Truly anonymous paper submission and review scheme

被引:0
|
作者
机构
[1] Fan, Chun-I
[2] Chen, Ming-Te
[3] Liang, Yu-Kuang
[4] Chen, Long-Sian
来源
Fan, Chun-I | 1600年 / IIIA-CSIC卷 / 07期
关键词
Electronic document identification systems - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the flush development of academic research, a great deal of research papers have been published in conference proceedings and journals. However, these articles need to be inspected by some professionals in specific fields. It is the most important that the entire process of reviewing must be kept fair. However, the privacy of reviewers is not preserved because that the reviewers must sign their comments on the reviewed papers for some conference proceedings or journals. The leakage of the reviewers' identities will affect the fairness of paper reviewing. In addition, it is also necessary for the authors to show their names to the editors of conference proceedings or journals such that the inspection results may be unfair. Unfortunately, the solutions proposed in the literature cannot cope with the problems on fairness well. Therefore, in order to eliminate the above drawbacks, we formally analyze the paper review procedure to solicit the possible reasons that bring about these unfair results. Furthermore, we will present a generic idea which is independent of the underlying cryptographic components to achieve the fairness property and other key requirements in a paper review system. Finally, the security of the proposed scheme is also formally proved. © 2014, IIIA-CSIC. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [41] Anonymous and Transferable Electronic Ticketing Scheme
    Vives-Guasch, Arnau
    Magdalena Payeras-Capella, M.
    Mut-Puigserver, Macia
    Castella-Roca, Jordi
    Ferrer-Gomila, Josep-Lluis
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 100 - 113
  • [42] Anonymous Group Implicit Certificate Scheme
    Rabadi, Nader M.
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 329 - 330
  • [43] An Anonymous Attestation Scheme with Optional Traceability
    Li, Jiangtao
    Rajan, Anand
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 196 - 210
  • [44] An improved direct anonymous attestation scheme
    Tan, Liang
    Meng, Weiming
    Zhou, Mingtian
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (02): : 334 - 343
  • [45] Data Paper as a Reward? Motivation, Consideration, and Perspective behind Data Paper Submission
    Huang P.P.
    Jeng W.
    Proceedings of the Association for Information Science and Technology, 2022, 59 (01) : 437 - 441
  • [46] Anonymous Identity Authentication Scheme for VANETs
    Sun, Mei
    Zhang, Juan
    Guo, Yuyan
    JOURNAL OF COASTAL RESEARCH, 2020, : 203 - 209
  • [47] Generalized Anonymous Broadcast Encryption Scheme
    Ting, Pei-Yih
    Chang, Shu-Wei
    Wu, Tzong-Sun
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 327 - 335
  • [48] Anonymous authentication scheme for mobile communication
    Liu J.
    Gu L.
    Luo S.
    Yang Y.
    Cui J.
    Wu X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2011, 38 (01): : 176 - 183
  • [49] An anonymous authentication scheme for mobile communication
    Liu Jin-ye
    Gu Li-ze
    Luo Shou-shan
    Yang Yi-xian
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
  • [50] A Novel Anonymous Proxy Signature Scheme
    Chou, Jue-Sam
    ADVANCES IN MULTIMEDIA, 2012, 2012 (2012)