applsci-logo

Journal Browser

Journal Browser

Novel Insights into Cryptography and Network Security

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: 20 May 2025 | Viewed by 892

Special Issue Editor

Hangzhou Innovation Institute, Beihang University, Hangzhou 310051, China
Interests: cloud security; privacy-preserving computing; blockchain; cloud computing; data outsourcing; applied cryptography; secret sharing; authentication
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Cryptography and network security are of the utmost importance in the digital age. Novel insights in this area are constantly emerging. Researchers are continuously striving to develop stronger and more efficient authentication and encryption methods, as well as intrusion detection and prevention systems. These help to safeguard sensitive data during transmission, computing, and storage. Moreover, the application of artificial intelligence and machine learning in this field is growing. These technologies can predict security threats based on historical data and network behavior patterns. Overall, these novel insights are crucial for maintaining the integrity, confidentiality, and availability of digital information in an increasingly connected and vulnerable world.

In this Special Issue, we invite submissions from academic researchers and the industrial community exploring the cutting-edge research and recent advances in the fields of cryptography and network security. Both original research articles and experimental studies are welcome, as well as comprehensive review papers.

Dr. Yujue Wang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • post-quantum cryptography
  • cryptanalysis
  • authentication mechanisms
  • access control
  • intrusion detection and prevention technologies
  • artificial intelligence security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 5009 KiB  
Article
Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
by Lijing Ren and Denghui Zhang
Appl. Sci. 2025, 15(8), 4150; https://doi.org/10.3390/app15084150 - 9 Apr 2025
Viewed by 324
Abstract
The widespread use of smart devices, such as phones and live-streaming cameras, has ushered in an era where digital images can be captured and shared on social networks anytime and anywhere. Sharing images demands more bandwidth and stricter security than text. This prevalence [...] Read more.
The widespread use of smart devices, such as phones and live-streaming cameras, has ushered in an era where digital images can be captured and shared on social networks anytime and anywhere. Sharing images demands more bandwidth and stricter security than text. This prevalence poses challenges for secure image forwarding, as it is susceptible to privacy leaks when sharing data. While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. The limited computing power of smart devices complicates the encrypted transmission of images, creating substantial obstacles to implementing security policies on low-computing devices. To address privacy concerns regarding image sharing on social networks, we propose a lightweight data forwarding mechanism for resource-constrained environments. By integrating large-scale data forwarding with visual cryptography, we enhance data security and resource utilization while minimizing overhead. We introduce a downsampling-based non-expansive scheme to reduce pixel expansion and decrease encrypted image size without compromising decryption quality. Experimental results demonstrate that our method achieves a peak signal-to-noise ratio of up to 20.54 dB, and a structural similarity index of 0.72, outperforming existing methods such as random-grid. Our approach prevents size expansion while maintaining high decryption quality, addressing access control gaps, and enabling secure and efficient data exchange between interconnected systems. Full article
(This article belongs to the Special Issue Novel Insights into Cryptography and Network Security)
Show Figures

Figure 1

24 pages, 2025 KiB  
Article
Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption
by Wenbao Jiang, Jin Ding and Haibao Zhang
Appl. Sci. 2025, 15(7), 3723; https://doi.org/10.3390/app15073723 - 28 Mar 2025
Viewed by 181
Abstract
In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at ensuring secure blockchain transactions while minimizing both computational and communication overhead. During [...] Read more.
In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at ensuring secure blockchain transactions while minimizing both computational and communication overhead. During the transaction process, this approach utilizes certificateless public key signcryption without bilinear pairs to generate anonymous user identities, achieving strong anonymity of user identities and confidentiality of transaction amounts. It employs the Paillier homomorphic encryption algorithm to update transaction amounts and uses the FO commitment-based zero-knowledge proof scheme to validate transaction legality. Additionally, adopting a publicly verifiable secret threshold sharing scheme for hierarchical regulatory authority reduces the security risk of a single regulator storing the regulatory key. This model not only meets the privacy and timely update requirements of account-based blockchain transactions but also effectively regulates abnormal transactions. Rigorous security analysis and proofs demonstrate that this model possesses excellent anonymity, traceability, forward security, and backward security. When compared to similar schemes, the computational cost is reduced by at least 33.18%, effectively fulfilling the requirements for security. Full article
(This article belongs to the Special Issue Novel Insights into Cryptography and Network Security)
Show Figures

Figure 1

Back to TopTop