Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications

被引:0
|
作者
Singh, Rashmi [1 ]
Khalid, Saifullah [2 ]
Nishad, D. K. [3 ]
Ruchira [4 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Dept Math, Noida, Uttar Pradesh, India
[2] Airport Author India, Amritsar, Punjab, India
[3] Madan Mohan Malaviya Univ Technol, Elect Engn Dept, Gorakhpur, Uttar Pradesh, India
[4] Amity Univ, Amity Sch Engn & Technol, Dept Elect & Elect Engn, Noida, Uttar Pradesh, India
关键词
Fuzzy graph theory; cryptography; uncertainty; security; image encryption; key management; attribute-based encryption; access control; wireless sensor networks; blockchain; and post-quantum cryptography; KEY DISTRIBUTION PROTOCOL; RULE BASE; REDUCTION; SYSTEMS; IDENTIFICATION; HYPERGRAPHS; BLOCKS;
D O I
10.1142/S179300572650016X
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Since the advent of networked systems, fuzzy graph theory has surfaced as a fertile paradigm for handling uncertainties and ambiguities. Among the different modes of handling challenges created by the uncertainties and ambiguities of current networked systems, integrating fuzzy graph theory with cryptography has emerged as the most promising approach. In this regard, this review paper elaborates on potentially studying fuzzy graph-based cryptographic techniques, application perspectives, and future research directions. Since the expressive power of fuzzy graphs allows the cryptographic schemes to handle imprecise information and to enhance security in many domains, several domains have benefited, such as image encryption, key management, and attribute-based encryption. The paper analyzes in depth the research landscape, mainly by focusing on the varied techniques used, such as fuzzy logic for key generation and fuzzy attribute representation for access control policies. A comparison with performance metrics unveils the trade-offs and advantages of different fuzzy graph-based approaches in efficiency, security strength, and computational overhead. Additionally, the survey explores the security applications of fuzzy graph-based cryptography and underpins potential development for secure communication in wireless sensor networks, privacy-preserving data mining, fine-grained access control in cloud computing, and blockchain security. Some challenges and research directions, such as the standardization of fuzzy logic operators, algorithmic optimization, integration with emerging technologies, and exploitation of post-quantum cryptography applications, are also brought out. This review will thus bring insight into this interdisciplinary domain and stimulate further research for the design of more robust, adaptive, and secure cryptographic systems in the wake of rising complexities and uncertainties.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Heterogeneous graph neural networks analysis: a survey of techniques, evaluations and applications
    Bing, Rui
    Yuan, Guan
    Zhu, Mu
    Meng, Fanrong
    Ma, Huifang
    Qiao, Shaojie
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (08) : 8003 - 8042
  • [32] Heterogeneous graph neural networks analysis: a survey of techniques, evaluations and applications
    Rui Bing
    Guan Yuan
    Mu Zhu
    Fanrong Meng
    Huifang Ma
    Shaojie Qiao
    Artificial Intelligence Review, 2023, 56 : 8003 - 8042
  • [33] A survey on cryptography algorithms in security of voting system approaches
    Wayed, Majid Javid
    Ghani, Abdul Azim Abdul
    Mahmod, Ramlan
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 190 - 200
  • [34] Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
    Hamamreh, Jehad M.
    Furqan, Haji M.
    Arslan, Huseyin
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1773 - 1828
  • [35] Survey on applications of deep learning and machine learning techniques for cyber security
    Alghamdi M.I.
    Alghamdi, Mohammed I. (mialmushilah@bu.edu.sa), 2020, International Association of Online Engineering (14): : 210 - 224
  • [36] Graph Theory and Cyber Security
    Dawood, Harith A.
    3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 90 - 96
  • [37] Applications of Fuzzy Rough Set Theory in Machine Learning: a Survey
    Vluymans, Sarah
    D'eer, Lynn
    Saeys, Yvan
    Cornelis, Chris
    FUNDAMENTA INFORMATICAE, 2015, 142 (1-4) : 53 - 86
  • [38] Computational Algebra, Coding Theory, and Cryptography: Theory and Applications
    Bordbar, Hashem
    AXIOMS, 2024, 13 (11)
  • [39] Survey of the Development of Quantum Cryptography and Its Applications
    Alvarez, Daniel
    Kim, Yoohwan
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 1074 - 1080
  • [40] Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
    Mucchi, Lorenzo
    Nizzi, Francesca
    Pecorella, Tommaso
    Fantacci, Romano
    Esposito, Flavin
    2019 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2019,