{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T05:48:56Z","timestamp":1740808136309,"version":"3.38.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021ZD0112802"],"award-info":[{"award-number":["2021ZD0112802"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332007","62072215","U23A20303","U22B2028","62302194"],"award-info":[{"award-number":["62332007","62072215","U23A20303","U22B2028","62302194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Major Project of Tibetan Autonomous Region of China","award":["XZ202201ZD0006G"],"award-info":[{"award-number":["XZ202201ZD0006G"]}]},{"name":"Guangzhou Basic Research Plan City-School Joint Funding Project","award":["2024A03J0405"],"award-info":[{"award-number":["2024A03J0405"]}]},{"name":"Guangzhou Basic and Applied Basic Research Foundation","award":["2024A04J3458"],"award-info":[{"award-number":["2024A04J3458"]}]},{"name":"Open Research Fund of Machine Learning and Cyber Security Interdiscipline Research Engineering Center of Jiangsu Province","award":["SDGC2131"],"award-info":[{"award-number":["SDGC2131"]}]},{"name":"National Joint Engineering Research Center of Network Security Detection and Protection Technology"},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving","award":["2023B1212060036"],"award-info":[{"award-number":["2023B1212060036"]}]},{"name":"Guangdong Hong Kong Joint Laboratory for Data Security and Privacy protection"},{"name":"Engineering Research Center of Trustworthy AI, Ministry of Education"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3544453","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:46:10Z","timestamp":1740509170000},"page":"2372-2386","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and Privacy-Preserving Ride Matching Over Road Networks Against Malicious ORH Server"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7329-5893","authenticated-orcid":false,"given":"Mingtian","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7958-6571","authenticated-orcid":false,"given":"Anjia","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9817-0267","authenticated-orcid":false,"given":"Min-Rong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science, South China Normal University, Guangzhou, China"}]},{"given":"Huang","family":"Zeng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1722-6746","authenticated-orcid":false,"given":"Yi","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6488-9732","authenticated-orcid":false,"given":"Xiaoli","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6860-647X","authenticated-orcid":false,"given":"Zhihua","family":"Xia","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"volume-title":"Ride-Hailing Market Size & Share Analysis\u2014Growth Trends & Forecasts (2023\u20132028)","year":"2024","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIFS.2024.3354414"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.14722\/ndss.2019.23052"},{"key":"ref4","first-page":"1235","article-title":"ORide: A privacy-preserving yet accountable ride-hailing service","volume-title":"Proc. 26th USENIX Secur. Symp. (USENIX Secur.)","author":"Pham"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIFS.2018.2885282"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TVT.2019.2941761"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSC.2020.3022875"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TITS.2023.3286804"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1515\/popets-2017-0015"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIFS.2021.3065832"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TVT.2018.2868869"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CNS.2018.8433221"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TITS.2020.3024000"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1023\/A:1025153016110"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1007\/978-3-319-96881-0_26","article-title":"SPD Z\u2082k: Efficient MPC mod 2k for dishonest majority","volume-title":"Advances in Cryptology\u2014CRYPTO 2018","volume":"10992","author":"Cramer","year":"2018"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIFS.2022.3196271"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SFCS.2001.959888"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3372297.3417872"},{"volume-title":"Python Paillier Library","year":"2013","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-030-56880-1_28"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/11535331_16"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TSC.2013.55"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/MASS.2019.00023"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TIFS.2023.3282133"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/3600160.3605040"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.3390\/electronics12040915"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/JIOT.2022.3184991"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TVT.2019.2905522"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TrustCom50675.2020.00085"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TVT.2022.3225175"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TDSC.2022.3192367"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-030-37231-6_24"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3212480.3212483"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TDSC.2019.2931295"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TITS.2022.3221139"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/JIOT.2020.3030274"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/JIOT.2020.3023920"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TIFS.2023.3290486"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TIFS.2022.3181855"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TDSC.2021.3130571"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10902421.pdf?arnumber=10902421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T18:43:18Z","timestamp":1740768198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10902421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3544453","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}