2 S. Murthy and S. Vivek
USD 230 billion by 2026. With such a huge reach, individual privacy and secu-
rity issues are always of primary concern. Ride-Hailing Service Providers (SP)
like Uber, Lyft, Ola provide services in many parts of the world. Among other
features, the SP facilitates ride booking and fare payment options for their cus-
tomers, namely riders who subscribe with the SP for RHS. Drivers of vehicles
such as cars and motorcycles sign-up with the SP in order to offer rides. At the
time of subscription, the SP collects private information of riders and drivers in
order to provide services effectively as well as required by local governance laws.
In addition, the SP collects statistics of riders and drivers for every ride that
is offered in its network. This naturally brings up the topic of individual data
privacy concerns from both riders as well as drivers over their data held by the
SP. Also, curious or malicious drivers or riders might be interested in learning
more about the other parties. There are a number of works and their analysis
in the literature that look at privacy-preserving RHS, we list some of them in
Section 5.
Huang et al. proposed pRide [4], a privacy-preserving online RHS protocol
that aims to provide the optimum driver in a global perspective thereby minimiz-
ing the unnecessary travel distance to pick the rider. The protocol makes use of
a deep learning model to predict emergence of new ride requests in a ride-hailing
region to enable the SP to make use of such prediction while matching optimum
drivers to ride requests. They show that by using such a prediction model in a
global perspective, the overall distance travelled by a matching driver is mini-
mized compared with matching a nearest driver in the local region. The protocol
proposes to use a Somewhat Homomorphic Encryption (SHE) scheme to encrypt
rider and driver locations. The advantage of using a homomorphic encryption
scheme is that it allows computations on ciphertexts so that the result of compu-
tation is available only after decryption. Fully Homomorphic Encryption (FHE)
schemes that support potentially any number of homomorphic operations have
high cost in terms of large ciphertexts and high computation latency. Hence,
many practical applications that know, a priori, the bound on the number of
homomorphic operations, prefer to use SHE schemes. In the pRide paper, the
authors use the FV cryptosystem [1] in the implementation of their scheme.
Even though applications make use of semantically secure cryptosystems, care-
ful analysis is required to make sure no unintended security holes are introduced
while adapting the cryptosystem to their applications.
The pRide protocol, described in more detail in Section 2, has two parts,
the basic protocol and an enhanced version. We discuss the basic protocol in
this paragraph. In the initialization phase, SP divides the area of its operation
into grids, the details of which are made available to all parties. SP keeps a
record of ride requests emanating from each grid over specific time epochs and
trains a prediction model using this information. It then uses this information to
predict the grid-based distribution of requests for the next period, denoted by
P R(g), namely the prediction result for grid id g. Drivers, registered with the
SP, submit their current grid id to the SP so that the SP can maintain the driver
distribution map. A rider who wishes to hail a ride, picks a (public key, secret