mathematics-logo

Journal Browser

Journal Browser

Applications of Cryptography Theory in Network Security

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "E1: Mathematics and Computer Science".

Deadline for manuscript submissions: closed (31 October 2025) | Viewed by 2946

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Science and Technology, Isabel I University, 09003 Burgos, Spain
Interests: cryptology; computer systems cybersecurity; systems and network security; cryptography; IoT security; randomness in cryptography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Science and Technology, Isabel I University, 09003 Burgos, Spain
Interests: machine learning; cryptography; evolutionary algorithms; computer systems cybersecurity; intelligent systems and Internet of Things

Special Issue Information

Dear Colleagues,

Cryptography plays a essential role in ensuring the security of networks by providing various mechanisms to protect data confidentiality, integrity, authentication, and non-repudiation. The persistently increasing tendency of ever-more-sophisticated cyberattacks and global cyberterrorism makes it critical for any organization and nation to protect its networks and critical infrastructures. Cryptographic protocols provide the necessary tools to address various security concerns and establish trust in networked environments.

This Special Issue aims to explore recent advances in the use of cryptography in network security protocols. It includes the use of new cryptographic algorithms resistant to quantum computing and the necessity of implementing crypto-agility to keep these protocols secure.

Specific topics of interest include, but are not limited to, the following:

  • Cryptographic secure protocols.
  • Quantum-resistant cryptographic techniques.
  • Crypto-agility in network security.
  • Communication technology and protocol security.
  • Authentication protocols.
  • Key distribution and management.
  • Real-time cryptography applications.
  • Cryptography and cybersecurity.
  • Industrial network security.
  • Security and privacy for cloud and edge computing.
  • Machine learning and deep learning application to cybersecurity.

We look forward to receiving your contributions.

Dr. Amalia Beatriz Orúe López
Dr. Víctor Martínez-Martínez
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic secure protocols
  • quantum resistant cryptographic techniques
  • crypto-agility in network security
  • communication technology and protocol security
  • authentication protocols
  • key distribution and management
  • real-time cryptography applications
  • cryptography and cybersecurity
  • industrial network security
  • security and privacy for cloud and edge computing
  • machine learning and deep learning application to cybersecurity

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

27 pages, 760 KB  
Article
OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data
by You Zhao, Ye Song, Weiyi Song and Juyan Li
Mathematics 2025, 13(24), 4004; https://doi.org/10.3390/math13244004 - 16 Dec 2025
Viewed by 435
Abstract
As smart education evolves, there is an increasing need for the cloud-centric management and sharing of student exercise physiological data gathered through wearable devices in the physical education domain. However, challenges arise in achieving authentication for data sources, ensuring the security of sensitive [...] Read more.
As smart education evolves, there is an increasing need for the cloud-centric management and sharing of student exercise physiological data gathered through wearable devices in the physical education domain. However, challenges arise in achieving authentication for data sources, ensuring the security of sensitive data, and implementing efficient dynamic access control. Traditional cryptographic schemes face limitations in resisting quantum attacks, authenticating data sources, protecting identity privacy, handling dynamic permission changes, and computational efficiency. To tackle these challenges, we put forward a lattice-based Online/Offline Identity-Based Matchmaking Proxy Re-Encryption (OO-IB-MPRE) scheme. The scheme offers post-quantum security assurances grounded in lattice cryptography (under the LWE/ISIS assumptions); incorporates Identity-Based matchmaking encryption (IB-ME) to realize bidirectional identity matching, which not only enables identity authentication for data sources but also safeguards the sender’s identity privacy from exposure to other entities; leverages Proxy Re-Encryption (PRE) to support dynamic management of access control; and combines online/offline encryption to adapt to resource constrained sensors. The security of the OO-IB-MPRE scheme is verified under standard lattice assumptions to meet the security requirements of semi-selective privacy and authenticity. Performance analysis and experimental validation demonstrate that in comparison to existing lattice-based PRE schemes, the devised scheme shows notable advantages in both space and computational overhead. Therefore, the proposed OO-IB-MPRE offers a secure, efficient, and scalable solution for the sensitive health data in smart physical education. Full article
(This article belongs to the Special Issue Applications of Cryptography Theory in Network Security)
Show Figures

Figure 1

14 pages, 911 KB  
Article
Multiparty Quantum Private Comparison Protocol Using n-Particle GHZ State
by Min Hou, Yue Wu and Shibin Zhang
Mathematics 2025, 13(21), 3422; https://doi.org/10.3390/math13213422 - 27 Oct 2025
Viewed by 549
Abstract
Multiparty quantum private comparison (MQPC) aims to determine the equality relationship of inputs from multiple participants while maintaining the confidentiality of these inputs. Current MQPC protocols primarily focus on utilizing d-level quantum states, which limits feasible implementation. To address this issue, we [...] Read more.
Multiparty quantum private comparison (MQPC) aims to determine the equality relationship of inputs from multiple participants while maintaining the confidentiality of these inputs. Current MQPC protocols primarily focus on utilizing d-level quantum states, which limits feasible implementation. To address this issue, we introduce an MQPC protocol that utilizes n-particle Greenberger–Horne–Zeilinger (GHZ) state to enable private comparison while preserving the secrecy of individual inputs. A semi-honest third party (TP), adhering to protocol specifications but potentially curious about private data, generates and distributes GHZ state qubits to all participants. Each party encodes their secret input through rotation operations on their allocated qubits and returns the modified state to the TP, which then performs single-particle quantum measurements to derive the outcomes without accessing the raw inputs. The protocol’s sequence distribution method yields a high qubit efficiency of 1/n, outperforming many existing MQPC protocols. Security analysis confirms resilience against external adversaries employing quantum attack strategies and collusion attempts among participants. Simulations using IBM Qiskit validate the feasibility of the protocol, which relies on GHZ state preparation, single-qubit operations, and single-particle quantum measurements. Full article
(This article belongs to the Special Issue Applications of Cryptography Theory in Network Security)
Show Figures

Figure 1

21 pages, 1523 KB  
Article
A Certificate-Less Distributed Key Management Scheme for Space Networks
by Changyuan Luo and Ling Sun
Mathematics 2024, 12(19), 3126; https://doi.org/10.3390/math12193126 - 6 Oct 2024
Viewed by 1036
Abstract
The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of space networks, solving the problems regarding the difficulty of implementing centralized [...] Read more.
The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of space networks, solving the problems regarding the difficulty of implementing centralized key management in space networks and the excessive overhead required for maintaining public key certificates by constructing a distributed key generation center and establishing strategies such as private key updates, master key component updates, and session key negotiation. This method also avoids the key escrow problem inherent in existing identity-based key management schemes. This scheme provides the DPKG construction method for space networks; designs the update strategy for the DPKG node’s master key sharing, providing a specific update algorithm; introduces the batch private key update mechanism; and uses the mapping function to evenly distribute the node’s update requests throughout the update time period, avoiding the problem of overly concentrated update requests. After analysis and simulation verification, it was proven that the scheme can meet the necessary security requirements, offering good stability and scalability. Full article
(This article belongs to the Special Issue Applications of Cryptography Theory in Network Security)
Show Figures

Figure 1

Back to TopTop