Emerging Techniques for Cryptography

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Theory and Methodology".

Deadline for manuscript submissions: closed (31 January 2020) | Viewed by 3191

Special Issue Editors


E-Mail Website
Guest Editor
School of Natural and Computational Sciences, Massey University, Palmerston North, 4442, New Zealand
Interests: identity management; intrusion detection; trustworthy system; cloud storage; applied cryptography; data anonymization; searchable encryption

E-Mail Website
Guest Editor
Department of Computer Science and Software Engineering, University of Western Australia, Perth, Australia
Interests: moving target defense; security assessment; dynamic security metrics
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Cryptography forms the underlying basis for many security solutions in today's computer systems and networks, securing data while it is being stored, transferred, and processed. With the fast-paced development of emerging technologies with new functionalities, emerging techniques for cryptography are also needed in order to secure those new functionalities. As security and privacy problems increase in real-world applications with emerging threats, new and innovative cryptography solutions are needed in order to ensure our computer systems and networks are protected.

This Special Issue will specifically focus on new and innovative cryptography solutions aiming to address emerging threats and existing threats in more efficient manner. The particular topics of interest for this Special Issue include, but are not limited to, the following:

  • Foundational theory and mathematics for emerging computer systems and networks
  • Provable security of emerging techniques for cryptography
  • The proposal and analysis of cryptographic primitives for emerging computer systems and networks
  • Cryptanalytic attacks on emerging computer systems and networks
  • Cryptographic applications in cloud computing and IoT

Open Call-For-Papers

We will solicit papers from the 24th Australasian Conference on Information Security and Privacy (ACISP 2019, website: https://acisp19.canterbury.ac.nz/), as well as from researchers working in the field of emerging techniques for cryptography.

The ACISP conference series has been running annually since 1996, and is an established international forum for cyber security researchers, developers, and industry experts to present and discuss the state-of the-art research outcomes, trends, and challenges in the cyber security domain. We plan to select a few outstanding and relevant research papers from the accepted papers of the ACISP 2019 conference, based on the review scores and comments from the Program Committee members. Each selected paper must be substantially extended, with at least 40% difference in the technical contributions from its conference version, and the common part should not simply be a copy and paste of the conference version.

Each paper (including the selected papers from the ACISP 2019 conference) will go through a rigorous peer review process by at least two international reviewers. The acceptance rate will be fairly low, but we regard quality as our top priority.

Potential Reviewers

Potential reviewers are international experts in the research area that will be mainly selected from the ACISP2019 program committee.

Dr. Julian Jang-Jaccard
Dr. Jin Hong
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

36 pages, 570 KiB  
Article
A Noise Study of the PSW Signature Family: Patching DRS with Uniform Distribution
by Arnaud Sipasseuth, Thomas Plantard and Willy Susilo
Information 2020, 11(3), 133; https://doi.org/10.3390/info11030133 - 27 Feb 2020
Viewed by 2578
Abstract
At PKC 2008, Plantard et al. published a theoretical framework for a lattice-based signature scheme, namely Plantard–Susilo–Win (PSW). Recently, after ten years, a new signature scheme dubbed the Diagonal Reduction Signature (DRS) scheme was presented in the National Institute of Standards and Technology [...] Read more.
At PKC 2008, Plantard et al. published a theoretical framework for a lattice-based signature scheme, namely Plantard–Susilo–Win (PSW). Recently, after ten years, a new signature scheme dubbed the Diagonal Reduction Signature (DRS) scheme was presented in the National Institute of Standards and Technology (NIST) PQC Standardization as a concrete instantiation of the initial work. Unfortunately, the initial submission was challenged by Yu and Ducas using the structure that is present on the secret key noise. In this paper, we are proposing a new method to generate random noise in the DRS scheme to eliminate the aforementioned attack, and all subsequent potential variants. This involves sampling vectors from the n-dimensional ball with uniform distribution. We also give insight on some underlying properties which affects both security and efficiency on the PSW type schemes and beyond, and hopefully increase the understanding on this family of lattices. Full article
(This article belongs to the Special Issue Emerging Techniques for Cryptography)
Show Figures

Figure 1

Back to TopTop