24小时热门版块排行榜    

CyRhmU.jpeg
查看: 985  |  回复: 4
【有奖交流】积极回复本帖子,参与交流,就有机会分得作者 心静心诚 的 25 个金币

心静心诚

新虫 (小有名气)

[交流] 修改后有希望中吗

Reviewer 1
The paper discuss about the collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism. The work seems to be interesting. These are my suggestions.
1. Abstract parts needs to be rewritten
2.  In the results section author can discuss about the computation costs theoretically such as exponential operation,  hash function, random number, etc.
3. Conclusion needs to be rewritten where major finding needs to discuss.
4. Include the following references in introduction and related works
a) Anonymous and linkable location-based services
VK Yadav, N Andola, S Verma, S Venkatesan
IEEE Transactions on Vehicular Technology 71 (9), 9397-9409
b) Efficient and privacy-preserving location-based services over the cloud
VK Yadav, S Verma, S Venkatesan
Cluster Computing 25 (5), 3175-3192
c)  Efficient and privacy-preserving location-based services over the cloud
VK Yadav, S Verma, S Venkatesan
Cluster Computing 25 (5), 3175-3192
d) Linkable privacy-preserving scheme for location-based services
VK Yadav, S Verma, S Venkatesan
IEEE Transactions on Intelligent Transportation Systems 23 (7), 7998-8012
e) P2LBS: Privacy provisioning in location-based services
VK Yadav, N Andola, S Verma, S Venkatesan
IEEE Transactions on Services Computing
f) P2LBS: Privacy provisioning in location-based services
VK Yadav, N Andola, S Verma, S Venkatesan
IEEE Transactions on Services Computing
5.  Author can discuss the problem definition after the related work.
After major revision, the paper can be consider for publication

Reviewer 2
The manuscript based on a verifiable secret sharing and trust mechanism is proposed to solve the trust and cooperate among mutliple users and service. The requester uses a verifiable secret-sharing algorithm to encrypt and split the master secret and provides a corresponding coefficient commitment to verify the sub-secret data, so it is difficult for cooperative users to know any information about the initiator. If t users do not collide with each other, it is difficult for collusion to form a complete query. The combination of verifiable secret sharing and trust mechanism further provides incentive competition because the cooperative users who submit partition information first and get corresponding feedback will get the incentive. However, I have some suggestions for the author.
1. “For the first time, we introduce a privacy protection scheme based....” I suggest the author research the relevant literature to see if it is the first time this method has been proposed.
2. The logical relationship between LBS privacy and VSS-TPPS is not clear.
3 There are more colloquial descriptions in the article, some typos.
4.Suggest the author list the secure model and motivation.

Reviewer 3
A novel collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism

Summary

Authors propose a verifiable secret-sharing and trust mechanism. Overall, the paper is well written. However, there are few minor changes required.

1.?Table 2 could be shifted before 3.1
2.?The proposed scheme is mentioned as VSS-TPPS in few places but it is represented as VSSTPPS in few places. Please unify.
3.?Please unify the equation reference. For example, Eq. (10), Equation (9), Equation 5…
4.?Correct the typo error in few places…Who are malicmous users?

发自小木虫IOS客户端
回复此楼
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

tzynew

神虫浮云 (文学泰斗)

2楼2024-10-02 14:27:28
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

TopEdit

铜虫 (著名写手)



小木虫: 金币+0.5, 给个红包,谢谢回帖
这个基本上就是大修,根据审稿人的意见好好修改离接收就不远了。

发自小木虫Android客户端
3楼2024-10-02 15:14:14
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

天使降临2

新虫 (小有名气)


小木虫: 金币+0.5, 给个红包,谢谢回帖
我去年六个审稿人,一人七八个修改意见

发自小木虫IOS客户端
4楼2024-10-02 15:15:56
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

RRRKKK

至尊木虫 (著名写手)


小木虫: 金币+0.5, 给个红包,谢谢回帖
完全按照意见修改及说明,没有意外的话,基本录用。
电控
5楼2024-10-02 16:40:29
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 心静心诚 的主题更新
普通表情 高级回复(可上传附件)
信息提示
请填处理意见