Special Issue "Cryptography and Blockchain Technologies—Present Applications and Future Researches"

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer Science and Symmetry/Asymmetry".

Deadline for manuscript submissions: 30 April 2023 | Viewed by 1131

Special Issue Editors

Institute of Control & Computation Engineering, Division of Information Systems and Cybersecurity, University of Zielona Gora, 65417 Zielona Góra, Poland
Interests: modeling, design, and analysis of cyber-physical systems; concurrent control systems; Petri nets; programmable devices; FPGAs; hardware description languages (Verilog, VHDL); cryptography and cryptology (prime numbers, RSA numbers, factorization, development of algorithms, OTP-based ciphers)
Special Issues, Collections and Topics in MDPI journals
1. (As Chinese Government Scholarship (CGS) holder for PhD study from 2015 to 2019 October) Department of Electronic Engineering, Tsinghua University, Beijing, China
2. Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522502, Guntur, Andhra Pradesh, India
Interests: applied cryptography and cryptanalysis (RSA and AES and related ciphers); end-to-end (E2E) secure communication, peer to peer (P2P) communication and security aspects; information systems efficiency; lightweight and security aspects; blockchain applications and security aspects and software testing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue is focused on the state of the art of development and research on cryptography and blockchain technologies. Cryptographic and blockchain techniques have been recognized as of top importance for security, privacy, and a large number of applications within cyberspace. Symmetry plays an important role in cryptography and blockchain techniques, and several hot topics have emerged: symmetric key encryption, symmetric key authentication, security evaluation of symmetric key cryptographic primitives, blockchain consensus protocols, blockchain for integrity and authenticity control.

Some suggested areas for focus are provided below, but the Issue’s scope is not restricted to these. We solicit recent application-based research on cryptography and blockchain technologies. Review papers are also welcome that address new directions in these domains and tracks.

Cryptography Tracks

  1. Cryptographic tools for network security and privacy protection.
  2. Homomorphic encryption.
  3. Novel cryptographic protocols.
  4. Cryptanalysis (classical and quantum) and deanonymization.
  5. Machine learning and cryptography.
  6. Recent advances on applied cryptography for information and communication networks.
  7. Hardware implementations of cryptographic algorithms.
  8. Quantum cryptography and standardization efforts in quantum resistant cryptography;
  9. Code-based, lattice-based, hash-based, isogeny-based, multivariate cryptography.
  10. Attacks on post-quantum cryptosystems and security models for post-quantum cryptography.
  11. Fuzzy cryptography, PUFs, and biometrics.
  12. Cryptographic solutions in supply chain security.
  13. Lightweight cryptography for CPS, IoT, IoMT and IoE.
  14. Security and anonymity for 5G/6G mobile networks.
  15. Searchable encryption and privacy-preserving data mining for cloud technologies.

Performance, Security and Privacy Aspects

  1. Security Token offering.
  2. Tokenized security.
  3. Zero-knowledge proof (ZKP).
  4. Security, privacy, and trust of blockchain and distributed ledger technology.
  5. Decentralization, scalability, and security tradeoff of blockchain technology.
  6. Protocols and algorithms based on blockchain and security aspects.

Blockchain Tracks

  1. Present technologies and architectures.
  2. Advanced blockchain-based systems and architectures.
  3. Trends in blockchain technologies.
  4. Future blockchain-based use cases.
  5. Performance, security and privacy aspects.

Prof. Dr. Remigiusz Wiśniewski
Prof. Dr. Aniruddha Bhattacharjya
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • symmetric key encryption
  • symmetric key authentication
  • homomorphic encryption
  • novel cryptographic protocols
  • cryptanalysis
  • deanonymization
  • quantum cryptography
  • code-based cryptography
  • lattice-based cryptography
  • hash-based cryptography
  • isogeny-based cryptography
  • multivariate cryptography
  • fuzzy cryptography
  • lightweight cryptography
  • blockchain and networking protocols (IPv4 vs. IPv6)
  • blockchain as a service (BaaS)
  • distributed ledger technology (DLT) architectures
  • blockchain cybersecurity and privacy
  • zero-knowledge proof (ZKP)

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


Preferential Delegated Proof of Stake (PDPoS)—Modified DPoS with Two Layers towards Scalability and Higher TPS
Symmetry 2023, 15(1), 4; https://doi.org/10.3390/sym15010004 - 20 Dec 2022
Viewed by 628
Security and a decentralized system are identical unique features of Blockchain. In recent times, blockchain-based cryptocurrency has become mainstream, but the growth and value of transactions and application services remain volatile. Among all these applications, finding a fast consensus in a large-scale blockchain [...] Read more.
Security and a decentralized system are identical unique features of Blockchain. In recent times, blockchain-based cryptocurrency has become mainstream, but the growth and value of transactions and application services remain volatile. Among all these applications, finding a fast consensus in a large-scale blockchain network frequently requires extreme energy for huge computations and storing the complete blockchain for verification. These problems prevent further commercialization. Here, we present a solution to this problem. In this paper, we introduce a revised blockchain consensus algorithm, PDPoS, to address the scalability and transaction efficiency limitations. The symmetry in between Proof of Stake (PoS) and Delegated Proof of Stake (DPoS) is PoS. However, their ways of working are dissimilar. Here, we review the existing consensus algorithms, such as Proof of work (PoW), PoS and DPoS, as they are directly relating to our proposed work: PDPoS. We highligh Delegated Proof of Stake (DPoS)–based crypto-currencies, as they have much higher transactions per second (TPS) than PoW-based currencies. Then, we describe our proposed works and the working steps of the proposed PDPoS. Simulation results of the proposed PDPoS with two layers result in improved efficiency. We used TPS as the evolution criteria for showing that the proposed PDPoS is more efficient than DPoS. This makes the proposed work more relevant to the large-scale blockchain network as it is more efficient and requires less energy consumption. Full article
Show Figures

Figure 1

Back to TopTop