You are currently viewing a new version of our website. To view the old version click .
by
  • Xinyu Liu1,
  • Shan Ji2,* and
  • Xiaowan Wang3
  • et al.

Reviewer 1: Anonymous Reviewer 2: Zhaohui Tang

Round 1

Reviewer 1 Report

title seems so confusing

how a blockchain work can be written without the citation of

https://bitcoin.org/bitcoin.pdf

 

literature review for privacy preservation is not sufficient

information in section 4 and 5 are not properly/ clearly explained

Author Response

  1. Response to comment: (Title seems so confusing.)

Response: We have revised the title. The main idea of the topic is to resist data availability attacks while ensuring the privacy of blockchain data.

  1. Response to comment: (How a blockchain work can be written without the citation of https://bitcoin.org/bitcoin.pdf )

Response: We have cited this paper in the introduction to the block chain in the first section.

  1. Response to comment: (Literature review for privacy preservation is not sufficient.)

Response: We have supplemented the papers related to privacy protection, adding a reference to the introduction and related work respectively.

  1. Response to comment: (Information in section 4 and 5 are not properly/ clearly explained.)

Response: We made a corresponding explanation at the beginning of the fourth section. The following is our further reply to your suggestion.

The fourth section is the definition of the technology used in this paper, and the zero knowledge accumulator is based on bilinear mapping. The fifth section is the technical proof of the security of zero-knowledge accumulator used in privacy protection scheme and data availability scheme .

In the fourth section, bilinear mapping, zero-knowledge accumulator and local repair code are described in detail in reference 33, 8 and 5, respectively. The security analysis of section 5 is analyzed and proved on the basis of the relevant technologies of section 4.

Reviewer 2 Report

The manuscript focuses on presenting what technologies they're using, without defining what the problem (they're trying to address) is. There is no definition or clear explanation of the "scalable availability problem " , despite repeated claims of addressing the problem.

Author Response

  1. Response to comment: (The manuscript focuses on presenting what technologies they're using, without defining what the problem (they're trying to address) is. There is no definition or clear explanation of the "scalable availability problem " , despite repeated claims of addressing the problem.)

Response: We explain the problem of scalable data availability in the related work section.

Round 2

Reviewer 1 Report

This updated paper does not seems any major correction than previous copy.

Author Response

  1. Response to comment: (This updated paper does not seems any major correction than previous copy. )

Response: We gratefully appreciate for your valuable suggestion. In response to your questions, we have again carefully studied your first comments and reworked the paper. The fourth and fifth parts of the paper have been added and adjusted respectively.