{"title":"Cloud-assisted verifiable and traceable multi-party threshold private set intersection protocol for ride-sharing scheme","authors":"Qing Wu , Xijia Dong , Leyou Zhang , Yue Lei , Ziquan Zhao","doi":"10.1016/j.jisa.2025.104256","DOIUrl":null,"url":null,"abstract":"<div><div>In recent years, ride-sharing services have experienced widespread adoption due to their ability to significantly reduce travel costs and carbon emissions. However, as the demand for ride-sharing increases, users are faced with growing challenges related to privacy protection and data security during the process of sharing transportation resources. In particular, there is a pressing need for effective solutions to mitigate the risks of the leakage of personally sensitive information and insufficient security verification. To address these challenges, a cloud-assisted, traceable ride-sharing scheme is proposed, leveraging a multi-party threshold private set intersection (MP-TPSI) protocol integrated with a digital signature verification mechanism. The proposed framework comprises an innovative MP-TPSI protocol, which includes two primary components: a multi-party cardinality testing phase that employs a secure comparison protocol (SCP) to determine if the intersection size surpasses a predefined threshold, coupled with a Proof of Ownership protocol to trace malicious users; and a PSI phase that securely computes the intersection using cloud-assisted computation. Furthermore, digital signature technology is incorporated to establish a robust verification framework, which ensures the authenticity of user identities and effectively mitigates the risks associated with ride mismatches and privacy leakage. Finally, comparative evaluation results demonstrate that the proposed MP-TPSI protocol achieves effective privacy protection with lower communication and computational overhead compared to existing schemes.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104256"},"PeriodicalIF":3.7000,"publicationDate":"2025-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002935","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, ride-sharing services have experienced widespread adoption due to their ability to significantly reduce travel costs and carbon emissions. However, as the demand for ride-sharing increases, users are faced with growing challenges related to privacy protection and data security during the process of sharing transportation resources. In particular, there is a pressing need for effective solutions to mitigate the risks of the leakage of personally sensitive information and insufficient security verification. To address these challenges, a cloud-assisted, traceable ride-sharing scheme is proposed, leveraging a multi-party threshold private set intersection (MP-TPSI) protocol integrated with a digital signature verification mechanism. The proposed framework comprises an innovative MP-TPSI protocol, which includes two primary components: a multi-party cardinality testing phase that employs a secure comparison protocol (SCP) to determine if the intersection size surpasses a predefined threshold, coupled with a Proof of Ownership protocol to trace malicious users; and a PSI phase that securely computes the intersection using cloud-assisted computation. Furthermore, digital signature technology is incorporated to establish a robust verification framework, which ensures the authenticity of user identities and effectively mitigates the risks associated with ride mismatches and privacy leakage. Finally, comparative evaluation results demonstrate that the proposed MP-TPSI protocol achieves effective privacy protection with lower communication and computational overhead compared to existing schemes.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.