Applied Cryptography and Practical Cryptoanalysis for Web 3.0

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 August 2024 | Viewed by 2841

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
Interests: applied cryptography; security and privacy in blockchain; industrial internet of things

E-Mail Website
Guest Editor
School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China
Interests: security on artificial intelligence; industrial IoT security

E-Mail Website
Guest Editor
School of Cryptology, University of Chinese Academy of Sciences, Beijing 100049, China
Interests: cryptoanalysis; symmetric cryptographic primitive

E-Mail Website
Guest Editor
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
Interests: applied cryptography; secure protocol design; searchable encryption

Special Issue Information

Dear Colleagues,

In the rapidly evolving landscape of the digital era, Web 3.0 and cryptographic technologies stand at the forefront of innovation, promising a paradigm shift in how we interact with the internet and safeguard our digital assets. Web 3.0 represents the next evolutionary stage of the internet, focusing on creating a more intelligent, interconnected, and decentralized web experience. One of its core tenets is to empower users with greater control over their data, fostering transparency and privacy. This shift is crucial in an era in which concerns about data breaches, identity theft, and centralized control of information have become prevalent. Decentralization lies at the heart of Web 3.0, aiming to reduce reliance on central authorities and intermediaries. Web 3.0 uses blockchain technology to authenticate and verify the ownership of unique digital assets, which not only empowers creators by providing a direct avenue for monetization but also ensures the authenticity and provenance of digital content. Smart contracts, self-executing contracts with the terms of the agreement directly written into the code, exemplify the efficiency and trust that Web 3.0 seeks to instill in online interactions. Cryptographic technologies form the backbone of Web 3.0, providing the tools necessary for confidentiality, integrity, and authenticity. The importance of applied cryptography and cryptoanalysis techniques cannot be overstated. Applied cryptography ensures the confidentiality and integrity of data through sophisticated algorithms, while cryptoanalysis helps identify vulnerabilities of these building blocks. In an era where cyber threats are increasingly sophisticated, the adoption of these technologies becomes paramount, fortifying our defenses and ensuring the resilience of digital infrastructure against security issues in Web 3.0.

As we strive for a more decentralized, secure, and intelligent digital future, understanding and embracing these technologies becomes imperative. From the perspective of revolutionizing digital ownership, Web 3.0 and cryptographic technologies are not just technological advancements but catalysts for a more resilient, transparent, and equitable digital ecosystem. This Special Issue therefore seeks to contribute to the agenda of cryptography-based solutions and cryptographic analysis techniques through enriching the theoretical knowledge and practical solutions that improve performance and deployment by bringing into focus various cryptographic technologies suitable for Web 3.0, with the aim of achieving technical, social, and economic goals. We therefore invite papers on innovative technical developments, reviews, and analytical studies as well as assessment papers from different disciplines that are relevant to applied cryptography and cryptoanalysis for Web 3.0. Topics of interest for this publication include but are not limited to:

  • Security and privacy issues in Web3.0;
  • Access control suitable for Web3.0;
  • Data management in Web3.0;
  • Decentralized identification;
  • Distributed computing in Web3.0;
  • Edge computing in Web3.0;
  • AI-driven Web3.0;
  • Cryptocurrency;
  • Cybersecurity;
  • Cryptoanalysis on Web3.0 components;
  • Side-channel attack;
  • Practical data sharing;
  • Federated learning through Web3.0;
  • Secure big data technique.

Original research articles and reviews are welcome submissions to this Special Issue.

We look forward to receiving your contributions.

