Special Issue: Computationally Efficient Cryptographic Algorithms for Secure and Scalable Communication
Theme:
The rapid expansion of interconnected systems, including the Internet of Things (IoT), smart cities, and edge computing, has intensified the demand for cryptographic algorithms that are both secure and computationally efficient. Traditional cryptographic methods often fail to meet the dual requirements of strong security and minimal computational overhead, especially in resource-constrained environments. Moreover, the emergence of quantum computing poses significant threats to current cryptographic standards, making the transition to quantum-resistant solutions a pressing need. Efficient cryptographic algorithms that balance security, scalability, and computational efficiency are essential to safeguard data integrity, confidentiality, and authenticity across diverse platforms. Key technologies such as post-quantum cryptography (PQC), federated learning (FL), and blockchain offer promising pathways to address these challenges effectively.
This Special Issue focuses on exploring computationally efficient cryptographic algorithms that ensure secure and scalable communication across modern networks. Emphasis will be placed on designing and optimizing lightweight cryptography, quantum-resistant encryption techniques, and secure multi-party computation that can operate efficiently in IoT, edge, and cloud environments. Contributions that examine blockchain integration for decentralized security, elliptic curve cryptography (ECC) for streamlined key management, and FL for privacy-preserving analytics are particularly encouraged. The goal is to advance cryptographic research to address current and emerging threats, ensuring robust and scalable security solutions for next-generation communication systems.
Topics of interest in this Special Issue include (but are not limited to):
- Exploring PQC methods to provide quantum-resistant security for IoT networks.
- Utilizing blockchain technology for secure, transparent, and decentralized data management in interconnected networks.
- Developing privacy-preserving and secure multi-party computation protocols optimized for efficiency.
- Enhancing secure key management and distribution using ECC to minimize computational overhead.
- Integrating FL for privacy-preserving machine learning and secure data analytics.
- Investigating identity-based and proxy-based cryptographic schemes to simplify certificate management and reduce communication costs.
- Implementing PQC techniques for secure communication in 5G, IoT, and edge computing environments.
- Combining blockchain and FL to build decentralized, secure, and scalable networks.
Guest Editors:
- Muhammad Asghar Khan, Prince Mohammad Bin Fahd University, KSA
- Ijaz Ahmad, School of Mathematics and Statistics, Central South University, Changsha, 410083, China
- Weiwei Jiang, Beijing University of Posts and Telecommunications, China
- Saddam Hussain, School of Digital Science, Universiti Brunei Darussalam, Brunei
Submission Information
Submit it online: http://ojs.wiserpub.com/index.php/CM/user/register
Or send it to the email address: wendy@wiserpub.com
Submission Guideline
https://ojs.wiserpub.com/index.php/CM/about/submissions
For any inquiries about this Special Issue, please contact the Editors via wendy@wiserpub.com