
Briefing
The research addresses the critical vulnerability of Location-Based Services (LBS) to third-party trust deficits and collusion attacks by introducing a novel dual-protection framework. This foundational breakthrough integrates asymmetric encryption and Shamir’s secret sharing to cryptographically secure user query content with a distributed key, while simultaneously employing collaborative location generalization for anonymity. The system’s operational security is maintained by a temporary private blockchain that uses a Token-based equity Proof-of-Stake consensus, which, combined with a competitive incentive mechanism, ensures both confidential data transmission and timely, non-repudiable collaboration. This theory provides a new architectural blueprint for decentralized systems requiring provable data privacy and high participant engagement in untrusted environments.

Context
Prior to this work, privacy protection in Location-Based Services primarily relied on centralized anonymizer servers or simplistic collaborative models, which created a single point of failure and introduced a trust deficit with the third-party entity. The prevailing challenge was the inability to simultaneously guarantee the confidentiality of the query content, the anonymity of the user’s location, and the liveness of the collaborative network, especially when facing collusive or uncooperative participants. This limitation fundamentally restricted the deployment of privacy-preserving decentralized applications in real-time services.

Analysis
The core mechanism is the cryptographic decoupling of data security from a single trusted authority via a $(t, n)$ threshold scheme. The user encrypts their query and splits the decryption key into $n$ fragments using Shamir’s secret sharing, distributing them to collaborative users. Location privacy is achieved by having $n-1$ users cooperate to generalize the real location into an anonymous region, which is a form of distributed $k$-anonymity.
The key fragments are verifiably managed on a temporary private blockchain, where a priority-response consensus mechanism, governed by token-based equity, incentivizes collaborators to submit their fragments promptly. The final decryption key is reconstructed using Lagrange interpolation only when a threshold $t$ of fragments is correctly submitted, ensuring that no single party, including the LBS server, can compromise both the location and the query.

Parameters
- t and n Threshold Scheme → The minimum number of key fragments ($t$) required out of the total fragments ($n$) to reconstruct the decryption key via Lagrange interpolation.
- Experimental Accuracy (95%) → The measured effectiveness of the framework in correctly matching service requests after applying the dual-protection and anonymization strategies.
- Experimental Sensitivity (97.85%) → The measured ability of the framework to correctly identify and process legitimate service requests within the collaborative privacy network.

Outlook
This framework establishes a new paradigm for building privacy-preserving decentralized applications beyond LBS, specifically enabling verifiable, confidential data sharing in untrusted networks like decentralized identity or healthcare data management. Future research will focus on optimizing the dynamic privacy parameter configuration system to maintain performance under highly variable network conditions and exploring the integration of zero-knowledge proofs to further reduce the trust assumptions on the collaborative users. The model’s success demonstrates the strategic value of combining cryptographic primitives with economic incentives to enforce security and liveness.
