Skip to Content

113 Results Found

  • Feature Paper
  • Review
  • Open Access
5 Citations
4,671 Views
37 Pages

Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives

  • Siddhartha Siddhiprada Bhoi,
  • Arathi Arakala,
  • Amy Beth Corman and
  • Asha Rao

Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computa...

  • Article
  • Open Access
18 Citations
6,205 Views
19 Pages

Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece

  • Rosario Arjona,
  • Paula López-González,
  • Roberto Román and
  • Iluminada Baturone

5 January 2023

Homomorphic encryption is a powerful mechanism that allows sensitive data, such as biometric data, to be compared in a protected way, revealing only the comparison result when the private key is known. This is very useful for non-device-centric authe...

  • Proceeding Paper
  • Open Access
1,656 Views
7 Pages

As medical technology develops and digital demands grow, personal health records (PHRs) are becoming more patient-centered than before based on cloud-based health information exchanges. While enhancing data accessibility and sharing, these systems pr...

  • Review
  • Open Access
18 Citations
6,262 Views
15 Pages

Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labelin...

  • Article
  • Open Access
5 Citations
3,083 Views
20 Pages

19 July 2025

5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI). However, an adversary equip...

  • Article
  • Open Access
1 Citations
6,838 Views
16 Pages

Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing sy...

  • Review
  • Open Access
55 Citations
13,922 Views
26 Pages

Post-Quantum Security: Opportunities and Challenges

  • Silong Li,
  • Yuxiang Chen,
  • Lin Chen,
  • Jing Liao,
  • Chanchan Kuang,
  • Kuanching Li,
  • Wei Liang and
  • Naixue Xiong

26 October 2023

Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everyt...

  • Article
  • Open Access
4 Citations
3,818 Views
34 Pages

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

  • Babatunde Ojetunde,
  • Takuya Kurihara,
  • Kazuto Yano,
  • Toshikazu Sakano and
  • Hiroyuki Yokoyama

10 June 2025

Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum...

  • Article
  • Open Access
22 Citations
5,848 Views
25 Pages

This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD). Modern cryptography faces significant threats from quantum computers, which ca...

  • Article
  • Open Access
1 Citations
1,328 Views
28 Pages

Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes. While the former has been standardized by the Nat...

  • Review
  • Open Access
6 Citations
5,283 Views
26 Pages

On Multiple Encryption for Public-Key Cryptography

  • Tudor Soroceanu,
  • Nicolas Buchmann and
  • Marian Margraf

Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due...

  • Article
  • Open Access
288 Views
28 Pages

5 February 2026

As a non-contact identification technology, RFID (Radio Frequency Identification) is widely used in various Internet of Things applications. However, RFID systems are highly vulnerable to diverse attacks due to the openness of communication links bet...

  • Article
  • Open Access
5 Citations
5,192 Views
11 Pages

In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance. Computers nowadays use encryption methods based on arithmetic operations to turn messages into cipher...

  • Article
  • Open Access
4 Citations
7,544 Views
38 Pages

15 November 2024

We propose a novel solution to streamline the migration of existing Transport Layer Security (TLS) protocol implementations to a post-quantum Key Encapsulation Mechanism for Transport Layer Security (KEMTLS). By leveraging Identity-Based Encryption (...

  • Article
  • Open Access
1,196 Views
30 Pages

As quantum computing continues to advance, it threatens the long-term protection of traditional cryptographic methods, especially in biometric authentication systems where it is important to protect sensitive data. To overcome this challenge, we pres...

  • Article
  • Open Access
2 Citations
2,974 Views
15 Pages

An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method

  • Mostefa Kara,
  • Konstantinos Karampidis,
  • Giorgos Papadourakis,
  • Mohammad Hammoudeh and
  • Muath AlShaikh

13 October 2024

Quantum-secure cryptography is a dynamic field due to its crucial role in various domains. This field aligns with the ongoing efforts in data security. Post-quantum encryption (PQE) aims to counter the threats posed by future quantum computers, highl...

