I. Introduction
Organisations can not afford to defend themselves isolated from the threat landscape due to the emergence of new cyber threats and hence, threat information sharing is considered an indispensable cybersecurity domain. An organisation that has faced a specific range of cyberattacks can help other organizations against adversary attacks of the same type. Threat information sharing is an essential aspect of the cybersecurity domain regarding the protection of organizations or individuals against adversary attacks. Threat information sharing involves the processes of the collection, analysis and sharing of cyber threat information among multiple organizations [1]. It ranges from public to private sharing, such as threat intelligence sharing, regionally or globally. Therefore, finding a secure and trusted way to share threat information is crucial to ensure the privacy and reliability of the participant parties. Regardless of the data type, purpose and role, whether public or private, it should traverse through a secure and trusted infrastructure, which could be challenging and costly [2]. Thus, providing a privacy-preserving method to avoid risk is crucial to maintaining confidentiality, availability, and integrity, such as preventing data loss or damage, unauthorized disclosure, data unavailability, or unauthorized alteration.