kumoh national institute of technology
Networked Systems Lab.

Kevin Putra Dirgantoro, Jae-Min Lee, and Dong-Seong Kim,"IBoT: Industrial Blockchain of Things Technologies with Encrypted Data Based on AES-GCM", 35th ACM/SIGAPP Symposium On Applied Computing.
By : Kevin
Date : 2019-11-26
Views : 975

Dear Kevin Putra Dirgantoro:

I am sorry to inform you that the following submission was not selected by the program committee to appear at the ACM SAC 2020 DAPP track:

IBoT: Industrial Blockchain of Things Technologies with Encrypted Data Based on AES-GCM

The selection process was very competitive. Due to time and space limitations, we could only choose a small number of the submitted papers to appear on the program. Nonetheless, I still hope you can attend the conference and continue to follow the ACM SAC DAPP tracks.
You can register on the Website to the newsletter and be informed on the next calls for papers in the field of blockchain and decentralized trust:
https://www.cas-blockchain-certification.com/en/acm-sac-dapp-track

I have enclosed the reviewers comments for your perusal.

All the best,

Jean-Marc Seigneur

SAC 2020, DAPP-Decentralized Applications with Blockchain, DLT and Crypto-Currencies

================================================== ==========================
SAC 2020 Reviews for Submission # 1647
================================================== ==========================

Title: IBoT: Industrial Blockchain of Things Technologies with Encrypted Data Based on AES-GCM
Authors: Kevin Putra Dirgantoro, Jae Min Lee and Dong-Seong Kim
================================================== ==========================
REVIEWER # 1
================================================== ==========================

-------------------------------------------------- -------------------------
Reviewer's Scores
-------------------------------------------------- -------------------------
Technical Content and Accuracy (1-7): 5
Significance of the Work (1-7): 5
Appropriate Title, Introduction, and Conclusion (1-7): 6
Overall Organization (1-7): 6
Appropriateness for SAC (1-7): 5
Style and Clarity of the Paper (1-7): 7
Originality of Content (1-7): 4
OVERALL RECOMMENDATION (1-7): 5

Detailed Comments
-------------------------------------------------- -------------------------
Interesting concept and domain of application, to be improved: ethereum is not quantum resistant (uses ECC) and industrial systems are likely to be used for decades, whereas cryptanalysis-relevant quantum computers are expected within the next decade. The choice of 256-bit AES goes in the right direction but doesn't take into account latest quantum cryptanalytic results on the same, that will likely lead to a re-evaluation of the actual strength of AES-256 against quantum computers large enough to break RSA and ECC (expected in the next decade), itself the basis for asymmetric post-quantum ciphers' evaluation. See https://eprint.iacr.org/2019/1146 for details. A study period on the inclusion of an enhanced AES in ISO / IEC standards has also started at ISO SC27 and its technical content is to be found in https://eprint.iacr.org/2019/1146.
-------------------------------------------------- -------------------------



================================================== ==========================
REVIEWER # 2
================================================== ==========================

-------------------------------------------------- -------------------------
Reviewer's Scores
-------------------------------------------------- -------------------------
Technical Content and Accuracy (1-7): 3
Significance of the Work (1-7): 3
Appropriate Title, Introduction, and Conclusion (1-7): 4
Overall Organization (1-7): 5
Appropriateness for SAC (1-7): 5
Style and Clarity of the Paper (1-7): 3
Originality of Content (1-7): 4
OVERALL RECOMMENDATION (1-7): 2

Detailed Comments
-------------------------------------------------- -------------------------
The authors performed an experiment with two kinds of computer operating systems (Windows and MacOS) and the widely adopted Raspberry Pi in sensor networks in a private Ethereum network. The proposed low difficulty scheme is not explained clearly, ie the range of "low" is not given in the description nor the experiment setup. It is not surprising to see that the resource consumption in Raspbian is higher than that of Windows and MacOS. For Figure 3, there is no specific "difficulty" given for the evaluation. There are references missing for IPFS, Go-Ethereum, etc.
-------------------------------------------------- -------------------------



================================================== ==========================
REVIEWER # 3
================================================== ==========================

-------------------------------------------------- -------------------------
Reviewer's Scores
-------------------------------------------------- -------------------------
Technical Content and Accuracy (1-7): 5
Significance of the Work (1-7): 5
Appropriate Title, Introduction, and Conclusion (1-7): 5
Overall Organization (1-7): 5
Appropriateness for SAC (1-7): 5
Style and Clarity of the Paper (1-7): 5
Originality of Content (1-7): 5
OVERALL RECOMMENDATION (1-7): 5

Detailed Comments
-------------------------------------------------- -------------------------
The Novelity of the idea is weak. The test results presented in one graph do not show any breaking points or thresholds.
-------------------------------------------------- -------------------------



================================================== ==========================
REVIEWER # 4
================================================== ==========================

-------------------------------------------------- -------------------------
Reviewer's Scores
-------------------------------------------------- -------------------------
Technical Content and Accuracy (1-7): 1
Significance of the Work (1-7): 3
Appropriate Title, Introduction, and Conclusion (1-7): 5
Overall Organization (1-7): 5
Appropriateness for SAC (1-7): 1
Style and Clarity of the Paper (1-7): 1
Originality of Content (1-7): 4
OVERALL RECOMMENDATION (1-7): 1

Detailed Comments
-------------------------------------------------- -------------------------
The paper does not make sense. It uses unusual terminology like "conventional blockchain consensus algorithm". The constructions employed do not make sense: "The data is encrypted using AES-GCM algorithm before stored to the blockchain network as hash value" and "The paper is using InterPlanetary File System (IPFS) to securely store the cipher key".