  • Article
  • Open Access
2 Citations
5,083 Views
31 Pages

R-LWE-Based Distributed Key Generation and Threshold Decryption

  • Ferran Alborch,
  • Ramiro Martínez and
  • Paz Morillo

25 February 2022

Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography. The most prominent field in post-quantum cryptography is lattice-...

  • Article
  • Open Access
3 Citations
2,292 Views
15 Pages

Scenarios for Optical Encryption Using Quantum Keys

  • Luis Velasco,
  • Morteza Ahmadian,
  • Laura Ortiz,
  • Juan P. Brito,
  • Antonio Pastor,
  • Jose M. Rivas,
  • Sima Barzegar,
  • Jaume Comellas,
  • Vicente Martin and
  • Marc Ruiz

15 October 2024

Optical communications providing huge capacity and low latency remain vulnerable to a range of attacks. In consequence, encryption at the optical layer is needed to ensure secure data transmission. In our previous work, we proposed LightPath SECurity...

  • Article
  • Open Access
2 Citations
2,564 Views
25 Pages

Secure and Scalable File Encryption for Cloud Systems via Distributed Integration of Quantum and Classical Cryptography

  • Changjong Kim,
  • Seunghwan Kim,
  • Kiwook Sohn,
  • Yongseok Son,
  • Manish Kumar and
  • Sunggon Kim

11 July 2025

We propose a secure and scalable file-encryption scheme for cloud systems by integrating Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and Advanced Encryption Standard (AES) within a distributed architecture. While prior studies ha...

  • Article
  • Open Access
551 Views
28 Pages

A Novel Dual-Layer Quantum-Resilient Encryption Strategy for UAV–Cloud Communication Using Adaptive Lightweight Ciphers and Hybrid ECC–PQC

  • Mahmoud Aljamal,
  • Bashar S. Khassawneh,
  • Ayoub Alsarhan,
  • Saif Okour,
  • Latifa Abdullah Almusfar,
  • Bashair Faisal AlThani and
  • Waad Aldossary

2 February 2026

Unmanned Aerial Vehicles (UAVs) are increasingly integrated into Internet of Things (IoT) ecosystems for applications such as surveillance, disaster response, environmental monitoring, and logistics. These missions demand reliable and secure communic...

  • Article
  • Open Access
3 Citations
3,046 Views
29 Pages

13 September 2022

The Internet of Everything (IoE) is a smart system that interconnects smart entities by incorporating low-cost or low-energy gadgets that are useful for communication with people, processes, data, and devices/things. In such an instantaneously connec...

  • Article
  • Open Access
407 Views
25 Pages

10 January 2026

Secure and auditable data sharing in large-scale Internet of Things (IoT) environments remains a significant challenge due to weak trust coordination, limited scalability, and susceptibility to emerging quantum attacks. This study introduces a hybrid...

  • Article
  • Open Access
4 Citations
3,777 Views
20 Pages

Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms

  • Miguel Ángel González de la Torre,
  • Luis Hernández Encinas and
  • Araceli Queiruga-Dios

17 August 2022

Newer variants of the Fujisaki–Okamoto transformation are used in most candidates of the third round of the NIST Post-Quantum Cryptography standardization call in the category of public key encryption schemes. These transformations are applied...

  • Article
  • Open Access
19 Citations
8,629 Views
10 Pages

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

  • Tuy Tan Nguyen,
  • Sungjae Kim,
  • Yongjun Eom and
  • Hanho Lee

24 May 2022

This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards an...

  • Article
  • Open Access
9 Citations
2,824 Views
23 Pages

30 June 2023

To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying on a trustworthy central authority, we propose a lattice-inspired CP-ABE scheme for data...

  • Feature Paper
  • Review
  • Open Access
9 Citations
9,417 Views
58 Pages

18 August 2025

Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response. Despite their increasing ubiquity, UAVs remain inherently...

