applsci-logo

Journal Browser

Journal Browser

Digital Signature and Cryptography: Latest Advances and Prospects

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (30 November 2023) | Viewed by 2919

Special Issue Editor


E-Mail Website
Guest Editor
Information Technology Center, The University of Tokyo, Tokyo, Japan
Interests: computer science; information security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Today, digital signatures, as a major and successful application of cryptography, play an essential role in business processes representing the intention of signers. We now see a number of enterprise applications and products that leverage digital signatures in a workflow. Multi-signatures, group signatures, and BBS+ signatures are now within the scope of deployment to handle complicated workflows and business scenarios. Furthermore, in terms of integrity, digital signature technology is fundamental in guaranteeing the integrity of blockchains. Verifiable credentials essentially use digital signatures to claim their integrity. Digital signatures are now studied to extend to apply to new application fields and new cryptography, including lattice cryptography. In this Special Issue, reflecting this growing significance of digital signatures in theory and application scenarios, papers discussing latest advances and prospects of digital signatures in theory and applications are called for.

Dr. Hiroyuki Sato
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • digital signature
  • multi signature
  • group signature
  • BBS+ signature
  • blockchain
  • verifiable credentials
  • business process management
  • workflow

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 1341 KiB  
Article
Enhancing the Privacy of Network Services through Trusted Computing
by Denghui Zhang, Lijing Ren and Zhaoquan Gu
Appl. Sci. 2022, 12(18), 9191; https://doi.org/10.3390/app12189191 - 14 Sep 2022
Cited by 2 | Viewed by 1795
Abstract
The addressing and discovering service is a vital infrastructure of the Internet. New applications and scenarios in next-generation networks rely on the secure and stable operation of domain name services, which puts forward new security challenges for the original domain name mechanism. While [...] Read more.
The addressing and discovering service is a vital infrastructure of the Internet. New applications and scenarios in next-generation networks rely on the secure and stable operation of domain name services, which puts forward new security challenges for the original domain name mechanism. While previous security enhancements of network services struggled to strike a balance between security, performance, and compatibility, hindering further use of core network services, the TEE (Trusted Computing Environment) technology can provide trusted and confidential services in untrusted network environments by verifiable hardware signatures. In this paper, we present a novel trustworthy service architecture with the preservation of security and privacy for addressing messages. The scheme provides a secure enclave to generate authenticatable responses between clients and targets, thus ensuring the privacy of services. We further build a new TEE compilation model to ensure that the built resolver application can provide trusted and secure services within TEE while keeping the availability without the TEE hardware. Experimental results show that our approach can enhance the privacy and security of addressing services such as DNS (Domain Name System) without sacrificing the quality of service and breaking the infrastructures of existing services. Full article
(This article belongs to the Special Issue Digital Signature and Cryptography: Latest Advances and Prospects)
Show Figures

Figure 1

Back to TopTop