Public Key Cryptography and Privacy Protection

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Security and Privacy".

Deadline for manuscript submissions: 31 December 2025 | Viewed by 475

Special Issue Editors


E-Mail Website
Guest Editor
Department of Industrial Management, National Taiwan University of Science and Technology, Taipei 106335, Taiwan
Interests: database management system; system development; information security; statistical analysis
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Medical Informatics, Tzu Chi University, Hualien 970374, Taiwan
Interests: cryptography; medical information security; wireless network; network security; sensor networks and HIPAA privacy/security regulations
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Public key cryptography (PKC) plays a pivotal role in securing digital communications and safeguarding privacy in our increasingly interconnected world. PKC enables secure communication, authentication, and data integrity by leveraging mathematical principles and asymmetric key pairs. Privacy protection, as a critical domain of cybersecurity, relies heavily on advancements in cryptographic methods to ensure confidentiality, data security, and trust in diverse applications.

This Special Issue seeks innovative contributions in the form of high-quality, unpublished, and in-depth fundamental research that aims to address the existing technical challenges and propose novel solutions in the domain of public key cryptography and privacy protection.

The goal of this Special Issue is to explore current methods, architectures, and frameworks for PKC and privacy protection, as well as to integrate emerging technologies. Emphasis will be placed on performance evaluation, security analysis, and comparison with existing approaches to advance the state of the art in cryptography and privacy-enhancing technologies. This Special Issue encourages both theoretical and experimental studies in these fields. Additionally, high-quality review and survey papers are welcome. Academic researchers, developers, and industry practitioners are invited to contribute papers to this Special Issue.

Topics of Interest include (but are not limited to) one or more of the following:

  • Cryptography;
  • Public key cryptography;
  • Key management systems and strategies;
  • Cryptographic applications for privacy protection;
  • Privacy-preserving techniques for data sharing and computation;
  • Secure multi-party computation;
  • Cryptographic frameworks for IoT, cloud, and edge computing;
  • Blockchain and decentralized systems security;
  • Privacy and trust in AI-driven systems;
  • Threat modeling and countermeasures for PKC-based systems.

We encourage the submission of original research that addresses fundamental challenges, demonstrates practical applications, or proposes novel solutions in the field of public key cryptography and privacy protection. Contributions that advance theoretical understanding, provide innovative experimental results, or offer high-quality reviews of state-of-the-art developments are highly valued.

We look forward to your submissions and contributions to advancing the fields of public key cryptography and privacy protection.

Dr. I-Pin Chang
Prof. Dr. Tian-Fu Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • public key cryptography
  • privacy protection
  • information security
  • network security
  • sensor networks

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 437 KiB  
Article
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)
by Qaiser Khan, Sourav Purification and Sang-Yoon Chang
Information 2025, 16(7), 617; https://doi.org/10.3390/info16070617 - 19 Jul 2025
Viewed by 153
Abstract
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI). However, an adversary equipped with a quantum computer can break a discrete-logarithm-based elliptic curve [...] Read more.
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI). However, an adversary equipped with a quantum computer can break a discrete-logarithm-based elliptic curve algorithm. Consequently, the user privacy in 5G is at stake against quantum attacks. In this paper, we study the incorporation of the post-quantum ciphers in the SUCI calculation both at the user equipment and at the core network, which involves the shared-key exchange and then using the resulting key for the ID encryption. We experiment on different hardware platforms to analyze the PQC key exchange and encryption using NIST-standardized CRYSTALS-Kyber (which is now called an ML-KEM after the standardization selection by NIST). Our analyses focus on the performances and compare the Kyber-based key exchange and encryption with the current (pre-quantum) elliptic curve Diffie–Hellman (ECDH). The performance analyses are critical because mobile networking involves resource-limited and battery-operating mobile devices. We measure and analyze not only the time and CPU-processing performances but also the energy and power performances. Our analyses show that Kyber-512 is the most efficient and even has better performance (i.e., faster computations and lower energy consumption) than ECDH. Full article
(This article belongs to the Special Issue Public Key Cryptography and Privacy Protection)
Show Figures

Figure 1

Back to TopTop