Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 6, Issue 4

2022 December - 18 articles

Cover Story: In this work, we elaborate on process authenticity, intuitively corresponding to the validity of all process steps and their proper binding. It represents the most exciting forefront of distributed ledger technology research concerning the primary challenge of reliably connecting distributed ledger networks to the physical context they must operate. This paper describes a novel methodological approach to ensuring the authenticity of business processes through blockchain and several security mechanisms applied to the digital twins of the actual procedures. As software designers, we illustrate the difficulties and opportunities of implementing process authenticity in concrete case studies for three critical application domains: document dematerialization, e-voting, and healthcare. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (18)

  • Article
  • Open Access
7 Citations
4,980 Views
15 Pages

In this work we explore the use of blockchain with Internet of Things (IoT) devices to provide visitor authentication and access control in a physical environment. We propose the use of a “bracelet” based on a low-cost NodeMCU IoT platfor...

  • Article
  • Open Access
9 Citations
3,853 Views
16 Pages

Performing location-based services in a secure and efficient manner that remains a huge challenge for the Internet of Vehicles with numerous privacy and security risks. However, most of the existing privacy protection schemes are based on centralized...

  • Article
  • Open Access
3,442 Views
27 Pages

Certificates are integral to the security of today’s Internet. Protocols like BlockVoke allow secure, timely and efficient revocation of certificates that need to be invalidated. ACME, a scheme used by the non-profit Let’s Encrypt Certifi...

  • Article
  • Open Access
9 Citations
3,791 Views
14 Pages

The rapidly increasing use of the internet has led to an increase in new devices and technologies; however, attack and security violations have grown exponentially as well. In order to detect and prevent attacks, an Intrusion Detection System (IDS) i...

  • Article
  • Open Access
4 Citations
2,948 Views
10 Pages

Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are base...

  • Article
  • Open Access
2,726 Views
13 Pages

Logic locking is a technique that can help hinder reverse-engineering-based attacks in the IC supply chain from untrusted foundries or end-users. In 2015, the Boolean Satisfiability (SAT) attack was introduced. Although the SAT attack is effective in...

  • Article
  • Open Access
7 Citations
3,927 Views
23 Pages

Physical unclonable functions (PUFs) are gaining traction as an attractive alternative to generating and storing device keying material over traditional secure non-volatile memory (NVM) technologies. In this paper, we propose an engineered delay-base...

  • Article
  • Open Access
4 Citations
5,893 Views
24 Pages

Process Authentication through Blockchain: Three Case Studies

  • Mario Ciampi,
  • Diego Romano and
  • Giovanni Schmid

In this work, we elaborate on the concept of process authenticity, which intuitively corresponds to the validity of all process steps and their proper binding. It represents the most exciting forefront of distributed ledger technology research concer...

  • Article
  • Open Access
16 Citations
5,354 Views
24 Pages

Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures

  • Alexander Kudzin,
  • Kentaroh Toyoda,
  • Satoshi Takayama and
  • Atsushi Ishigame

(1) Background: To solve the blockchain scaling issue, sharding has been proposed; however, this approach has its own scaling issue: the cross-shard communication method. To resolve the cross-shard communication scaling issue, rollups have been propo...

  • Review
  • Open Access
26 Citations
8,311 Views
22 Pages

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

  • Harshana Bandara,
  • Yasitha Herath,
  • Thushara Weerasundara and
  • Janaka Alawatugoda

Lattice-based cryptography is centered around the hardness of problems on lattices. A lattice is a grid of points that stretches to infinity. With the development of quantum computers, existing cryptographic schemes are at risk because the underlying...

  • Article
  • Open Access
4 Citations
3,080 Views
15 Pages

The promise of identity-based systems is that they maintain the functionality of public key cryptography while eliminating the need for public key certificates. The first efficient identity-based encryption (IBE) scheme was proposed by Boneh and Fran...

  • Article
  • Open Access
2 Citations
2,592 Views
16 Pages

Privacy-Preserving Contrastive Explanations with Local Foil Trees

  • Thijs Veugen,
  • Bart Kamphorst and
  • Michiel Marcus

We present the first algorithm that combines privacy-preserving technologies and state-of-the-art explainable AI to enable privacy-friendly explanations of black-box AI models. We provide a secure algorithm for contrastive explanations of black-box m...

  • Article
  • Open Access
12 Citations
7,301 Views
12 Pages

WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations

  • Vyron Kampourakis,
  • Efstratios Chatzoglou,
  • Georgios Kambourakis,
  • Apostolos Dolmes and
  • Christos Zaroliagis

This work attempts to provide a way of scrutinizing the security robustness of Wi-Fi implementations in an automated fashion. To this end, to our knowledge, we contribute the first full-featured and extensible Wi-Fi fuzzer. At the time of writing, th...

  • Article
  • Open Access
1 Citations
2,728 Views
21 Pages

ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol

  • Ghada Arfaoui,
  • Gildas Avoine,
  • Olivier Gimenez and
  • Jacques Traoré

Traffic hijacking over the Internet has become a frequent incident over the last two decades. From minor inconveniences for casual users to massive leaks of governmental data, these events cover an unprecedently large spectrum. Many hijackings are pr...

  • Article
  • Open Access
13 Citations
5,330 Views
20 Pages

Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems

  • Macarena C. Martínez-Rodríguez,
  • Luis F. Rojas-Muñoz,
  • Eros Camacho-Ruiz,
  • Santiago Sánchez-Solano and
  • Piedad Brox

The generation of unique identifiers extracted from the physical characteristics of the underlying hardware ensures the protection of electronic devices against counterfeiting and provides security to the data they store and process. This work descri...

  • Article
  • Open Access
1 Citations
3,019 Views
45 Pages

We propose cryptographic rational secret sharing protocols over general networks. In a general network, the dealer may not have direct connections to each player, and players may not have direct connections to each of the other players. We present co...

  • Article
  • Open Access
4 Citations
3,025 Views
18 Pages

According to the ever-growing supply and demand of IoT content, IoT big data in diversified applications are deemed a valuable asset by private and public sectors. Their privacy protection has been a hot research topic. Inspired by previous work on b...

  • Article
  • Open Access
15 Citations
13,162 Views
23 Pages

Post Quantum Design in SPDM for Device Authentication and Key Establishment

  • Jiewen Yao,
  • Krystian Matusiewicz and
  • Vincent Zimmer

The Security Protocol and Data Model (SPDM) defines a set of flows whose purpose includes the authentication of a computing device’s hardware identity. SPDM also allows for the creation of a secure session wherein data communication between two...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X