A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages
Abstract
:1. Introduction
2. Encryption and Decryption of the Fuzzy Hypergraph Network
- The formation of fuzzy hypergraph and its dual;
- The generation of a secret key;
- The encryption algorithm;
- A decryption function.
2.1. Encryption Process
2.1.1. Selection of Secret Key
2.1.2. Splitting the Secret Key into Smaller Primes
2.1.3. Conversion of Primes into Fuzzy Numbers
2.1.4. Fuzzy Hypergraph Construction
2.1.5. Dual Representation of the Fuzzy Hypergraph
2.1.6. Introduction of Simulation Nodes and Hyperedges
2.2. Transmission
- Total nodes and edges of the fuzzy hypergraph;
- A key is given for the purpose of searching the nodes and hyperedges of the dual fuzzy hypergraph;
- Additional information needed to decode the structure of the fuzzy hypergraph and reverse the encryption process.
2.3. Decryption Process
2.3.1. Receipt of the Dual Fuzzy Hypergraph and Metadata
2.3.2. Mapping Fuzzy Weights to Nodes and Edges
2.3.3. Filtering Simulated Nodes and Edges
2.3.4. Reversing the Fuzzy Transformation
2.3.5. Reconstructing the Original Secret Key
- The prime decomposition key is required for the recipient to reverse this process and reconstruct the original number, because the secret message is represented as a large prime number that is broken down into smaller primes corresponding to the nodes, a logical condition that helps in finding the simulated nodes and hyperedges in the constructed network based on their degree;
- Simulated nodes have degree ≤ 1, while genuine nodes have degree 2.
- Using the transposition found in the dual fuzzy hypergraph’s components, one can rebuild the original fuzzy hypergraph.
3. Encryption and Decryption Algorithm
3.1. Encryption Algorithm (Algorithm 1)
Algorithm 1. Encryption Algorithm |
Input: Secret key (a large prime number). Output: The dual fuzzy hypergraph and metadata are prepared for transmission. Begin Step-1: Split into smaller primes ,, such that +. Step-2: For each prime generate a fuzzy number using the triangular fuzzy number conversion. Step-3: Each fuzzy number is splitted as nodes of a hyperedge in a fuzzy hypergraph (. Step-4: Establish a network from each fuzzy number Step-5: Develop a connected network with nodes values as with respective hyperedges . Step-6: Create a fuzzy hypergraph network, where the values of the nodes in the shared network can be interpreted as a contribution to each network it belongs to. Step-7: Generate an incidence matrix from the fuzzy hypergraph network, representing the relationships between nodes and hyperedges. Step-8: Transform the fuzzy hypergraph into its dual fuzzy hypergraph (. Step-9: Add simulated nodes and hyperedges to the dual fuzzy hypergraph to make the structure more complex and obscure. Step-10: Identify the original nodes and hyperedges . End |
3.2. Decryption Algorithm (Algorithm 2)
Algorithm 2. Decryption Algorithm |
Input: The dual fuzzy hypergraph and decryption key. Output: Reconstructed secret key Begin Step-1: Use the decryption key to map fuzzy weights in the dual fuzzy hypergraph back to their corresponding nodes and edges in the original fuzzy hypergraph. Step-2: Remove simulated nodes and edges based on the provided metadata. Step-3: Invent a connected network with node values of with respective hyperedges . Step-4: Obtain the dual hypergraph network, where the values of the nodes in the shared network can be interpreted as a contribution to each network it belongs to. Step-5: Transform the dual fuzzy hypergraph into its fuzzy hypergraph (. Step-6: Reverse the normalization of fuzzy numbers to recover the original values of . Step-7: From the recovered fuzzy numbers, extract the original primes , . Step-8: Convert the fuzzy numbers back into their prime values. Step-9: Sum the extracted primes to reconstruct the original secret key + . Step-10: The original secret key is obtained. End |
