Next Article in Journal
Substation Personnel Fall Detection Based on Improved YOLOX
Next Article in Special Issue
FLIBD: A Federated Learning-Based IoT Big Data Management Approach for Privacy-Preserving over Apache Spark with FATE
Previous Article in Journal
Machine Learning for Energy-Efficient Fluid Bed Dryer Pharmaceutical Machines
Previous Article in Special Issue
An Efficient and Secure Blockchain Consensus Protocol for Internet of Vehicles
 
 
Article
Peer-Review Record

Certificateless Encryption Supporting Multi-Ciphertext Equality Test with Proxy-Assisted Authorization

Electronics 2023, 12(20), 4326; https://doi.org/10.3390/electronics12204326
by Siyue Dong 1,*,†,‡, Zhen Zhao 1,*,†,‡, Baocang Wang 1, Wen Gao 2 and Shanshan Zhang 3
Reviewer 1:
Reviewer 2: Anonymous
Reviewer 3: Anonymous
Electronics 2023, 12(20), 4326; https://doi.org/10.3390/electronics12204326
Submission received: 7 October 2023 / Revised: 12 October 2023 / Accepted: 16 October 2023 / Published: 18 October 2023
(This article belongs to the Special Issue Data Privacy and Cybersecurity in Mobile Crowdsensing)

Round 1

Reviewer 1 Report

Please see the attachment.

 

Comments for author File: Comments.pdf

See the attached file report.

 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

This manuscript presents the concept of Certificateless Encryption Supporting Multi-Ciphertext Equality Test with Proxy-Assisted Authorization (CLE-MET-PA), constructs a concrete CLE-MET-PA scheme that integrates the multi-ciphertext equality test feature and proxy-assisted authorization feature into a certificateless encryption with equality test scheme. This combination not only solves the key management problem and the key escrow problem simultaneously but also introduces a proxy to reduce the workload of users in terms of authorization. Compared to many previous researches, this work has practical innovations and improvements. It brings enhancements in both security and efficiency.

 

However, some parts of the manuscript are somewhat vague and may require appropriate revisions.

1. This sentence in the abstract: “To solve this problem, we present the notion of ..., which ..., which ..., without revealing additional information” needs to be revised.

2. In section 1.2, “We establish formal security models for ..., our work achieves IND-CPA security against adversaries with trapdoor and OW-CPA security against adversaries without trapdoor. Next, ..., achieving CCA security for our scheme (i.e. IND-CCA security against adversaries with trapdoor and OW-CCA security against adversaries without trapdoor)” The statement here is vague, please clarify what kind of trapdoors you are referring to.

3. In section 1.3, It is better to further explain that the term "message receiver" mentioned here refers to the widely mentioned "users" in the manuscript. Simply stating it as "data owner" is not clear enough.

This manuscript needs to polish some minor English typos.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

This paper presents a scheme that combines the advantages of multiple cryptographic primitives, effectively addressing the mentioned problem.In this paper, the authors formalize the notion of CLE-MET-PA and construct a scheme by defining its system model and five different security models. The security proof based on reduction is also provided. The overall content is well organized and logically correct, but there are some errors that need to be corrected. Below are some comments.

 

1. Typos and grammar check. In section 3.1, There is an input error in the author's writing here, with the term “Key Generation Center (KGC)” appearing twice. 

2. I understand that the terms “token” and “trapdoor” refer to the same thing, but it should be noted in the text to avoid confusion.

3. In section 3.2, the “Partial-Private-Key-Extract(pp, \alpha, ID)” in both formulas should be “Partial-Private-Key-Extract(pp, msk, ID)”, and there are missing subscripts in the second formula. The tables in section 3.3 have similar issues. Please review it and make necessary corrections. 

4. In line 316, the expression of the proxy token needs to be modified in Table 1.

the overall presentation is sufficient. 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

Dear Authors,

Thank you for resubmitting the manuscript. I can confirm that all comments have been addressed clearly. The revised version has significantly improved and is now eligible for publishing. As a result, I highly recommend accepting this revised paper for publication.

Back to TopTop