Special Issue "Cryptographic Algorithms in Blockchain and Their Applications in IoT"

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (30 June 2018)

Special Issue Editor

Guest Editor
Dr. Rongxing Lu

Faculty of Computer Science, University of New Brunswick, Canada
Website | E-Mail
Interests: wireless network security; cloud and fog computing security; big data security and privacy; secure and privacy in IoT; secure opportunistic computing; secure social network; applied cryptography

Special Issue Information

Dear Colleagues,

As it has the potential to create new foundations for economic and social systems, blockchain, a distributed ledger technique, has become a buzz word of today. Essentially, a blockchain is a continuously growing list of records, which are linked and secured using cryptography and can be inherently resistant to modification of the data. Blockchain has many potential applications, one of which is the blockchain-based sharing services in Internet of Things (IoT), in which distributed IoT devices can participate in trust-free transactions, and contracts can be captured in computing codes to automatically perform the obligations that parties have committed to in an agreement. Although blockchain and its applications in IoT are promising, there are still many security and privacy challenges, and there is no consensus regarding best practices that specify how blockchain should be securely applied in IoT whilst preserving privacy. This Special Issue intends to collect current developments and the future directions in blockchain-relevant cryptographic algorithms, which can potentially deal with security and privacy issues in emerging blockchain-based IoT technology. We invite authors to submit their original papers. Potential topics include, but are not limited to, the following:

  • Cryptographic algorithms for accountability in blockchain
  • Cryptographic algorithms for anonymity in blockchain
  • Cryptographic algorithms for proof-of-work
  • Cryptographic algorithms for proof-of-state
  • Cryptographic algorithms for smart contracts in IoT
  • Cryptographic algorithms for distributed ledgers in IoT
Dr. Rongxing Lu
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) is waived for well-prepared manuscripts submitted to this issue. Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cryptographic algorithms
  • Blockchain security and privacy
  • Blockchain-based IoT applications
  • Accountability and anonymity
  • Proof-of-work
  • Proof-of-state

Published Papers (1 paper)

View options order results:
result details:
Displaying articles 1-1
Export citation of selected articles as:

Research

Open AccessArticle ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation
Cryptography 2018, 2(2), 10; https://doi.org/10.3390/cryptography2020010
Received: 26 March 2018 / Revised: 27 April 2018 / Accepted: 15 May 2018 / Published: 31 May 2018
PDF Full-text (1511 KB) | HTML Full-text | XML Full-text
Abstract
This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works. Protecting software copyright has been an issue since the late
[...] Read more.
This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works. Protecting software copyright has been an issue since the late 1970s and software license validation has been a primary method employed in an attempt to minimise software piracy and protect software copyright. The method described creates an ecosystem in which the rights and privileges of participants are observed. Full article
(This article belongs to the Special Issue Cryptographic Algorithms in Blockchain and Their Applications in IoT)
Figures

Figure 1

Back to Top