Mathematical Cryptography and Its Application on Authentication and Verification

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Mathematics and Computer Science".

Deadline for manuscript submissions: 31 October 2024 | Viewed by 1066

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, Taiwan
Interests: applied cryptography; cybersecurity; network/communication protection; automotive security; decentralized data privacy

E-Mail Website
Guest Editor
Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, Taiwan
Interests: applied cryptology; information and communication security; AI security; networking; applied cryptologyinformation and communication security

Special Issue Information

Dear Colleagues,

The proliferation of edge computing with artificial intelligence (AI) applications has become a driving force in the emergence of a new generation of Social Internet of Things (SIoT) communication. In addition, the advent of 6G wireless technology is expected to be transformative, revolutionizing the evolution of wireless communication from connected things to connected intelligence. Further, the robust integration of edge, AI, IoT, and Beyond 5G (B5G) or 6G is anticipated to catalyze significant economic growth across industries.

Authentication is critical in contemporary technology, especially when protecting sensitive information in an era where data breaches are becoming more regular. Robust authentication is essential for effective identity and access management and a foundational pillar of zero-trust security. However, the limitations of legacy authentication, which relies on legacy protocols such as Kerberos and RADIUS to protect the traditional network perimeter, render it inadequate to support authentication to cloud and web-based services and apps that depend on modern protocols.

Diverse security mechanisms are required, and their mindful orchestration is essential to bolster the system's security protection and deter potential threats. In the post-quantum era, where quantum computers are projected to become powerful enough to break the current cryptographic algorithms underpinning authentication, novel methods are necessary to protect users' and entities' digital identity and data. In this context, post-quantum cryptography (PQC) has emerged as a specialized branch of cryptography that aims to develop quantum-resistant algorithms using advanced mathematical principles.

We aim to attract diverse researchers, academics, designers, and others to discuss these issues from various perspectives. This Special Issue invites original submissions not under consideration elsewhere. Authors are requested to contribute essays on innovative and significant scientific contributions, current research initiatives, experimental results, and recent advancements relevant to the following topics:

  • Lightweight cryptographic algorithms and protocols;
  • Authentication, authorization, and accounting;
  • Authentication solutions for a zero-trust environment;
  • Novel threats and solutions for smart authentication;
  • Post-quantum cryptography;
  • Cryptographic verification solutions;
  • Multi-factor authentication;
  • Smart identification mechanisms;
  • Advanced digital signatures;
  • Application-specific authentication solutions;
  • Attack detection through cryptanalysis;
  • Mathematical foundations of cryptographic algorithms;
  • Mathematical models for evaluating cryptographic strength;
  • Number theory in cryptographic algorithms;
  • Mathematical aspects of post-quantum cryptography.

We look forward to receiving your contributions, especially those that delve into the intricate mathematical fabric underlying cryptographic systems.

Dr. Arijit Karati
Prof. Dr. Chun-I Fan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • information security
  • cryptology
  • data privacy
  • authentication
  • anonymous communication
  • authorization
  • identification
  • post-quantum cryptography
  • user trust
  • digital signature

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 762 KiB  
Article
An Efficient Lightweight Authentication Scheme for Smart Meter
by Jingqi Du, Chengjing Dai, Pinshang Mao, Wenlong Dong, Xiujun Wang and Zhongwei Li
Mathematics 2024, 12(8), 1264; https://doi.org/10.3390/math12081264 - 22 Apr 2024
Viewed by 262
Abstract
With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security protection of [...] Read more.
With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security protection of electricity consumption data. In this paper, an efficient lightweight smart meter authentication scheme is proposed based on the Chinese Remainder Theorem (CRT), which can realize the revocation of a single smart meter user by publishing a secret random value bound to the smart meter identity. The proposed scheme not only protects the security of smart meter electricity consumption data by using encryption, but also resists identity attacks from both internal and external adversaries by using hash functions and timestamps. Experiment shows that the proposed scheme has lower computation overhead and communication overhead than other authentication schemes and is more suitable for smart meter authentication. Full article
Show Figures

Figure 1

18 pages, 661 KiB  
Article
A Secure Authentication Protocol Supporting Efficient Handover for UAV
by Kang Wen, Shengbao Wang, Yixiao Wu, Jie Wang, Lidong Han and Qi Xie
Mathematics 2024, 12(5), 716; https://doi.org/10.3390/math12050716 - 28 Feb 2024
Viewed by 537
Abstract
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they provide. Amidst this expansion, security concerns for UAVs [...] Read more.
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they provide. Amidst this expansion, security concerns for UAVs have come to the forefront, particularly in open communication environments where they face authentication challenges and risks of sensitive data, including location information, being exposed to unauthorized parties. To address these issues, we propose a secure and lightweight authentication scheme that combines the use of anonymity mechanisms and Physical Unclonable Functions (PUFs). Specifically, we employ pseudo- and temporary identities to maintain the anonymity of UAVs, while also utilizing PUF technology to strengthen the security of Ground Station Servers (GSSs) against physical threats. Rigorous validation through ProVerif and the Random Oracle (ROR) Model indicates our scheme’s superior performance over existing protocols in terms of both efficiency and security. Full article
Show Figures

Figure 1

Back to TopTop