Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
Lai J., Mu Y., Guo F., Susilo W., Chen R. Personal and Ubiquitous Computing21 (5):855-868,2017.Type:Article
Date Reviewed: Jan 10 2018

The “smart city” will provide numerous services via broadcasted encrypted data, such as a pin or key for paid users to access water service. These researchers go beyond data security and consider data access control and identity privacy for both active and revoked users. For example, a user may not want others to know that she has access to sensitive information or has subscribed to a particular group. The paper expands what the authors presented in 2016 at the Australasian Conference on Information Security and Privacy. It clearly has broad applications and is noteworthy.

They address the issue of “how to revoke some receivers after the ciphertext has been generated, but without revealing the message content and the identity information of receivers.” To solve this problem, according to the authors, they “propose a novel revocable identity-based broadcast encryption, which is suitable for better data access control and receiver identity information protection.”

In a logical sequence, the paper presents related work, preliminary definitions, security models, the symmetric bilinear map that they utilize, the construction of their scheme, and security analysis, with a brief discussion at the end of each section. Much of the paper is mathematical and some advanced knowledge of mathematics is required to understand it. There is a list of references and contact information for the five authors. I commend their research.

Reviewer:  Brad Reid Review #: CR145761 (1803-0152)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Privacy (K.4.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud, Inc.®
Terms of Use
| Privacy Policy