{"id":"https://openalex.org/W7133198555","doi":"https://doi.org/10.3390/jcp6020044","title":"A Lightweight Post-Quantum Anonymous Attestation Framework for Traceable and Comprehensive Privacy Preservation in VANETs","display_name":"A Lightweight Post-Quantum Anonymous Attestation Framework for Traceable and Comprehensive Privacy Preservation in VANETs","publication_year":2026,"publication_date":"2026-03-02","ids":{"openalex":"https://openalex.org/W7133198555","doi":"https://doi.org/10.3390/jcp6020044"},"language":"en","primary_location":{"id":"doi:10.3390/jcp6020044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp6020044","pdf_url":"https://www.mdpi.com/2624-800X/6/2/44/pdf?version=1772791799","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/6/2/44/pdf?version=1772791799","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012143127","display_name":"Esti Rahmawati Agustina","orcid":null},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Esti Rahmawati Agustina","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"],"raw_orcid":"https://orcid.org/0009-0006-4917-8127","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127861926","display_name":"Kalamullah Ramli","orcid":null},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Kalamullah Ramli","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"],"raw_orcid":"https://orcid.org/0000-0002-0374-4465","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088357477","display_name":"Ruki Harwahyu","orcid":"https://orcid.org/0000-0003-3580-9128"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Ruki Harwahyu","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"],"raw_orcid":"https://orcid.org/0000-0003-3580-9128","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031234998","display_name":"Teddy Surya Gunawan","orcid":"https://orcid.org/0000-0003-3345-4669"},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Teddy Surya Gunawan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Kuala Lumpur 50728, Malaysia"],"raw_orcid":"https://orcid.org/0000-0003-3345-4669","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Kuala Lumpur 50728, Malaysia","institution_ids":["https://openalex.org/I4164984"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Muhammad Salman","orcid":"https://orcid.org/0009-0004-8282-1108"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Muhammad Salman","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"],"raw_orcid":"https://orcid.org/0009-0004-8282-1108","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067665567","display_name":"Andriani Adi Lestari","orcid":"https://orcid.org/0000-0001-6613-4114"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Andriani Adi Lestari","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"],"raw_orcid":"https://orcid.org/0000-0001-6613-4114","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033385626","display_name":"Arif Rahman Hakim","orcid":"https://orcid.org/0009-0000-7621-0301"},"institutions":[{"id":"https://openalex.org/I21881038","display_name":"IPB University","ror":"https://ror.org/05smgpd89","country_code":"ID","type":"education","lineage":["https://openalex.org/I21881038"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Arif Rahman Hakim","raw_affiliation_strings":["Department of Cybersecurity, Politeknik Siber dan Sandi Negara, Bogor 16120, Jawa Barat, Indonesia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, Politeknik Siber dan Sandi Negara, Bogor 16120, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I21881038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I29617571"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37846181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"2","first_page":"44","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6736999750137329},{"id":"https://openalex.org/keywords/goodput","display_name":"Goodput","score":0.6395000219345093},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5442000031471252},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4984000027179718},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.42640000581741333},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.39089998602867126},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.3702999949455261},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.34040001034736633},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.3142000138759613}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7373999953269958},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6736999750137329},{"id":"https://openalex.org/C94022561","wikidata":"https://www.wikidata.org/wiki/Q1172393","display_name":"Goodput","level":4,"score":0.6395000219345093},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5442000031471252},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5055000185966492},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4984000027179718},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4652999937534