An efficient task matching schema with signature oriented encryption technique

Authors

  • Arijita Bhowmik
  • Somen Debnath
  • Parijata Majumdar
  • R. Chawngsangpuii

Keywords:

Crowd sourcing,

Abstract

Crowdsourcing platforms have transformed task outsourcing by enabling large-
scale human collaboration over the internet. A key factor in their success is the
efficient matching of workers to tasks based on individual skills and preferences.
However, this process often involves sharing sensitive personal data, raising seri-
ous concerns about privacy and security. Existing solutions, such as traditional
encryption and proxy re-encryption, struggle to balance scalability with strong
privacy guarantees. In this paper, we propose a privacy-preserving task-matching
framework that utilizes ring verification signatures to safeguard user anonymity
and ensure data integrity. Unlike conventional methods, our approach removes
the dependency on proxy re-encryption and effectively mitigates risks related to
identity inference. We detail the system’s design, implementation, and security
analysis, demonstrating its practical effectiveness in preserving privacy within
dynamic and large-scale crowdsourcing environments.

Downloads

Published

2025-07-26

How to Cite

Arijita Bhowmik, Somen Debnath, Parijata Majumdar, & R. Chawngsangpuii. (2025). An efficient task matching schema with signature oriented encryption technique. Utilitas Mathematica, 122(1), 2378–2394. Retrieved from http://utilitasmathematica.com/index.php/Index/article/view/2528

Citation Check

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.