Home > Published Issues > 2026 > Volume 21, No. 2, 2026 >
JCM 2026 Vol.21(2): 261-273
Doi: 10.12720/jcm.21.2.261-273

Privacy-Preserving Software Engineering Protocol for V2V Charging Using Lattice- Based Linkable Ring Signature

Mustafa Moosa Qasim1,*, Murtadha Al-Maliki2,3, Jalal M. H. Altmemi4, Abdullah Almogahed5, Mahmood A. Al-Shareeda6,7,*, Mohammed Amin8, and Marwan Albahar9
1Department of Intelligent Medical Systems, College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq
2Department of Polymers and Petrochemicals Engineering, Oil and Gas Engineering College, Basrah University for Oil and Gas, Basrah, Iraq
3Department of Information and Communication Engineering, Alfarqadein University College, Iraq
4Information Technologies Management Department, Southern Technical University, Basrah, Iraq
5Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, Parit Raja, 84600, Johor, Malaysia
6Department of Electronic Technologies, Basra Technical Institute, Southern Technical University, Basra, 61001, Iraq
7College of Engineering, Al-Ayen University, Thi-Qar, Iraq
8King Abdullah the II IT School, Department of Computer Science, The University of Jordan, Amman, Jordan
9College of Engineering and Computing, Al-Lith Umm Al-Qura University, Makkah, Saudi Arabia
Email: Mustafa.mq87@uobasrah.edu.iq (M.M.Q); murtadha.almaliki@buog.edu.iq (M.A-M.); Jalal.altmemi@stu.edu.iq (J.M.H.A.); abdullahm@uthm.edu.my (A.A.); mahmood.alshareedah@stu.edu.iq (M.A.A-S.); m.almaiah@ju.edu.jo (M.A.A.), Mobaydat@kfu.edu.sa (M.A.)
*Corresponding author

Manuscript received September 15, 2025; revised October 24, 2025; accepted November 4, 2025; published March 27, 2026.

Abstract—The advances in Electric Vehicles (EVs) will intensify the demand of decentralized and privacypreserving Vehicle-to-Vehicle (V2V) charging schemes. However, current blockchain methods only protect the privacy of users from identity and linkability attack, quantum adversary attack. This paper introduces a lightweight and none-privacy-revealing CV2C charging protocol based on lattice-based linkable ring signatures over the Ring-SIS assumption, aiming at providing future postquantum secure communication with high degree of anonymity, unlinkability and accountability. We design key generation to be certificateless – containing no escrowed keys while facilitating scalable identity management, and provide a lattice-based stealth address scheme which generates onetime unlinkable payment addresses for increased recipient privacy. The protocol runs on a consortium blockchain and employs Practical Byzantine Fault Tolerance (PBFT) for fast validation of the transactions and transparency. A security analysis is provided and resistance against forgery, replay, and quantum attacks is shown. Performance analysis indicates that the required computational and communication overheads are much lower than those of elliptic-curve and pairing-based schemes, which reveals its suitability for EV environments with limited resources. The proposed scheme is a practical and secure structure for future V2V energy trading-based systems.

Keywords—lattice-based cryptography, ring-SIS, Vehicle-to-Vehicle (V2V) charging, privacy-preserving protocol, Electric Vehicle (EV) energy trading, stealth addresses

Cite: Mustafa Moosa Qasim, Murtadha Al-Maliki, Jalal M. H. Altmemi, Abdullah Almogahed, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, and Marwan Albahar, “Privacy-Preserving Software Engineering Protocol for V2V Charging Using Lattice-Based Linkable Ring Signature," Journal of Communications, vol. 21, no. 2, pp. 261-273, 2026.


Copyright © 2026 by the authors. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Article Metrics in Dimensions