| 1 | 林璟锵,荆继武,张琼露,等.PKI技术的近年研究综述[J].密码学报,2015,2(6):487-496.  10.13868/j.cnki.jcr.000095 | 
																													
																						|  | LIN J Q, JING J W, ZHANG Q L, et al. Recent advances in PKI technologies[J]. Journal of Cryptologic Research, 2015, 2(6): 487-496.  10.13868/j.cnki.jcr.000095 | 
																													
																						| 2 | BANKERS J, GAREFALAKIS T, SCHAFFELHOFER R, et al. Public key infrastructure in mobile systems[J]. IEEE Electronics and Commutation Engineering Journal, 2002, 14(5): 180-190.  10.1049/ecej:20020501 | 
																													
																						| 3 | SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of CRYPTO’84: Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1984: 47-53. | 
																													
																						| 4 | HE D, ZEADALLY S, XU B. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular Ad Hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2681-2691.  10.1109/tifs.2015.2473820 | 
																													
																						| 5 | RAJABZADEH A, SALMASIZADEH M, SUSILO W, et al. A secure and efficient authentication technique for Vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2018, 67(6): 5409-5423.  10.1109/tvt.2018.2822768 | 
																													
																						| 6 | TZENG S, HORNG S, LI T. Security and privacy for identity-based batch verification scheme in VANETs[J]. IEEE Transactions on Vehicular Technology, 2017, 66(4): 3235-3248.  10.1109/tvt.2015.2406877 | 
																													
																						| 7 | LI J, CHOO K, ZHANG W. EPA-CPPA: an efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J]. Vehicular Communications, 2018, 13: 104-113.  10.1016/j.vehcom.2018.07.001 | 
																													
																						| 8 | LO N, TSAI J. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(5): 1319-1328.  10.1109/tits.2015.2502322 | 
																													
																						| 9 | ZHANG L, ZHANG F. A new certificateless aggregate signature scheme[J]. Computer Communications, 2009, 32(6): 1079-1085.  10.1016/j.comcom.2008.12.042 | 
																													
																						| 10 | HORNG S, TZENG S, HUANG P, et al. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J]. Information Sciences, 2015, 317: 48-66.  10.1016/j.ins.2015.04.033 | 
																													
																						| 11 | MEI Q, XIONG H, CHEN J, et al. Efficient certificateless aggregate signature with conditional privacy preservation in IoV[J]. IEEE Systems Journal, 2021, 15(1): 245-256.  10.1109/jsyst.2020.2966526 | 
																													
																						| 12 | XU Z, HE D, KUMAR N, et al. Efficient certificateless aggregate signature scheme for performing secure routing in VANETs[J]. Security and Communication Networks, 2020, 2020(2): 1-12.  10.1155/2020/5276813 | 
																													
																						| 13 | 宋成,张明月,彭维平,等.车联网匿名认证方案研究[J].小型微型计算机系统,2018,39(5):899-903.  10.3969/j.issn.1000-1220.2018.05.007 | 
																													
																						|  | SONG C, ZHANG M Y, PENG W P, et al. Research on anonymous authentication scheme in VANET[J]. Journal of Chinese Computer Systems, 2018, 39(5): 899-903.  10.3969/j.issn.1000-1220.2018.05.007 | 
																													
																						| 14 | ALI I, LI F. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs[J]. Vehicular Communications, 2020, 22: 1-15.  10.1016/j.vehcom.2019.100228 | 
																													
																						| 15 | ZHANG L, WU Q, DOMINGO-FERRER J. Distributed aggregate privacy-preserving authentication in VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(3): 516-526.  10.1109/tits.2016.2579162 | 
																													
																						| 16 | 彭维平,熊长可,贺军义,等.边缘计算场景下车联网身份隐私保护方案研究[J].小型微型计算机系统,2020,41(11):2399-2406.  10.3969/j.issn.1000-1220.2020.11.027 | 
																													
																						|  | PENG W P, XIONG C K, HE J Y, et al. Research on the identity privacy protection scheme of Internet of vehicles in edge computing scenario[J]. Journal of Chinese Computer Systems, 2020, 41(11): 2399-2406.  10.3969/j.issn.1000-1220.2020.11.027 | 
																													
																						| 17 | 李聪聪.面向车联网信息安全问题的安全机制研究[D].北京:北京交通大学,2019:42-48. | 
																													
																						|  | LI C C. Research on secure mechanism in Internet of vehicles for information security issues[D]. Beijing: Beijing Jiaotong University, 2019: 42-48. | 
																													
																						| 18 | CUI J, WU D, ZHANG J, et al. An efficient authentication scheme based on semi-trusted authority in VANETs[J]. IEEE Transactions on Vehicular Technology, 2019, 68(3): 2972-2986.  10.1109/tvt.2019.2896018 | 
																													
																						| 19 | ALAZZAWI M, LU H, YASSIN A, et al. Efficient conditional anonymity with message integrity and authentication in a vehicular ad hoc network[J]. IEEE Access, 2019, 7: 71424-71435.  10.1109/access.2019.2919973 | 
																													
																						| 20 | WU G, ZHANG F, SHEN L, et al. Certificateless aggregate signature scheme secure against fully chosen-key attacks[J]. Information Sciences, 2019, 514: 288-301.  10.1016/j.ins.2019.11.037 | 
																													
																						| 21 | LIU J, YUEN T, AU M, et al. Improvements on an authentication scheme for vehicular sensor networks[J]. Expert Systems with Applications, 2014, 41(5): 2559-2564.  10.1016/j.eswa.2013.10.003 | 
																													
																						| 22 | 冯登国,刘敬彬,秦宇,等.创新发展中的可信计算理论与技术[J].中国科学:信息科学,2020,50(8):1127-1147.  10.1360/ssi-2020-0096 | 
																													
																						|  | FENG D G, LIU J B, QIN Y, et al. Trusted computing theory and technology in innovation-driven development[J]. Science China(Information Sciences), 2020, 50(8): 1127-1147.  10.1360/ssi-2020-0096 | 
																													
																						| 23 | BELLARE M. Random oracles are practical: a paradigm for designing efficient protocols [C]// Proceedings of the 1st Annual Conference on Computer and Communications Security. New York, ACM, 1993: 62-73.  10.1145/168588.168596 | 
																													
																						| 24 | 曾萍,郭瑞芳,赵耿,等.车载自组网中可证明安全的无证书批认证方案[J].计算机应用研究,2021,38(2):572-578.  10.19734/j.issn.1001-3695.2019.12.0682 | 
																													
																						|  | ZENG P, GUO R F, ZHAO G, et al. Provable security certificateless authentication scheme with batch verification for vehicular ad hoc network[J]. Application Research of Computers, 2021, 38(2): 572-578.  10.19734/j.issn.1001-3695.2019.12.0682 | 
																													
																						| 25 | POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.  10.1007/s001450010003 |