Role of Symmetric Cryptography for Blockchain Technology

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: closed (1 July 2023) | Viewed by 2120

Special Issue Editor

Special Issue Information

Dear Colleagues,

Blockchain and cryptographic technologies have been acknowledged as being of utmost significance for security, privacy, and a wide range of uses within cyberspace. The widespread use of blockchain and cryptographic techniques has created difficulties for the creation of sophisticated methods with high security and minimal overheads. Therefore, in this Specuial Issue, we seek efficient and secure blockchain approaches as well as light-weight cryptographic methods with verifiable security. We pay significant attention to the use of advanced mathematical techniques and concepts to create sophisticated blockchain consensus protocols that do not rely heavily on energy usage and also the use of information theory and coding results to create advanced symmetric key cryptography primitives.

Dr. Achyut Shankar
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security evaluation
  • blockchain techniques
  • blockchain consensus protocols
  • information theory
  • symmetric keys
  • privacy
  • data security
  • trusted keys
  • coding
  • artificial intelligence

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 1496 KiB  
Article
Evaluation of Digital Image Generation Based on Virtual Interaction Design under Blockchain Technology
by Yiwen Cao
Symmetry 2023, 15(7), 1406; https://doi.org/10.3390/sym15071406 - 12 Jul 2023
Viewed by 827
Abstract
With the rapid development of current technology, computer vision technology has also achieved better development, providing more possibilities for digital image generation. However, traditional digital image generation methods have high operational requirements for designers due to difficulties in collecting data sets and simulating [...] Read more.
With the rapid development of current technology, computer vision technology has also achieved better development, providing more possibilities for digital image generation. However, traditional digital image generation methods have high operational requirements for designers due to difficulties in collecting data sets and simulating environmental scenes, which results in poor quality, lack of diversity, and long generation speed of generated images, making it difficult to meet the current needs of image generation. In order to better solve these problems and promote the better development of digital image generation, this paper introduced a virtual interaction design under current popular blockchain technology in image generation, built a generative model through the virtual interaction design under the blockchain technology, optimized the image generation, and verified it in practice. The research results show that the digital image generation number of the method in this paper is 641. This indicates that method generates more images, has better diversity in digital image generation, and better image quality. Compared to other digital image generation methods, this method can better meet the needs of high-quality and diverse images, better adapt to the needs of different image generation, and is of great significance for promoting the better development of image generation. Full article
(This article belongs to the Special Issue Role of Symmetric Cryptography for Blockchain Technology)
Show Figures

Figure 1

15 pages, 2608 KiB  
Article
Research on Blockchain Architecture and Operating Principles Based on H-DAG
by Jie Huang, Changsheng Liu and Joseph Harding
Symmetry 2023, 15(7), 1361; https://doi.org/10.3390/sym15071361 - 04 Jul 2023
Viewed by 1213
Abstract
A hybrid blockchain structure (hybrid directed acyclic graph, or H-DAG) is proposed in this article to solve the existing problem of blockchain architectures using symmetric key encryption technology by combining the characteristics of single-chain blockchains and DAG distributed ledgers. By improving the block [...] Read more.
A hybrid blockchain structure (hybrid directed acyclic graph, or H-DAG) is proposed in this article to solve the existing problem of blockchain architectures using symmetric key encryption technology by combining the characteristics of single-chain blockchains and DAG distributed ledgers. By improving the block and transaction structures and optimizing the consensus mechanism, the H-DAG confirmed transaction orders while maintaining the high-throughput characteristics of a DAG, thus solving the transaction order dependence problem. We introduced a lightweight PoW mechanism to the H-DAG to improve the anti-fork ability of the blockchain. An incentive mechanism was adopted in our model to compel honest nodes to be more enthusiastic about participating in, maintaining, and enhancing the security of a given network. The blockchain states achieved strong levels of consistency, and their transaction confirmation times were predictable. We evaluated the performance of the H-DAG by comparing and analyzing multiple experiments, and we modeled a forking attack strategy, verifying the resistance of the H-DAG to this attack strategy. The experimental results demonstrated that the order of transactions in the H-DAG was globally consistent, and the confirmation time of transactions was predictable. The H-DAG improved the anti-fork ability and enhanced the security of the blockchain to ensure a degree of decentralization of the blockchain system. Therefore, the system throughput was enhanced by improving the block structure using symmetric key technology. Full article
(This article belongs to the Special Issue Role of Symmetric Cryptography for Blockchain Technology)
Show Figures

Figure 1

13 pages, 1394 KiB  
Article
Real-Time Risk Detection Method and Protection Strategy for Intelligent Ship Network Security Based on Cloud Computing
by Jian Guo and Hua Guo
Symmetry 2023, 15(5), 988; https://doi.org/10.3390/sym15050988 - 27 Apr 2023
Cited by 3 | Viewed by 1554
Abstract
When studying an unfamiliar system, we first look for the symmetry that the system has, so that we can make many predictions about the possible properties of the system. The symmetry in ship network security needs to maintain a stable state and maintain [...] Read more.
When studying an unfamiliar system, we first look for the symmetry that the system has, so that we can make many predictions about the possible properties of the system. The symmetry in ship network security needs to maintain a stable state and maintain a constant state of ship network security. With the rapid development of network information technology, smart ships have become a new hot spot in the international shipping industry. The smart ships cybersecurity discussion is also at the top of the list in the maritime field. More and more shipping companies feel that their smart ship systems need to be upgraded and the main reason behind this is that the systems are maliciously attacked by cyber hackers. Therefore, it is extremely important to detect and protect the security of intelligent ship network systems in real time. The issue of network security has always accompanied the whole process of the development of the Internet. At the same time, with the development of Internet technology, network hacking attacks against the Internet have never stopped developing, and traditional ship network security risk detection and protection cannot achieve good results. After understanding the operation mode of intelligent ship networks, this paper deeply studied the characteristics of cloud computing technology and proposed a real-time risk detection method and protection strategy for intelligent ship network security based on cloud computing. This paper mainly used multi-sensor nodes to analyze data containing malicious attack information and implemented self-execution protection strategy generation nodes to intercept and protect from the attack, so as to achieve the purpose of maintaining the network security of intelligent ships. Through experiments, the virus intrusion detection and defense rate of the algorithm proposed in this paper was able to reach 85% to 95%, while the virus intrusion detection defense rate of the traditional intelligent ship network security protection algorithm was 55% to 65%. The detection rate of the algorithm proposed in this paper was able to reach 96.95% and the false positive rate was 2.56%. The detection rate of the traditional algorithm was only 70.76%, while the false positive rate reached 4.69%. All of the proposed algorithm’s data were significantly better than that of traditional algorithms, which proved that the performance of cloud computing-based real-time risk detection and protection algorithms for intelligent ship network security was significantly better than that of traditional algorithms. Full article
(This article belongs to the Special Issue Role of Symmetric Cryptography for Blockchain Technology)
Show Figures

Figure 1

Back to TopTop