[1] KEMPTON W,TOMIĆ J.Vehicle-to-grid power fundamentals:calculating capacity and net revenue[J].Journal of Power Sources,2005,144(1):268-279. [2] 刘晓飞,张千帆,崔淑梅.电动汽车V2G技术综述[J].电工技术学报,2012,27(2):121-127.LIU X F,ZHANG Q F,CUI S M.Review of electric vehicle V2G technology[J].Transactions of China Electrotechnical Society,2012,27(2):121-127.(in Chinese) [3] 项顶,宋永华,胡泽春,等.电动汽车参与V2G的最优峰谷电价研究[J].中国电机工程学报,2013,33(31):15-25,2.XIANG D,SONG Y H,HU Z C,et al.Research on optimal time of use price for electric vehicle participating V2G[J].Proceedings of the CSEE,2013,33(31):15-25,2.(in Chinese) [4] SHEN J,TAN H,MOH S,et al.An efficient RFID authentication protocol providing strong privacy and security[EB/OL].[2022-08-05].https://kyushu-u.pure.elsevier.com/en/publications/an-efficient-rfid-authentication-protocol-providing-strong-privac#:~:text=To%20thwart%20different%20types%20of%20attacks%2C%20we%20propose,anonymity%20of%20tags%20in%20addition%20to%20tag%20untraceability. [5] SAXENA N,CHOI B J.Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks[J].IEEE Transactions on Information Forensics and Security,2016,11(7):1438-1452. [6] ZHANG J,ZHONG H,CUI J,et al.Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks[J].IEEE Transactions on Vehicular Technology,2020,69(7):7940-7954. [7] BANSAL G,NAREN N R,CHAMOLA V,et al.Lightweight mutual authentication protocol for V2G using physical unclonable function[J].IEEE Transactions on Vehicular Technology,2020,69(7):7234-7246. [8] FENG X,SHI Q C,XIE Q Q,et al.P2BA:a privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks[J].IEEE Transactions on Information Forensics and Security,2021,16:3888-3899. [9] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2022-08-05].https://bitcoin.org/en/bitcoin-paper. [10] WANG Y T,SU Z,XU Q C,et al.A novel charging scheme for electric vehicles with smart communities in vehicular networks[J].IEEE Transactions on Vehicular Technology,2019,68(9):8487-8501. [11] MA Z F,WANG X C,JAIN D K,et al.A blockchain-based trusted data management scheme in edge computing[J].IEEE Transactions on Industrial Informatics,2020,16(3):2013-2021. [12] WANG H Q,WANG Q H,HE D B,et al.BBARS:blockchain-based anonymous rewarding scheme for V2G networks[J].IEEE Internet of Things Journal,2019,6(2):3676-3687. [13] AITZHAN N Z,SVETINOVIC D.Security and privacy in decentralized energy trading through multi-signatures,blockchain and anonymous messaging streams[J].IEEE Transactions on Dependable and Secure Computing,2018,15(5):840-852. [14] PATIL A S,HAMZA R,HASSAN A,et al.Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts[J].Computers & Security,2020,97:101958. [15] LIU C,CHAI K K,ZHANG X S,et al.Adaptive blockchain-based electric vehicle participation scheme in smart grid platform[J].IEEE Access,2018,6:25657-25665. [16] WAN Z G,ZHANG T,LIU W Z,et al.Decentralized privacy-preserving fair exchange scheme for V2G based on blockchain[J].IEEE Transactions on Dependable and Secure Computing,2022,19(4):2442-2456. [17] JAVED M U,JAVAID N,MALIK M W,et al.Blockchain based secure,efficient and coordinated energy trading and data sharing between electric vehicles[J].Cluster Computing,2022,25(3):1839-1867. [18] BARBOSA M,FARSHIM P.Certificateless signcryption[C]//Proceedings of 2008 ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2008:369-372. [19] POINTCHEVAL D,STERN J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396. [20] ZHOU C,CUI Z,GAO G.Efficient identity-based generalized ring signcryption scheme[J].KSII Transactions on Internet and Information Systems,2016,10(12):5553-5571. [21] 孙华,孟坤.一种有效的无证书环签密方案[J].计算机科学,2014,41(11):208-211,238.SUN H,MENG K.An effective unlicensed ring signature scheme[J].Computer Science,2014,41(11):208-211,238.(in Chinese) [22] YU H,LIU J,WANG Z,et al.Certificateless ring signcryption for multi-source network coding[J].Computer Standards & Interfaces,2022,81:103602. [23] ZENG S,HUANG Y,LIU X.Privacy-preserving communication for VANETs with conditionally anonymous ring signature[J].International Journal of Network Security,2015,17(2):135-141. [24] IEEE trial-use standard for wireless access in vehicular environments-security services for applications and management messages:IEEE Std 1609.2-2006[EB/OL].[2022-08-05].https://ieeexplore.ieee.org/document/8691892. [25] 郭上铜,王瑞锦,张凤荔.区块链技术原理与应用综述[J].计算机科学,2021,48(2):271-281.GUO S T,WANG R J,ZHANG F L.Summary of principle and application of blockchain[J].Computer Science,2021,48(2):271-281.(in Chinese) |