Dr. Tong Wu
Prof. Dr. Weiping Wang
Dr. Hailun Yan
Dr. Qing Fan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic technologies
  • cryptography
  • cybersecurity
  • web 3.0

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 850 KiB  
Article
Reinventing Web Security: An Enhanced Cycle-Consistent Generative Adversarial Network Approach to Intrusion Detection
by Menghao Fang, Yixiang Wang, Liangbin Yang, Haorui Wu, Zilin Yin, Xiang Liu, Zexian Xie and Zixiao Kong
Electronics 2024, 13(9), 1711; https://doi.org/10.3390/electronics13091711 - 29 Apr 2024
Viewed by 436
Abstract
Web3.0, as the link between the physical and digital domains, faces increasing security threats due to its inherent complexity and openness. Traditional intrusion detection systems (IDSs) encounter formidable challenges in grappling with the multidimensional and nonlinear traffic data characteristic of the Web3.0 environment. [...] Read more.
Web3.0, as the link between the physical and digital domains, faces increasing security threats due to its inherent complexity and openness. Traditional intrusion detection systems (IDSs) encounter formidable challenges in grappling with the multidimensional and nonlinear traffic data characteristic of the Web3.0 environment. Such challenges include insufficient samples of attack data, inadequate feature extraction, and resultant inaccuracies in model classification. Moreover, the scarcity of certain traffic data available for analysis by IDSs impedes the system’s capacity to document instances of malicious behavior. In response to these exigencies, this paper presents a novel approach to Web3.0 intrusion detection, predicated on the utilization of cycle-consistent generative adversarial networks (CycleGANs). Leveraging the data transformation capabilities of its generator, this method facilitates bidirectional conversion between normal Web3.0 behavioral data and potentially intrusive behavioral data. This transformative process not only augments the diversity and volume of recorded intrusive behaviors but also clandestinely simulates various attack scenarios. Furthermore, through fostering mutual competition and learning between the discriminator and generator, the approach enhances the ability to discern the defining characteristics of potential intrusive behaviors, thereby bolstering the accuracy of intrusion detection. To substantiate the efficacy of the CycleGAN-based intrusion detection method, simulation experiments were conducted utilizing public datasets, including KDD CUP 1999 (KDD), CIC-DDOS2019, CIC-IDS2018, and SR-BH 2020. The experimental findings evince the method’s remarkable accuracies across the four datasets, attaining rates of 99.81%, 97.79%, 89.25%, and 95.15%, respectively, while concurrently maintaining low false-positive rates. This research contributes novel insights and methodologies toward the advancement of Web3.0 intrusion detection through the application of CycleGAN technology, which is poised to play a pivotal role in fortifying the security landscape of Web3.0. Full article
(This article belongs to the Special Issue Applied Cryptography and Practical Cryptoanalysis for Web 3.0)
Show Figures

Figure 1

24 pages, 3024 KiB  
Article
A Data Sharing Model for Blockchain Trusted Sensor Leveraging Mimic Hash Mechanism
by Gaoyuan Quan, Zhongyuan Yao, Xueming Si, Weihua Zhu and Longfei Chen
Electronics 2024, 13(8), 1495; https://doi.org/10.3390/electronics13081495 - 14 Apr 2024
Viewed by 545
Abstract
Blockchain, as a distributed trust database, has been widely applied in the field of trustworthy sharing of Internet of Things (IoT) sensor data. A single hash mechanism has achieved, to some extent, the trustworthy on-chain storage of blockchain sensor data, that is, the [...] Read more.
Blockchain, as a distributed trust database, has been widely applied in the field of trustworthy sharing of Internet of Things (IoT) sensor data. A single hash mechanism has achieved, to some extent, the trustworthy on-chain storage of blockchain sensor data, that is, the consistency of data on and off the chain. However, it still faces potential security risks such as collision attacks, short password attacks, and rainbow table attacks. To address this issue, this paper proposes a resiliently secure blockchain sensor data trustworthy sharing model based on a mimic hash mechanism. Specifically, in response to the security risks that may arise from the single hash mechanism, this study innovatively introduces a mimic hash mechanism and proposes two methods for constructing mimic hashes based on Verifiable Random Function (VRF) and Cyber Mimic Defense (CMD) in dedicated Wireless Sensor Networks (WSNs) and open public networks, respectively. Theoretical analysis and experimental results demonstrate that this model effectively solves the problem of trustworthy on-chain storage of sensor data in edge computing environments, enhancing the trustworthiness and security of the data on the chain. Full article
(This article belongs to the Special Issue Applied Cryptography and Practical Cryptoanalysis for Web 3.0)
Show Figures

