Next Article in Journal
Transferring CNN Features Maps to Ensembles of Explainable Neural Networks
Next Article in Special Issue
A Systematic Literature Review on Human Ear Biometrics: Approaches, Algorithms, and Trend in the Last Decade
Previous Article in Journal
Masked Face Recognition System Based on Attention Mechanism
Previous Article in Special Issue
Analysis of the Impact of Age, Education and Gender on Individuals’ Perception of Label Efficacy for Online Content
 
 
Article
Peer-Review Record

Blockchain Data Availability Scheme with Strong Data Privacy Protection

Information 2023, 14(2), 88; https://doi.org/10.3390/info14020088
by Xinyu Liu 1, Shan Ji 2,*, Xiaowan Wang 3, Liang Liu 2 and Yongjun Ren 1
Reviewer 1: Anonymous
Reviewer 2:
Information 2023, 14(2), 88; https://doi.org/10.3390/info14020088
Submission received: 18 November 2022 / Revised: 30 January 2023 / Accepted: 1 February 2023 / Published: 2 February 2023
(This article belongs to the Special Issue Digital Privacy and Security)

Round 1

Reviewer 1 Report

title seems so confusing

how a blockchain work can be written without the citation of

https://bitcoin.org/bitcoin.pdf

 

literature review for privacy preservation is not sufficient

information in section 4 and 5 are not properly/ clearly explained

Author Response

  1. Response to comment: (Title seems so confusing.)

Response: We have revised the title. The main idea of the topic is to resist data availability attacks while ensuring the privacy of blockchain data.

  1. Response to comment: (How a blockchain work can be written without the citation of https://bitcoin.org/bitcoin.pdf )

Response: We have cited this paper in the introduction to the block chain in the first section.

  1. Response to comment: (Literature review for privacy preservation is not sufficient.)

Response: We have supplemented the papers related to privacy protection, adding a reference to the introduction and related work respectively.

  1. Response to comment: (Information in section 4 and 5 are not properly/ clearly explained.)

Response: We made a corresponding explanation at the beginning of the fourth section. The following is our further reply to your suggestion.

The fourth section is the definition of the technology used in this paper, and the zero knowledge accumulator is based on bilinear mapping. The fifth section is the technical proof of the security of zero-knowledge accumulator used in privacy protection scheme and data availability scheme .

In the fourth section, bilinear mapping, zero-knowledge accumulator and local repair code are described in detail in reference 33, 8 and 5, respectively. The security analysis of section 5 is analyzed and proved on the basis of the relevant technologies of section 4.

Reviewer 2 Report

The manuscript focuses on presenting what technologies they're using, without defining what the problem (they're trying to address) is. There is no definition or clear explanation of the "scalable availability problem " , despite repeated claims of addressing the problem.

Author Response

  1. Response to comment: (The manuscript focuses on presenting what technologies they're using, without defining what the problem (they're trying to address) is. There is no definition or clear explanation of the "scalable availability problem " , despite repeated claims of addressing the problem.)

Response: We explain the problem of scalable data availability in the related work section.

Round 2

Reviewer 1 Report

This updated paper does not seems any major correction than previous copy.

Author Response

  1. Response to comment: (This updated paper does not seems any major correction than previous copy. )

Response: We gratefully appreciate for your valuable suggestion. In response to your questions, we have again carefully studied your first comments and reworked the paper. The fourth and fifth parts of the paper have been added and adjusted respectively.

Back to TopTop