4. Pseudo Code for Fuzzy Hypergraph-Based Encryption and Decryption (Algorithm 3)
Algorithm 3. Pseudo Code for Fuzzy Hypergraph-Based Encryption and Decryption |
Input: Secret key (a large prime number), decryption key Output: Dual fuzzy hypergraph for encryption and reconstructed secret key for decryption --- Encryption Phase --- Initialize primes list = [] while > 0: Find the largest prime ≤ Add to primes list = − for each in primes list: Convert into a fuzzy number using triangular fuzzy conversion Add to fuzzy list Initialize fuzzy hypergraph for each fuzzy number in fuzzy list: Split into nodes Add nodes as a hyperedge in Initialize dual fuzzy hypergraph for each hyperedge in : Create a corresponding node in Connect nodes in based on overlapping hyperedges in for i = 1 to k: Add a simulated node n simulated to Connect simulated nodes with random existing nodes to form simulated hyperedges --- Transmission of and metadata --- --- Decryption Phase --- Initialize original fuzzy hypergraph for each node in : Use the decryption key to identify its corresponding hyperedge in for each node or edge in : if marked as dummy in metadata: Remove it from for each fuzzy number in : Convert back to its original prime Initialize primes list = [] for each in : Add to primes list = sum(primes list) Output: Reconstructed secret key |
5. Illustration
5.1. Implementation of Encryption Algorithm
5.2. Implementation of Decryption Algorithm
6. Performance Analysis and Comparative Study
7. Applications
Sensitive Message Transmission in the Military
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Berge, C. Graphs and Hypergraphs; North-Holland Pub.: Amsterdam, The Netherlands, 1973; Volume 6. [Google Scholar]
- Berge, C. Hypergraphs: Combinatorics of Finite Sets; Elsevier: Amsterdam, The Netherlands, 1984; Volume 45. [Google Scholar]
- Aharoni, R.; Berger, E.; Kotlar, D.; Ziv, R. Degree conditions for matchability in 3-partite hypergraphs. J. Graph Theory 2018, 87, 61–71. [Google Scholar]
- Peng, H.; Qian, C.; Zhao, D.; Zhong, M.; Han, J.; Wang, W. Targeting attack hypergraph networks. Chaos Interdiscip. J. Nonlinear Sci. 2022, 32, 073121. [Google Scholar]
- Bretto, A. Hypergraph theory. In An Introduction. Mathematical Engineering; Springer: Cham, Switzerland, 2013; Volume 1. [Google Scholar]
- Qu, C.; Tao, M.; Yuan, R. A hypergraph-based blockchain model and application in internet of things-enabled smart homes. Sensors 2018, 18, 2784. [Google Scholar] [CrossRef] [PubMed]
- El Hibaoui, A.; Vallet, L. Fuzzy hypergraph model for anonymous communications. In Proceedings of the 2012 International Conference on Multimedia Computing and Systems, Tangiers, Morocco, 10–12 May 2012; pp. 888–894. [Google Scholar]
- Franklin, M.; Moti, Y. Secure hypergraphs: Privacy from partial broadcast. SIAM J. Discrete Math. 2004, 18, 437–450. [Google Scholar]
- Somu, N.; Kirthivasan, K.; VS, S.S. A computational model for ranking cloud service providers using hypergraph based techniques. Future Gener. Comput. Syst. 2017, 68, 14–30. [Google Scholar]