Figure 1

18 pages, 539 KiB  
Article
SM9 Identity-Based Encryption with Designated-Position Fuzzy Equality Test
by Siyue Dong, Zhen Zhao, Baocang Wang, Wen Gao and Shanshan Zhang
Electronics 2024, 13(7), 1256; https://doi.org/10.3390/electronics13071256 - 28 Mar 2024
Viewed by 468
Abstract
Public key encryption with equality test (PKEET) is a cryptographic primitive that enables a tester to determine whether two ciphertexts encrypted with same or different public keys have been generated from the same message without decryption. Previous studies extended PKEET to public key [...] Read more.
Public key encryption with equality test (PKEET) is a cryptographic primitive that enables a tester to determine whether two ciphertexts encrypted with same or different public keys have been generated from the same message without decryption. Previous studies extended PKEET to public key encryption with designated-position fuzzy equality test (PKE-DFET), enabling testers to verify whether plaintexts corresponding to two ciphertexts are equal while ignoring specific bits at designated positions. In this work, we have filled the research gap in the identity-based encryption (IBE) cryptosystems for this primitive. Furthermore, although our authorization method is the all-or-nothing (AoN) type, it overcomes the shortcomings present in the majority of AoN-type authorization schemes. In our scheme, equality tests can only be performed between a ciphertext and a given plaintext. Specifically, even if a tester acquires multiple AoN-type authorizations, it cannot conduct unpermitted equality tests between users. This significantly reduces the risk of user privacy leaks when handling sensitive information in certain scenarios, while still retaining the flexible and simple characteristics of AoN-type authorizations. We use the Chinese national cryptography standard SM9-IBE algorithm to provide the concrete construction of our scheme, enhancing the usability and security of our scheme, while making deployment more convenient. Finally, we prove that our scheme achieves F-OW-ID-CCA security when the adversary has the trapdoor of the challenge ciphertext, and achieves IND-ID-CCA security when the adversary does not have the trapdoor of the challenge ciphertext. Full article
(This article belongs to the Special Issue Applied Cryptography and Practical Cryptoanalysis for Web 3.0)
Show Figures

Figure 1

49 pages, 1033 KiB  
Article
A Novel Authentication Scheme Based on Verifiable Credentials Using Digital Identity in the Context of Web 3.0
by Stefania Loredana Nita and Marius Iulian Mihailescu
Electronics 2024, 13(6), 1137; https://doi.org/10.3390/electronics13061137 - 20 Mar 2024
Viewed by 721
Abstract
This paper explores the concept of digital identity in the evolving landscape of Web 3.0, focusing on the development and implications of a novel authentication scheme using verifiable credentials. The background sets the stage by placing digital identity within the broad context of [...] Read more.
This paper explores the concept of digital identity in the evolving landscape of Web 3.0, focusing on the development and implications of a novel authentication scheme using verifiable credentials. The background sets the stage by placing digital identity within the broad context of Web 3.0′s decentralized, blockchain-based internet, highlighting the transition from earlier web paradigms. The methods section outlines the theoretical framework and technologies employed, such as blockchain, smart contracts, and cryptographic algorithms. The results summarize the main findings, including the proposed authentication scheme’s ability to enhance user control, security, and privacy in digital interactions. Finally, the conclusions discuss the broader implications of this scheme for future online transactions and digital identity management, emphasizing the shift towards self-sovereignty and reduced reliance on centralized authorities. Full article
(This article belongs to the Special Issue Applied Cryptography and Practical Cryptoanalysis for Web 3.0)
Show Figures

Figure 1

Back to TopTop