Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications

被引:0
|
作者
Singh, Rashmi [1 ]
Khalid, Saifullah [2 ]
Nishad, D. K. [3 ]
Ruchira [4 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Dept Math, Noida, Uttar Pradesh, India
[2] Airport Author India, Amritsar, Punjab, India
[3] Madan Mohan Malaviya Univ Technol, Elect Engn Dept, Gorakhpur, Uttar Pradesh, India
[4] Amity Univ, Amity Sch Engn & Technol, Dept Elect & Elect Engn, Noida, Uttar Pradesh, India
关键词
Fuzzy graph theory; cryptography; uncertainty; security; image encryption; key management; attribute-based encryption; access control; wireless sensor networks; blockchain; and post-quantum cryptography; KEY DISTRIBUTION PROTOCOL; RULE BASE; REDUCTION; SYSTEMS; IDENTIFICATION; HYPERGRAPHS; BLOCKS;
D O I
10.1142/S179300572650016X
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Since the advent of networked systems, fuzzy graph theory has surfaced as a fertile paradigm for handling uncertainties and ambiguities. Among the different modes of handling challenges created by the uncertainties and ambiguities of current networked systems, integrating fuzzy graph theory with cryptography has emerged as the most promising approach. In this regard, this review paper elaborates on potentially studying fuzzy graph-based cryptographic techniques, application perspectives, and future research directions. Since the expressive power of fuzzy graphs allows the cryptographic schemes to handle imprecise information and to enhance security in many domains, several domains have benefited, such as image encryption, key management, and attribute-based encryption. The paper analyzes in depth the research landscape, mainly by focusing on the varied techniques used, such as fuzzy logic for key generation and fuzzy attribute representation for access control policies. A comparison with performance metrics unveils the trade-offs and advantages of different fuzzy graph-based approaches in efficiency, security strength, and computational overhead. Additionally, the survey explores the security applications of fuzzy graph-based cryptography and underpins potential development for secure communication in wireless sensor networks, privacy-preserving data mining, fine-grained access control in cloud computing, and blockchain security. Some challenges and research directions, such as the standardization of fuzzy logic operators, algorithmic optimization, integration with emerging technologies, and exploitation of post-quantum cryptography applications, are also brought out. This review will thus bring insight into this interdisciplinary domain and stimulate further research for the design of more robust, adaptive, and secure cryptographic systems in the wake of rising complexities and uncertainties.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] A survey on graph embedding techniques for biomedical data: Methods and applications
    Wu, Yaozu
    Chen, Yankai
    Yin, Zhishuai
    Ding, Weiping
    King, Irwin
    INFORMATION FUSION, 2023, 100
  • [22] Graph Theory: A Comprehensive Survey about Graph Theory Applications in Computer Science and Social Networks
    Majeed, Abdul
    Rauf, Ibtisam
    INVENTIONS, 2020, 5 (01)
  • [23] Survey of security on identity-based cryptography
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2009, 9 (1537-1548):
  • [24] ECONOMIC APPLICATIONS OF FUZZY SUBSET THEORY AND FUZZY LOGIC: A BRIEF SURVEY
    Shin, C. Y.
    Wangy, Paul P.
    NEW MATHEMATICS AND NATURAL COMPUTATION, 2010, 6 (03) : 301 - 320
  • [25] Survey on Applications of List Decoding to Cryptography
    Zhang Zhuoran
    Zhang Huang
    Zhang Fangguo
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1049 - 1060
  • [26] Applications of Machine Learning in Cryptography: A Survey
    Alani, Mohammed M.
    PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 23 - 27
  • [27] SURVEY OF MODEL REFERENCE ADAPTIVE TECHNIQUES - THEORY AND APPLICATIONS
    LANDAU, ID
    AUTOMATICA, 1974, 10 (04) : 353 - 379
  • [28] Security of the GPT cryptosystem and its applications to cryptography
    Rashwan, Haitham
    Gabidulin, Ernst M.
    Honary, Bahram
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 937 - 946
  • [29] Advanced theory and practice for cryptography and future security
    Preneel, Bart
    Kim, Jongsung
    Sauveron, Damien
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 1 - 2
  • [30] Integrating Some Security and Fault Tolerant Techniques for Military Applications of Internet of Things
    Zielinski, Zbigniew
    Chudzikiewicz, Jan
    Furtak, Janusz
    Glebocki, Pawel
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 117 - 122