Next Article in Journal
Synchronizing Many Filesystems in Near Linear Time
Previous Article in Journal
Task Automation Intelligent Agents: A Review
Previous Article in Special Issue
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks
 
 
Article
Peer-Review Record

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

Future Internet 2023, 15(6), 197; https://doi.org/10.3390/fi15060197
by Yiming Zhu, Dehua Zhou *, Yuan Li, Beibei Song and Chuansheng Wang
Reviewer 1:
Reviewer 2: Anonymous
Future Internet 2023, 15(6), 197; https://doi.org/10.3390/fi15060197
Submission received: 16 April 2023 / Revised: 26 May 2023 / Accepted: 26 May 2023 / Published: 29 May 2023
(This article belongs to the Special Issue Cryptography in Digital Networks)

Round 1

Reviewer 1 Report

The paper propose a new scheme KFA-PEKS which improves PEKS with KFA. PEKS with KFA was first proposed by [24] but under a single server setup (not immune to KGA). The author heavily relied on the scheme in [22] to construct PEKS in distributed systems, which uses DT-PKC. The novelty comes from using timestamps to control the security deadline on query trapdoors, such that the KFA is private wrt the user's data. The separate servers for matching and KFA allows immunity to KGA. Overall, the paper focuses on an important problem. The solution has incremental technical contribution. The scheme is novel and effective. However, the presentation and English language needs improvement. I recommend Acception after revision.

There are many minor errors. For example, boneh -> Boneh; trpadoor -> trapdoor. It needs more proofreading. 

The notation system is too chaotic to follow.  It needs simplification.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

The core proposal of the paper is combining searchable encryption with keyword frequency analysis. The authors demonstrate that their scheme is unique in achieving multi-keyword search, resistant to Keyword Guessing Attacks (KGA), and highly practical and applicable.

In the Section Prelimaries, please give the references of the preliminary knowledge.

Please correct some typos, too.

Comments for author File: Comments.pdf

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

The review is in a separate file.

Comments for author File: Comments.pdf

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 3

Reviewer 2 Report

The authors have incorporated my suggestions into the latest version of the paper. The paper is now ready for publication. After that, it is up to cryptanalysts to judge and evaluate the paper's content.

However, there is one more important observation.
To fully understand a paper, it may be necessary to take tables and algorithms from other papers, possibly with some modifications. In such cases, however, it is essential that the reference is precise, and it is not sufficient to refer only to the reference number. It can take many ways. For example:

- For Page 4, Table 1. Immediately after the table: Source: [22], Table 1: Notations and terminologies

- For Page 5, Algorithm 1. Subset Decision Mechanism. Before Input: Source: [22], Algorithm 1 Subset Decision

 

The Minor revision is recommended.

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Back to TopTop