Now 337 visitors
Today:461 Yesterday:827
Total: 1166 413S 88P 97R
2026-04-09, Week 15
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20220059 Question.4
Questioner: vasaka.vis@mahidol.ac.th    2022-02-16 ¿ÀÀü 12:10:20
IEEE/ICACT20220059 Answer.4
Answer by Auhor 20180922@sungshin.ac.kr   2022-02-16 ¿ÀÀü 12:10:20
Thank you for your presentation :) I have a few questions about this paper. (1) The paper title mentioned about "End-to-End cryptographic communication", but why intermediate nodes in your paper have to do the traffic inspection? Please kindly explain this. I don't get what kind of problem you are trying to solve. (2) In your conclusion on Slide No. 16, you mentioned about the privacy protection. How can we achieve the privacy protection if the intermediate nodes have to decrypt the ciphertext in the AES case? It is not surprising to see the linear increase of AES transmission time in Slide 13 when you increased to 50 intermediate nodes, cause each of them must do the decryption. Thank you. Thank you for the good question. (1) In the experiment of this paper, it is assumed that any operation, such as traffic inspection, can be performed at the intermediate node. So it's not really a process of inspecting traffic, it just shows that this can happen. This paper assumes this environment, which is not exactly the same as the actual network communication environment. However, we can prove that it is not impossible to utilize homomorphic encryption in end-to-end cryptographic communication. (2) The purpose of this paper is to experimentally show the environment in which homomorphic encryption can be used, and AES is the object of comparison. Therefore, I would appreciate it if you understand that this paper focuses on homomorphic encryption. Accordingly, as you asked, AES cannot fully guarantee privacy. I hope I have answered your questions.

Select Voice