{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:16:02Z","timestamp":1777043762127,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,8]]},"DOI":"10.1145\/3568160.3570234","type":"proceedings-article","created":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T11:17:23Z","timestamp":1669807043000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Lightweight Privacy-Preserving Ride-Sharing Protocols for Autonomous Cars"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5526-0817","authenticated-orcid":false,"given":"Sara","family":"Ramezanian","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Finland and Helsinki Institute for Information Technology (HIIT), Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8752-7232","authenticated-orcid":false,"given":"Gizem","family":"Akman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Finland and Helsinki Institute for Information Technology (HIIT), Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3888-6751","authenticated-orcid":false,"given":"Mohamed Taoufiq","family":"Damir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Finland and Helsinki Institute for Information Technology (HIIT), Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3228-4904","authenticated-orcid":false,"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Finland and Helsinki Institute for Information Technology (HIIT), Finland"}]}],"member":"320","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2016.09.017"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40534-016-0117-3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0743915619860137"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01233-z"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2318435"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_33"},{"key":"e_1_3_2_1_7_1","unstructured":"Ryan Browne. 2022. Uber investigates cybersecurity incident after reports of a hack on the company. https:\/\/www.cnbc.com\/2022\/09\/16\/uber-investigates-cybersecurity-incident-after-reports-of-a-hack.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243747"},{"key":"e_1_3_2_1_9_1","unstructured":"Joan Daemen and Vincent Rijmen. 2013. The Design of Rijndael AES \u2013 The Advanced Encryption Standard. (2013)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Whitfield Diffie and Martin\u00a0E Hellman. 2022. New directions in cryptography. In Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. 365\u2013390.","DOI":"10.1145\/3549993.3550007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2018.1493883"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232947"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0776-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.12.018"},{"key":"e_1_3_2_1_15_1","unstructured":"Carmit Hazay and Yehuda Lindell. 2010. A note on the relation between the definitions of security for semi-honest and malicious adversaries. Cryptology ePrint Archive(2010)."},{"key":"e_1_3_2_1_16_1","first-page":"5994","article-title":"Privacy-preserving partner selection for ride-sharing services","volume":"67","author":"He Yuanyuan","year":"2018","unstructured":"Yuanyuan He, Jianbing Ni, Xinyu Wang, Ben Niu, Fenghua Li, and Xuemin Shen. 2018. Privacy-preserving partner selection for ride-sharing services. IEEE Transactions on Vehicular Technology 67, 7 (2018), 5994\u20136005.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC49757.2020.00024"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12020842"},{"key":"e_1_3_2_1_19_1","unstructured":"Fortune\u00a0Business Insights. 2022. Ride sharing market size share and covid-19 impact analysis. https:\/\/www.fortunebusinessinsights.com\/ride-sharing-market-103336"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00434-7_1"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the International Conference on Security and Cryptography. IEEE, 114\u2013123","author":"Jeske Tobias","year":"2011","unstructured":"Tobias Jeske. 2011. Privacy-preserving smart metering without a trusted-third-party. In Proceedings of the International Conference on Security and Cryptography. IEEE, 114\u2013123."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56784-2_11"},{"key":"e_1_3_2_1_23_1","volume-title":"Public opinion on automated driving: Results of an international questionnaire among 5000 respondents. Transportation research part F: traffic psychology and behaviour 32","author":"Kyriakidis Miltos","year":"2015","unstructured":"Miltos Kyriakidis, Riender Happee, and Joost\u00a0CF de Winter. 2015. Public opinion on automated driving: Results of an international questionnaire among 5000 respondents. Transportation research part F: traffic psychology and behaviour 32 (2015), 127\u2013140."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872444"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7348038"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000558"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2920647"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878917"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48000-6_14"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154794"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2965065"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2569090"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1988.13369"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.06.006"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464323"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3094930"},{"key":"e_1_3_2_1_37_1","unstructured":"Uber team. 2022. Security update. https:\/\/www.uber.com\/newsroom\/security-update\/"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732966"},{"key":"e_1_3_2_1_39_1","first-page":"1","article-title":"The keyed-hash message authentication code (hmac)","volume":"198","author":"Turner M","year":"2008","unstructured":"James\u00a0M Turner. 2008. The keyed-hash message authentication code (hmac). Federal Information Processing Standards Publication 198, 1(2008), 1\u201313.","journal-title":"Federal Information Processing Standards Publication"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/jgt.22062"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2549508"},{"key":"e_1_3_2_1_43_1","volume-title":"Secure group communications using key graphs","author":"Wong Chung\u00a0Kei","year":"2000","unstructured":"Chung\u00a0Kei Wong, Mohamed Gouda, and Simon\u00a0S Lam. 2000. Secure group communications using key graphs. IEEE\/ACM transactions on networking 8, 1 (2000), 16\u201330."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.035"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030274"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2472529"},{"key":"e_1_3_2_1_47_1","volume-title":"2013 IEEE Global Communications Conference (GLOBECOM). IEEE, 820\u2013825","author":"Zhu Xiaoyan","year":"2013","unstructured":"Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, and Hui Li. 2013. Mobicache: When k-anonymity meets cache. In 2013 IEEE Global Communications Conference (GLOBECOM). IEEE, 820\u2013825."}],"event":{"name":"CSCS '22: Computer Science in Cars Symposium","location":"Ingolstadt Germany","acronym":"CSCS '22","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 6th ACM Computer Science in Cars Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568160.3570234","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568160.3570234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:26:15Z","timestamp":1750281975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568160.3570234"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":46,"alternative-id":["10.1145\/3568160.3570234","10.1145\/3568160"],"URL":"https:\/\/doi.org\/10.1145\/3568160.3570234","relation":{},"subject":[],"published":{"date-parts":[[2022,12,8]]},"assertion":[{"value":"2022-12-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}