[1] H. Zhong, S. Han, J. Cui, J. Zhang, and Y. Xu, “Privacy-preserving authentication scheme with full aggregation in VANET,” Information Sciences, vol. 476, pp. 211–221, 2019.##
[2] S. M. Pournaghi, M. Barmshoori, and M. Gardeshi, “An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs,” Journal of Electronic & Cyber Defence, vol. 3, pp. 1-12, 2015. (In Persian)##
[3] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15 pp. 39–68, 2007.##
[4] R. Lu, X. Lin, H. Zhu, P.H. Ho, and X. Shen, “Ecpp: efficient conditional privacy preservation protocol for secure vehicular communications,” IEEE INFOCOM 2008-The 27th Conference on Computer Communications, USA, pp. 1229-1237, 2008.##
[5] A. Shamir, “Identity-based cryptosystems and signature schemes,” Workshop on the theory and application of cryptographic techniques, Paris, France, pp. 47-53, 1984.##
[6] C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” IEEE INFOCOM 2008-The 27th Conference on Computer Communications, USA, pp. 246-250, 2008.##
[7] S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” International conference on the theory and application of cryptology and information security, Taipei, Taiwan, pp. 452-473, 2003.##
[8] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, pp. 416-432, 2003.##
[9] X. Cheng, J. Liu, and X. Wang, “Identity-based aggregate and verifiably encrypted signatures from bilinear pairing,” International Conference on Computational Science and Its Applications, Singapore, pp. 1046-1054, 2005.##
[10] C. Gentry and Z. Ramzan, “Identity-based aggregate signature,” International workshop on public key cryptography, New York, USA, pp. 257-273, 2006.##
[11] S. Lu, R. Ostrovsky and A. Sahai, “Sequential aggregate signatures and multi signatures without random oracles,” Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, pp. 465-485, 2006.##
[12] M. Ruckert and D. Schrode, “Aggregate and verifiably encrypted signatures from multilinear maps without random oracles,” International Conference on Information Security and Assurance, Seoul, Korea (Republic of), pp. 750-759, 2009.##
[13] Z. Shao, “Enhanced aggregate signature from pairings,” International Conference on Information Security and Cryptology, Seoul, Korea (Republic of), pp. 140-149, 2005.##
[14] K. Shim, “An Id-based aggregate signature scheme with constant pairing computations,” Journal of Systems and Software, vol. 83, pp. 1873-1880, 2010.##
[15] B. Y. Kang, “ID-based aggregate signature scheme with constant pairing computations: attack and new construction,” Journal of Computer Information System, vol. 16, pp. 6611- 6618, 2012.##
[16] Z. Gong, Y. Long, and X. Hong, “Two certificateless aggregate signatures from bilinear maps,” Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel Distributed Computing, Qingdao, China, pp. 188-193, 2007.##
[17] N. Yanai, R. Tso, and M. Mambo, “Certificateless ordered sequential aggregate signature scheme,” Third International Conference on Intelligent Networking and Collaborative Systems, Fukuoka, Japan, pp. 662-667, 2011.##
[18] L. Zhang and F. Zhang, “A new certificateless aggregate signature scheme,” Computer Communications, vol. 32, pp. 1079-1085, 2009.##
[19] L. Cheng, Q. Wen, and Z. Jin, “Cryptanalysis and improvement of a certificateless aggregate signature scheme,” Information Sciences, vol. 295, pp. 337-346, 2015.##
[20] S. Horng, S. Tzeng, and P. Huang, “An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks,” Information Sciences, vol. 317, pp. 48-66, 2015.##
[21] H. Du, M. Huang, and Q. Wen, “Efficient and provably-secure certificateless aggregate signature scheme,” Acta Electronica Sinica, vol. 41, pp. 72-76, 2013.##
[22] H. Chen, S. Wei, and C. Zhu, “Secure certificateless aggregate signature scheme,” Journal of Software, vol. 26 pp. 1173-1180, 2015.##
[23] H. Xiong, Z. Guan, Z. Chen, and F. Li, “An efficient certificateless aggregate signature with constant pairing computations,” Information Sciences, vol. 219, pp. 225–235, 2013.##
[24] D. He, M. Tian, and J. Chen, “Insecurity of an efficient certificateless aggregate signature with constant pairing computations,” Information Sciences, vol. 268, pp. 458–462, 2014.##
[25] H. Nie, Y. Li, W. Chen, and Y. Ding, “NCLAS: a novel and efficient certificateless aggregate signature scheme,” Security and Communication Networks, vol. 9, pp. 3141-3151, 2016.##
[26] N. Pakniat and M. Noroozi, “Cryptanalysis of a certificateless aggregate signature scheme,” 9th Conference of Command, Control, Communications and Computer Intelligence, Tehran, Iran, pp. 1-5, 2016.##
[27] Y. C. Chen, R. Tso, W. Susilo, X. Huang, and G. Horng, “Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes,” IACR Cryptology ePrint Archive, P. 193, 2013.##
[28] K. Hashimoto and W. Ogata, “Unrestricted and Compact Certificateless Aggregate Signature Scheme,” Information Sciences, vol. 487, pp. 97-114, 2019.##