  • Article
  • Open Access
13 Citations
4,658 Views
22 Pages

10 September 2023

The Internet of Things (IoT) has assumed a pivotal role in the advancement of communication technology and in our daily lives. However, an IoT system such as a smart grid with poorly designed topology and weak security protocols might be vulnerable t...

  • Article
  • Open Access
1 Citations
1,310 Views
19 Pages

4 August 2025

The advent of quantum computing poses an existential threat to the security of cloud services that handle sensitive visual data. Simultaneously, the need for computational privacy requires the ability to process data without exposing it to the cloud...

  • Article
  • Open Access
8 Citations
2,937 Views
22 Pages

Intelligent Bio-Latticed Cryptography: A Quantum-Proof Efficient Proposal

  • Ohood Saud Althobaiti,
  • Toktam Mahmoodi and
  • Mischa Dohler

8 November 2022

The emergence of the Internet of Things (IoT) and the tactile internet presents high-quality connectivity strengthened by next-generation networking to cover a vast array of smart systems. Quantum computing is another powerful enabler of the next tec...

  • Review
  • Open Access
69 Citations
32,616 Views
25 Pages

Privacy-Preserving Techniques in Generative AI and Large Language Models: A Narrative Review

  • Georgios Feretzakis,
  • Konstantinos Papaspyridis,
  • Aris Gkoulalas-Divanis and
  • Vassilios S. Verykios

4 November 2024

Generative AI, including large language models (LLMs), has transformed the paradigm of data generation and creative content, but this progress raises critical privacy concerns, especially when models are trained on sensitive data. This review provide...

  • Article
  • Open Access
385 Views
27 Pages

16 December 2025

As smart education evolves, there is an increasing need for the cloud-centric management and sharing of student exercise physiological data gathered through wearable devices in the physical education domain. However, challenges arise in achieving aut...

  • Article
  • Open Access
662 Views
20 Pages

Post-Quantum Secure Lightweight Revocable IBE with Decryption Key Exposure Resistance

  • Dandan Zhang,
  • Hongwei Ju,
  • Zixuan Yan,
  • Shanqiang Feng and
  • Fengyin Li

14 November 2025

Revocable Identity-Based Encryption (RIBE) can dynamically revoke users whose secret keys have been compromised, ensuring a system’s backward security. An RIBE scheme with decryption key exposure resistance (DKER) guarantees the confidentiality...

  • Article
  • Open Access
8 Citations
4,282 Views
27 Pages

Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems

  • Santiago Sánchez-Solano,
  • Eros Camacho-Ruiz,
  • Macarena C. Martínez-Rodríguez and
  • Piedad Brox

7 March 2022

Concern for the security of embedded systems that implement IoT devices has become a crucial issue, as these devices today support an increasing number of applications and services that store and exchange information whose integrity, privacy, and aut...

  • Article
  • Open Access
4 Citations
3,594 Views
26 Pages

Ascon is a family of lightweight cryptographic algorithms designed for Authenticated Encryption with Associated Data (AEAD), hashing, and Extendable Output Functions (XOFs) in resource-constrained environments. While the AEAD variants of Ascon provid...

  • Article
  • Open Access
13 Citations
8,587 Views
15 Pages

Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles

  • Dana Sairangazhykyzy Amirkhanova,
  • Maksim Iavich and
  • Orken Mamyrbayev

Modern technologies like quantum and cloud computing have reshaped computing, offering immense power and scalability. While beneficial, they also challenge the security of traditional cryptographic systems. Quantum computing threatens RSA and ECC wit...

  • Article
  • Open Access
4 Citations
2,345 Views
27 Pages

6 September 2023

To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic. On the other hand, since th...

  • Article
  • Open Access
1,581 Views
13 Pages

28 October 2025

Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS&nd...

