Blockchain-Based Cryptography, Privacy-Preserving and Cybersecurity Systems

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 November 2024 | Viewed by 70

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Engineering, Catholic University of Pusan, Busan 46252, Republic of Korea
Interests: security in network; convergence and operating system

E-Mail Website
Guest Editor
Department of Information Security Engineering, Joongbu University, Goyang City 10279, Republic of Korea
Interests: network security; information security consulting; digital forensic

Special Issue Information

Dear Colleagues,

Blockchain and privacy-preserving techniques can provide security guarantees for the construction of digital government and digital economy. Security infrastructure needs to be adapted to support all kinds of application environments, such as dynamic and rapid changes in network topology, intermittent connection, limited source terminals, low-latency demand, privacy protection in terms of the publisher's location, and subscription.

Blockchain is a public ledger that does not rely on a single source. Blockchain provides undeniability for users, but it disregards user data privacy, thus posing a need for a combined overview of the efforts of recent years to address both security and privacy issues in application systems.

In this Special Issue, we aim to focus on the following research areas: blockchain-based cryptography, privacy-preserving, and cybersecurity systems. The Special Issue aims to focus on data confidentiality protection, data access control, and private-preserving systems, with contradiction and unity between security, scalability, and efficiency. Additionally, we invite authors to submit their abstracts, modeling and exploring methods in terms of scalability authorization control over ciphertext aggregating, access, write and search, etc. The following items in particular will be considered: ciphertext confidentiality, forward security and backward security on dynamic privilege management, and resistance of collusion.

Technical Program Committee Member:

Name: Dr. Jiaoli Shi
Email: [email protected]
Affiliation: School of Computer and Big Data Science, Jiujiang University, Jiujiang 332005, China
Research Interests: Cloud security; ICN security; Data Security; Private-Persevering Computation; Blockchain in Future Network

Prof. Dr. Daesung Lee
Prof. Dr. Minsu Kim
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain
  • privacy-preserving system
  • data confidentiality protection
  • data access control
  • dynamic privilege management
  • ciphertext search
  • cybersecurity

Published Papers

This special issue is now open for submission.
Back to TopTop