- Ranshous, S.; Joslyn, C.A.; Kreyling, S.; Nowak, K.; Samatova, N.F.; West, C.L.; Winters, S. Exchange pattern mining in the bitcoin transaction directed hypergraph. In Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, 7 April 2017, Revised Selected Papers 21; Springer: Cham, Switzerland, 2017; pp. 248–263. [Google Scholar]
- Pius, A.; Kirubaharan, D.R. Application of cryptography in data privacy using fuzzy graph theory. J. Discrete Math. Sci. Cryptogr. 2021, 24, 2389–2401. [Google Scholar] [CrossRef]
- Miner More, S.; Naumov, P. Hypergraphs of multiparty secrets. In Computational Logic in Multi-Agent Systems: 11th International Workshop, CLIMA XI, Lisbon, Portugal, 16–17 August 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 15–32. [Google Scholar]
- Morimae, T.; Yuki, T.; Masahito, H. Verification of fuzzy hypergraph states. Phys. Rev. A 2017, 96, 062321. [Google Scholar] [CrossRef]
- Deveci, M.; Kaya, K.; Uçar, B.; Çatalyürek, Ü.V. Fuzzy hypergraph partitioning for multiple communication cost metrics: Model and methods. J. Parallel Distrib. Comput. 2015, 77, 69–83. [Google Scholar]
- Wang, D.; Yi, F.; Li, X. On general construction for extended visual cryptography schemes. Pattern Recognit. 2009, 42, 3071–3082. [Google Scholar]
- Zhou, Q.; Chan, C. Secret key generation for minimally connected fuzzy hypergraphical sources. IEEE Trans. Inf. Theory 2020, 66, 4226–4244. [Google Scholar]
- Zhi, L.; Liu, Y.; Liu, D.; Li, C.; Cui, W.; Hu, G. A key management scheme based on fuzzy hypergraph for fog computing. China Commun. 2018, 15, 158–170. [Google Scholar]
- Wang, D.; Yi, F.; Li, X.; Luo, P.; Dai, Y. On the analysis and generalization of extended visual cryptography schemes. arXiv 2006. [Google Scholar] [CrossRef]
- Christen, N. Fuzzy hypergraph-based type theory for software development in a Cyber-Physical context. In Advances in Ubiquitous Computing; Academic Press: Cambridge, MA, USA, 2020; pp. 45–138. [Google Scholar]
- Hajiabolhassan, H.; Cheraghi, A. Bounds for visual cryptography schemes. Discrete Appl. Math. 2010, 158, 659–665. [Google Scholar] [CrossRef]
- Meenakshi, A.; Mythreyi, O. Mathematical Modeling of Social Networks using hypergraphs. In Proceedings of the 2023 First International Conference on Advances in Electrical, Electronics and Computational Intelligence (ICAEECI), Tamil Nadu, India, 19–20 October 2023; IEEE, 2023; pp. 1–6. [Google Scholar]
- Annamalai, M.; Dhanushiya, S.; Mythreyi, O.; Mishra, J.S. Enhancing Multicriteria Decision-Making through Cryptographic Security Systems. In Multi-Criteria Decision-Making and Optimum Design with Machine Learning; CRC Press: Boca Raton, FL, USA, 2024; pp. 224–232. [Google Scholar]
- Meenakshi, A.; Kannan, A.; Cep, R.; Elangovan, M. Efficient Graph Network Using Total Magic Labeling and Its Applications. Mathematics 2023, 11, 4132. [Google Scholar] [CrossRef]
- Shao, Z.; Kosari, S.; Shoaib, M.; Rashmanlou, H. Certain concepts of vague graphs with applications to medical diagnosis. Front. Phys. 2020, 8, 357. [Google Scholar] [CrossRef]
- Shi, X.; Kosari, S.; Talebi, A.A.; Sadati, S.H.; Rashmanlou, H. Investigation of the main energies of picture fuzzy graph and its applications. Inter. J. Comput. Intell. Syst. 2022, 15, 31. [Google Scholar] [CrossRef]
- Shi, X.; Kosari, S.; Rashmanlou, H.; Broumi, S.; Satham Hussain, S. Properties of interval-valued quadripartitioned neutrosophic graphs with real-life application. J. Intell. Fuzzy Syst. 2023, 44, 7683–7697. [Google Scholar] [CrossRef]