  • Review
  • Open Access
571 Views
30 Pages

Optical Network Security: Threats, Techniques, and Future Directions

  • Anna Gazani,
  • Athanasios Mantzavinos,
  • Polyxeni Tsompanoglou,
  • Konstantinos Kantelis,
  • Sophia Petridou,
  • Petros Nicopolitidis and
  • Georgios Papadimitriou

20 February 2026

Optical networks constitute the backbone of contemporary communication infrastructures, supporting massive bandwidth, low-latency services, and high levels of scalability across core, metro, and access domains. As these systems evolve toward elastic,...

  • Feature Paper
  • Article
  • Open Access
1,527 Views
22 Pages

9 September 2025

Homomorphic encryption solutions tend to be costly in terms of memory and computational resources, making them difficult to implement. In this paper, we present Kyber AHE, a lightweight additive homomorphic encryption scheme for computing the additio...

  • Article
  • Open Access
1 Citations
3,164 Views
18 Pages

Efficient Lattice-Based Digital Signatures for Embedded IoT Systems

  • Maksim Iavich,
  • Nursulu Kapalova and
  • Kairat Sakan

12 September 2025

This paper offers a lattice-based digital signature construction, optimized for the provision of post-quantum security in resource-constrained environments, such as Internet of Things (IoT) devices. The offered scheme is built upon structured hardnes...

  • Article
  • Open Access
24 Citations
8,850 Views
24 Pages

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms

  • Sana Farooq,
  • Ayesha Altaf,
  • Faiza Iqbal,
  • Ernesto Bautista Thompson,
  • Debora Libertad Ramírez Vargas,
  • Isabel de la Torre Díez and
  • Imran Ashraf

6 June 2023

Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will n...

  • Article
  • Open Access
1,116 Views
17 Pages

A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure

  • Mostefa Kara,
  • Mohammad Hammoudeh,
  • Abdullah Alamri and
  • Sultan Alamri

31 July 2025

To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately. Although a few signcryption schemes exist that...

  • Proceeding Paper
  • Open Access
2 Citations
3,718 Views
7 Pages

Lightweight Post-Quantum Cryptography: Applications and Countermeasures in Internet of Things, Blockchain, and E-Learning

  • Chin-Ling Chen,
  • Kuang-Wei Zeng,
  • Wei-Ying Li,
  • Chin-Feng Lee,
  • Ling-Chun Liu and
  • Yong-Yuan Deng

12 August 2025

With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms. Therefore, we syste...

  • Article
  • Open Access
7 Citations
3,933 Views
15 Pages

Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH

  • Yujin Oh,
  • Kyungbae Jang,
  • Anubhab Baksi and
  • Hwajeong Seo

27 April 2024

Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to es...

  • Review
  • Open Access
38 Citations
17,442 Views
19 Pages

A Quantum-Resistant Blockchain System: A Comparative Analysis

  • P. Thanalakshmi,
  • A. Rishikhesh,
  • Joel Marion Marceline,
  • Gyanendra Prasad Joshi and
  • Woong Cho

17 September 2023

Blockchain transactions are decentralized, secure, and transparent, and they have altered industries. However, the emergence of quantum computing presents a severe security risk to the traditional encryption algorithms used in blockchain. Post-quantu...

  • Article
  • Open Access
2 Citations
3,547 Views
28 Pages

In an age of AI-generated content and deepfakes, fake news and disinformation are increasingly spread using manipulated or fabricated images. To address this challenge, we introduce Post-Quantum VerITAS, a cryptographic framework for verifying the au...

  • Review
  • Open Access
121 Citations
25,252 Views
21 Pages

5 February 2021

The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems alm...

  • Feature Paper
  • Review
  • Open Access
5 Citations
4,795 Views
13 Pages

This paper presents a review of module ring learning with errors-based (MLWE-based) public-key encryption and key-establishment algorithms. In particular, we introduce the preliminaries of public key cryptography, MLWE-based algorithms, and arithmeti...

of 3