332},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.42640000581741333},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.39089998602867126},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3702999949455261},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.34040001034736633},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3142000138759613},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2874999940395355},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.2824000120162964},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.25540000200271606},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.25189998745918274},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp6020044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp6020044","pdf_url":"https://www.mdpi.com/2624-800X/6/2/44/pdf?version=1772791799","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8118d58be64d4ed5b56a4d22341f8235","is_oa":true,"landing_page_url":"https://doaj.org/article/8118d58be64d4ed5b56a4d22341f8235","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 6, Iss 2, p 44 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp6020044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp6020044","pdf_url":"https://www.mdpi.com/2624-800X/6/2/44/pdf?version=1772791799","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4313155687","display_name":null,"funder_award_id":"Hibah Publikasi Terindeks Internasional (PUTI) Q1 Kolaborasi Internasional Scheme under Contract: PKS-291/UN2.RST/HKP.05.00/2025","funder_id":"https://openalex.org/F4320323819","funder_display_name":"Universitas Indonesia"},{"id":"https://openalex.org/G5293640192","display_name":null,"funder_award_id":"Contract: KEP1526/LPDP/LPDP.3/2022","funder_id":"https://openalex.org/F4320328515","funder_display_name":"Lembaga Pengelola Dana Pendidikan"}],"funders":[{"id":"https://openalex.org/F4320323819","display_name":"Universitas Indonesia","ror":"https://ror.org/0116zj450"},{"id":"https://openalex.org/F4320328515","display_name":"Lembaga Pengelola Dana Pendidikan","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7133198555.pdf","grobid_xml":"https://content.openalex.org/works/W7133198555.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Vehicular":[0],"ad":[1],"hoc":[2],"networks":[3],"(VANETs)":[4],"require":[5],"authentication":[6],"systems":[7],"that":[8],"balance":[9],"privacy,":[10],"scalability,":[11],"and":[12,28,43,47,55,71,95,101,108,127,164,171,177,180,187],"post-quantum":[13,32],"security.":[14],"While":[15],"lattice-based":[16],"V-LDAA":[17],"offers":[18],"quantum":[19],"resistance,":[20],"it":[21],"faces":[22],"challenges":[23],"in":[24,189],"signature":[25],"size,":[26],"traceability,":[27],"integration.":[29],"We":[30],"propose":[31],"traceable":[33],"direct":[34],"anonymous":[35],"attestation":[36],"(PQ-TDAA),":[37],"combining":[38],"National":[39],"Institute":[40,76],"of":[41,124],"Standards":[42,75],"Technology":[44],"(NIST)-standard":[45],"Dilithium2":[46],"Falcon-512":[48],"signatures":[49,54],"with":[50,112],"adapted":[51],"Beullens-style":[52],"blind":[53],"Fiat\u2013Shamir":[56],"simplified":[57],"Schnorr":[58],"proofs,":[59],"reducing":[60],"proof":[61],"size":[62],"by":[63],"69.2%":[64],"(8":[65],"kB":[66],"vs.":[67],"V-LDAA\u2019s":[68],"26":[69],"kB)":[70],"supporting":[72,152],"European":[73],"Telecommunications":[74],"Technical":[77],"Specification":[78],"(ETSI":[79],"TS)":[80],"102":[81],"941-compliant":[82],"traceability":[83],"through":[84,174],"Road":[85],"Side":[86],"Unit":[87],"(RSU)-assisted":[88],"verification.":[89],"Evaluated":[90],"using":[91],"SageMath,":[92],"Python":[93],"3.11,":[94],"NS-3,":[96],"PQ-TDAA-Falcon-512":[97],"achieves":[98],"8.1":[99],"ms":[100,103,144,149],"49.7":[102],"end-to-end":[104],"delays":[105],"at":[106],"10":[107],"20":[109],"vehicles,":[110],"respectively,":[111],"64.7":[113],"Mbps":[114],"goodput":[115],"on":[116,133],"congested":[117],"802.11p":[118],"channels,":[119],"showing":[120],"promise":[121],"for":[122,184],"densities":[123],"\u226450":[125],"vehicles":[126],"advantages":[128],"over":[129],"Dilithium2.":[130],"Real-world":[131],"validation":[132],"ARM":[134],"Cortex-A76":[135],"(Raspberry":[136],"Pi":[137],"5,":[138],"emulating":[139],"automotive":[140],"OBUs)":[141],"yields":[142],"sub-0.5":[143],"V2V":[145],"cycles":[146],"within":[147],"100":[148],"beacon":[150],"intervals,":[151],"practical":[153],"embedded":[154],"deployment.":[155],"Future":[156],"work":[157],"will":[158],"extend":[159],"PQ-TDAA":[160],"to":[161],"emerging":[162],"5G":[163],"NR-V2X":[165],"settings,":[166],"integrate":[167],"more":[168],"realistic":[169],"mobility":[170],"channel":[172],"models":[173],"coupled":[175],"NS-3":[176],"SUMO":[178],"co-simulation,":[179],"investigate":[181],"side-channel":[182],"resistance":[183],"enhanced":[185],"scalability":[186],"robustness":[188],"real":[190],"deployments.":[191]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-03T00:00:00"}