- Shoaib, M.; Kosari, S.; Rashmanlou, H.; Malik, M.A.; Rao, Y.; Talebi, Y.; Mofidnakhaei, F. Notion of Complex Pythagorean Fuzzy Graph with Properties and Application. J. Mult. -Valued Logic Soft Comput. 2020, 34, 553–586. [Google Scholar]
- Banerjee, S.; Mukherjee, A.; Panigrahi, P.K. Quantum blockchain using weighted hypergraph states. Phys. Rev. Res. 2020, 2, 013322. [Google Scholar] [CrossRef]
- Singh, S.; Uçar, B. An efficient parallel implementation of a perfect hashing method for hypergraphs. In Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Lyon, France, 30 May–3 June 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 265–274. [Google Scholar]
- Orts, F.; Paulavičius, R.; Filatovas, E. Improving the implementation of quantum blockchain based on hypergraphs. Quantum Inf. Process. 2023, 22, 330. [Google Scholar] [CrossRef]
- Ramya, S.; Mohan, K.; Krithivasan, K.; Doraipandian, M. A Secure Authentication Scheme between Edge Devices Using Hypergraph Hashing Technique in Iot Environment. In Proceedings of the International Conference on Applications and Techniques in Information Security, Tamil Nadu, India, 22–24 November 2024; Springer Nature: Singapore, 2024; pp. 269–287. [Google Scholar]
- Romdhini, M.U.; Al-Sharqi, F.; Nawawi, A.; Al-Quran, A.; Rashmanlou, H. Signless Laplacian energy of interval-valued fuzzy graph and its applications. Sains Malays. 2023, 52, 2127–2137. [Google Scholar] [CrossRef]
- Kosari, S.; Shao, Z.; Rao, Y.; Liu, X.; Cai, R.; Rashmanlou, H. Some Types of Domination in Vague Graphs with Application in Medicine. J. Mult.-Valued Logic Soft Comput. 2023, 41, pp.203. [Google Scholar]
- Rao, Y.; Kosari, S.; Shao, Z.; Talebi, A.A.; Mahdavi, A.; Rashmanlou, H. New concepts of intuitionistic fuzzy trees with applications. Inter. J. Comput. Intell. Syst. 2021, 14, 1–12. [Google Scholar] [CrossRef]
- Wu, Q.; Lu, J. A secure model based on hypergraph in multilayer and multi-domain intelligent optical network. In Proceedings of the Wireless Communications, Networking and Applications: Proceedings of WCNA, Shenzhen, China, 27–28 December 2014; Springer: New Delhi, India, 2016; pp. 35–40. [Google Scholar]
- Masud, K.I.; Hasan, M.R.; Hoque, M.M.; Nath, U.D.; Rahman, M.O. A new approach of cryptography for data encryption and decryption. In Proceedings of the 2022 5th International Conference on Computing and Informatics (ICCI), Cairo, Egypt, 9–10 March 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 234–239. [Google Scholar]
- Alkasasbeh, A.H.; Badr, E.; Attiya, H.; Shabana, H.M. Shabana. Radio number for friendship communication networks. Mathematics 2023, 11, 4232. [Google Scholar] [CrossRef]
Nodes of the Fuzzy Hypergraph | Hyperedges |
---|---|
, | |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Meenakshi, A.; Mythreyi, O.; Mrsic, L.; Kalampakas, A.; Samanta, S. A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages. Mathematics 2025, 13, 1049. https://doi.org/10.3390/math13071049
Meenakshi A, Mythreyi O, Mrsic L, Kalampakas A, Samanta S. A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages. Mathematics. 2025; 13(7):1049. https://doi.org/10.3390/math13071049
Chicago/Turabian StyleMeenakshi, Annamalai, Obel Mythreyi, Leo Mrsic, Antonios Kalampakas, and Sovan Samanta. 2025. "A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages" Mathematics 13, no. 7: 1049. https://doi.org/10.3390/math13071049
APA StyleMeenakshi, A., Mythreyi, O., Mrsic, L., Kalampakas, A., & Samanta, S. (2025). A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages. Mathematics, 13(7), 1049. https://doi.org/10.3390/math13071049