Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications

被引:0
|
作者
Singh, Rashmi [1 ]
Khalid, Saifullah [2 ]
Nishad, D. K. [3 ]
Ruchira [4 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Dept Math, Noida, Uttar Pradesh, India
[2] Airport Author India, Amritsar, Punjab, India
[3] Madan Mohan Malaviya Univ Technol, Elect Engn Dept, Gorakhpur, Uttar Pradesh, India
[4] Amity Univ, Amity Sch Engn & Technol, Dept Elect & Elect Engn, Noida, Uttar Pradesh, India
关键词
Fuzzy graph theory; cryptography; uncertainty; security; image encryption; key management; attribute-based encryption; access control; wireless sensor networks; blockchain; and post-quantum cryptography; KEY DISTRIBUTION PROTOCOL; RULE BASE; REDUCTION; SYSTEMS; IDENTIFICATION; HYPERGRAPHS; BLOCKS;
D O I
10.1142/S179300572650016X
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Since the advent of networked systems, fuzzy graph theory has surfaced as a fertile paradigm for handling uncertainties and ambiguities. Among the different modes of handling challenges created by the uncertainties and ambiguities of current networked systems, integrating fuzzy graph theory with cryptography has emerged as the most promising approach. In this regard, this review paper elaborates on potentially studying fuzzy graph-based cryptographic techniques, application perspectives, and future research directions. Since the expressive power of fuzzy graphs allows the cryptographic schemes to handle imprecise information and to enhance security in many domains, several domains have benefited, such as image encryption, key management, and attribute-based encryption. The paper analyzes in depth the research landscape, mainly by focusing on the varied techniques used, such as fuzzy logic for key generation and fuzzy attribute representation for access control policies. A comparison with performance metrics unveils the trade-offs and advantages of different fuzzy graph-based approaches in efficiency, security strength, and computational overhead. Additionally, the survey explores the security applications of fuzzy graph-based cryptography and underpins potential development for secure communication in wireless sensor networks, privacy-preserving data mining, fine-grained access control in cloud computing, and blockchain security. Some challenges and research directions, such as the standardization of fuzzy logic operators, algorithmic optimization, integration with emerging technologies, and exploitation of post-quantum cryptography applications, are also brought out. This review will thus bring insight into this interdisciplinary domain and stimulate further research for the design of more robust, adaptive, and secure cryptographic systems in the wake of rising complexities and uncertainties.
引用
收藏
页数:20
相关论文
共 50 条
  • [11] FUZZY SETS - THEORY AND APPLICATIONS (SURVEY)
    GUSEV, LA
    SMIRNOVA, IM
    AUTOMATION AND REMOTE CONTROL, 1973, 34 (05) : 739 - 755
  • [12] Solving Security Issues in Mobile Computing using Cryptography Techniques-A Survey
    Mathur, Raghav
    Agarwal, Shruti
    Sharma, Vishnu
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 492 - 497
  • [13] A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications
    Cai, HongYun
    Zheng, Vincent W.
    Chang, Kevin Chen-Chuan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (09) : 1616 - 1637
  • [14] Survey on Techniques, Applications and Security of Machine Learning Interpretability
    Ji S.
    Li J.
    Du T.
    Li B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2071 - 2096
  • [15] Analysis of Various Cryptography Techniques: A Survey
    Tayal, Neha
    Bansal, Ritesh
    Gupta, Shailender
    Dhall, Sangeeta
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 59 - 92
  • [16] Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques
    Olifer, Dmitrij
    Goranin, Nikolaj
    Cenys, Antanas
    Kaceniauskas, Arnas
    Janulevicius, Justinas
    APPLIED SCIENCES-BASEL, 2019, 9 (04):
  • [17] Enhancing security in electromagnetic radiation therapy using fuzzy graph theory
    Radhey Lal
    Rajiv Kumar Singh
    Dinesh Kumar Nishad
    Saifullah Khalid
    Scientific Reports, 15 (1)
  • [18] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [19] A Survey on Heterogeneous Graph Embedding: Methods, Techniques, Applications and Sources
    Wang, Xiao
    Bo, Deyu
    Shi, Chuan
    Fan, Shaohua
    Ye, Yanfang
    Yu, Philip S.
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (02) : 415 - 436
  • [20] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534