Next Article in Journal
Identification and Analysis of Ecological Corridors in the Central Urban Area of Xuchang Based on Multi-Source Geospatial Data
Previous Article in Journal
Characterizing the Role of Geospatial Science in Digital Twins
 
 
Article
Peer-Review Record

An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems

ISPRS Int. J. Geo-Inf. 2024, 13(9), 321; https://doi.org/10.3390/ijgi13090321
by Jiaoli Shi 1, Chao Hu 2, Shunli Zhang 1,3,*, Qing Zhou 1, Zhuolin Mei 1,4, Shimao Yao 1 and Anyuan Deng 1
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3:
ISPRS Int. J. Geo-Inf. 2024, 13(9), 321; https://doi.org/10.3390/ijgi13090321
Submission received: 20 June 2024 / Revised: 29 August 2024 / Accepted: 3 September 2024 / Published: 5 September 2024
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)

Round 1

Reviewer 1 Report

Comments and Suggestions for Authors

1. The manuscript proposes “Fully Policy-Hidden” based Ciphertext-Policy Attribute-Based Encryption. Highlight the points that contributes to the novelty of the proposed work.

2. Abstract should be updated with the necessity of the proposed method,   main aim, and the outcomes of the research.

3. In Figure 1, the 3-way and the proposed 2-way handshaking processes are not explained. Justify how 2-way handshaking gives advantages?

4. Why authors have selected RSA, instead of SHA standards?

5. From Fig.8a, it is very clear that the encryption time of the proposed scheme is extremely higher than the existing works. Justify it and propose steps to minimize it.

6. At the same time in Fig 8b, decryption time of the proposed CP-ABE-FPH is less than the exiting works. Explain how you achieved it.

7. While computing the storage costs on each entity, why public parameters are ignored. Justify.

8. The justifications for the results presented in Fig. s 6 to 9 are missing.

9. How the proposed work is better than works presented in Ref. [9], and Ref. [19]?

10. The reference citation style is not uniform. For example, Ref. [5], Ref. [8], etc.,

11. The manuscript should be improved in terms of English grammar. For example, “Party P1 can the intersection of the P2’s and his own set after retrieving the encrypted set from the cloud server.”

 

Comments on the Quality of English Language

Manuscript needs extensive updates in terms of English grammar. 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Comments and Suggestions for Authors

The paper effectively addresses the critical issue of privacy policy matching through the innovative O-PSI method, leveraging ROBDD for efficient policy matching while maintaining confidentiality. The proposed scheme's fully policy-hidden nature offers significant advantages in terms of confidentiality and access control. Furthermore, the authors have provided a clear and detailed explanation of the methodology, highlighting the contributions made to the existing literature. While the topic is relevant and timely, there are a many major issues need to be addressed  to enhance the  clarity of the work.  

 

  1. A lot of grammatical mistakes are there; correct them.
  2. The current figures' resolution is rather low. Please fix this issue.
  3. The authors could consider discussing the limitations and potential applications of their approach in more detail. 
  4. The manuscript presents a compelling integration of the O-PSI method with ROBDD within the CP-ABE-FPH scheme. However, further elaboration on the computational complexity and scalability of this integration would enhance the manuscript's clarity regarding its practical applicability.
  5. The discussion on the implications of fully policy-hidden encryption on system attributes and its impact on the flexibility of the encryption scheme is insightful. It would be beneficial to explore potential scenarios or case studies illustrating the scheme's adaptability to evolving system requirements.
  6. The authors' emphasis on privacy-preserving policy matching through O-PSI and ROBDD is a significant contribution to the field. It would be beneficial to delve deeper into the potential vulnerabilities or limitations of this approach, particularly in scenarios involving dynamic attribute updates or large-scale deployments.
  7. The proposed 2-way handshake O-PSI method for concealing both elements and cardinalities of sets presents a promising advancement in enhancing data privacy within CP-ABE schemes. However, a comparative analysis with existing methods in terms of computational efficiency and security guarantees would provide a more comprehensive evaluation of its efficacy.
  8. The manuscript successfully outlines the advantages of the CP-ABE-FPH scheme, particularly its fully policy-hidden nature, efficiency, expressiveness, and flexibility. To further enrich the discussion, it would be valuable to include a comparative analysis with other state-of-the-art encryption schemes, highlighting the unique strengths and limitations of the proposed approach.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

Comments and Suggestions for Authors

The manuscript titled "An Efficient and Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme for Satellite Service Systems" proposals a new Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption scheme (CP-ABE-FPH). Several cryptographic techniques were used in this scheme such PRNG and RSA. In general, I do not have any critical comments on the paper, where I think:

1. Title is sufficient.

2. Introduction is enough to introduce the study.

3. Conclusion summarizes the used techniques.

4. References, no comments but I wished to see more recent publications in this regard.

The only comment is about the figures 6, 7, 8, and 9 that should be redesigned to be more clear for the readers.

 

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Back to TopTop