":[152],"issues":[153],"by":[154],"incorporating":[155],"an":[156],"module":[159,196],"that":[160],"leverages":[161],"chameleon":[162],"hashing":[163],"within":[164,192],"elliptic":[165],"curve":[166],"cryptography":[167],"(CHAM-CLAS).":[168],"The":[169],"modules":[173],"also":[175],"redesigned":[176],"address":[178],"identified":[180],"scheme.":[184],"Additionally,":[185],"we":[186],"implemented":[187],"small":[189],"exponents":[190],"test":[191],"achieve":[198],"Type":[199],"III":[200],"security.":[201],"While":[202],"enhances":[204],"security,":[205],"slight":[209],"performance":[210,221],"trade-off.":[211],"has":[214],"been":[215],"subjected":[216],"formal":[218],"security":[219],"analyses":[222],"ensure":[224],"robustness.":[225]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
