{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:54:09Z","timestamp":1726851249492},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Science Research Program"},{"DOI":"10.13039\/100010449","name":"Ministry of Education","doi-asserted-by":"publisher","award":["2020R1I1A3058605"],"id":[{"id":"10.13039\/100010449","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Blockchain Project"},{"name":"Ripple Centre of Excellence"},{"name":"CoE in Blockchain"},{"DOI":"10.13039\/501100023236","name":"IIIT Hyderabad","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100023236","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tvt.2022.3176755","type":"journal-article","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T20:48:52Z","timestamp":1653338932000},"page":"9853-9867","source":"Crossref","is-referenced-by-count":18,"title":["Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9743-6104","authenticated-orcid":false,"given":"Vikas","family":"Srivastava","sequence":"first","affiliation":[{"name":"Department of Mathematics, National Institute of Technology, Jamshedpur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6374-1410","authenticated-orcid":false,"given":"Sumit Kumar","family":"Debnath","sequence":"additional","affiliation":[{"name":"Department of Mathematics, National Institute of Technology, Jamshedpur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0872-0331","authenticated-orcid":false,"given":"Basudeb","family":"Bera","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"}]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0406-6547","authenticated-orcid":false,"given":"Youngho","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Kyungpook National University, Daegu, Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3346-7216","authenticated-orcid":false,"given":"Pascal","family":"Lorenz","sequence":"additional","affiliation":[{"name":"University of Haute Alsace, Mulhouse, France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-012-0470-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC.2017.8269745"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"ref5","first-page":"4037","article-title":"Internet of Vehicles (IoV) requirements, attacks and countermeasures","volume-title":"Proc. 5th Int. Conf. Comput. Sustainable Global Develop.","author":"Samad","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IIKI.2015.33"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3000576"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3009382"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030308"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2100016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3091163"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3109314"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3088115"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3126620"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3048238"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3094907"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08729-0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_17"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref20","volume-title":"Computers and Intractability: A. Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00608-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51938-4_14"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3327958.3329542"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxab077"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-020-00274-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95312-6_22"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62576-4_3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7897527"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3116896"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/e23111520"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/e23101364"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.1255"},{"key":"ref35","first-page":"173","article-title":"Practical byzantine fault tolerance","volume-title":"Proc. 3rd Symp. Operating Syst. Des. Implementation","author":"Castro","year":"1999"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.07.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_28"},{"key":"ref42","article-title":"From 5-pass MQ-based identification to MQ-based signatures","author":"Chen","year":"2016"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2780183"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.05.127"},{"key":"ref45","article-title":"Secure hash standard","volume-title":"FIPS PUB 180-1","author":"May","year":"1995"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2013.66"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3010008"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz013"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.5220\/0010580500002998"},{"key":"ref50","article-title":"Selecting and reducing key sizes for multivariate cryptography","author":"Petzoldt","year":"2013"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00050"},{"key":"ref53","first-page":"2093","article-title":"Pixel: Multi-signatures for consensus","volume-title":"Proc. USENIX Secur. Symp.","author":"Drijvers","year":"2020"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_9"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/9894033\/09779932.pdf?arnumber=9779932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:13:16Z","timestamp":1705961596000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9779932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":54,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2022.3176755","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}