Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
Lai J., Mu Y., Guo F., Susilo W., Chen R.  Personal and Ubiquitous Computing 21 (5): 855-868, 2017. Type: Article
Date Reviewed: Jan 10 2018

The “smart city” will provide numerous services via broadcasted encrypted data, such as a pin or key for paid users to access water service. These researchers go beyond data security and consider data access control and identity privacy for both active and revoked users. For example, a user may not want others to know that she has access to sensitive information or has subscribed to a particular group. The paper expands what the authors presented in 2016 at the Australasian Conference on Information Security and Privacy. It clearly has broad applications and is noteworthy.

They address the issue of “how to revoke some receivers after the ciphertext has been generated, but without revealing the message content and the identity information of receivers.” To solve this problem, according to the authors, they “propose a novel revocable identity-based broadcast encryption, which is suitable for better data access control and receiver identity information protection.”

In a logical sequence, the paper presents related work, preliminary definitions, security models, the symmetric bilinear map that they utilize, the construction of their scheme, and security analysis, with a brief discussion at the end of each section. Much of the paper is mathematical and some advanced knowledge of mathematics is required to understand it. There is a list of references and contact information for the five authors. I commend their research.

Reviewer:  Brad Reid Review #: CR145761 (1803-0152)
Bookmark and Share
  Editor Recommended
Featured Reviewer
Data Encryption (E.3 )
Privacy (K.4.1 ... )
Would you recommend this review?
Other reviews under "Data Encryption": Date
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
Li Y., Zhou F., Qin Y., Lin M., Xu Z.  International Journal of Information Security 17(5): 549-568, 2018. Type: Article
Dec 14 2018
 Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R.,  Cambridge University Press, New York, NY, 2018. 606 pp. Type: Book (978-0-521520-36-2)
Sep 13 2018
 Cracking codes with Python: an introduction to building and breaking ciphers
Sweigart A.,  No Starch Press, San Francisco, CA, 2018. 416 pp. Type: Book (978-1-593278-22-9)
Jun 1 2018

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy