Special Issues
Table of Content

Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations

Submission Deadline: 30 June 2026 View: 1969 Submit to Special Issue

Guest Editor(s)

Dr. Mujeeb Ur Rehman

Email: mujeeb.rehman@dmu.ac.uk

Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom

Homepage:

Research Interests: artificial intelligence, cyber security, quantum cryptography, IoMT, etc.


Dr. Muhammad Kazim

Email: muhammad.kazim@dmu.ac.uk

Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom

Homepage:

Research Interests: quantum cryptography, edge computing and AI, internet of things security, software engineering, etc.


Dr. Sohail Khalid

Email: s.khalid@riphah.edu.pk

Affiliation: Electrical and Computer Engineering Department, Islamabad, I-14, Pakistan

Homepage:

Research Interests: machine learning, deep learning, artificial intelligence, etc.


Summary

By 2025, cybercrime costs are projected to exceed $10 trillion annually, while most current cryptographic standards face disruption from quantum computing. At the same time, AI is reshaping cybersecurity powering both advanced attacks and intelligent defences while chaos-based encryption is emerging as a lightweight, scalable option for real-time applications such as IoT, UAVs, telehealth, and smart cities. This Special Issue explores the convergence of post-quantum cryptography (PQC), AI-driven security, and chaos-based techniques, with a focus on resilient, scalable, and trustworthy solutions. We invite contributions that advance both theory and practice, including hybrid PQC-AI models, federated learning frameworks, and chaos-inspired cryptographic systems for multimedia and critical infrastructure.

Topics of interest include:
· Post-Quantum Cryptography (algorithms, frameworks, optimisations)
· Chaos-based encryption and multimedia security
· Hybrid AI-PQC-Chaos architectures
· Lattice-, code-, multivariate-, and hash-based cryptography
· AI-driven intrusion and anomaly detection
· Explainable and interpretable AI
· Federated and edge learning for decentralised defence
· Quantum-AI hybrid protocols
· Privacy-preserving, energy-efficient cryptographic schemes
· PQC and chaos-based multimedia protection
· Adversarial AI and data poisoning countermeasures
· Benchmarking and performance evaluation


Keywords

Post-Quantum Cryptography (PQC); Artificial Intelligence (AI); Explainable AI (XAI); Chaotic Cryptography; Multimedia Security; Intrusion Detection; Federated Learning; IoT Security; UAV Security; Telehealth Security; Smart Cities; Critical Infrastructure Protection

Published Papers


  • Open Access

    ARTICLE

    Hash-Based Signature Authentication for Scalable and Security-Consistent QKD Post-Processing

    Chaokun Wang, Sijiang Xie, Yalong Yan, Hong Zhao
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2026.077994
    (This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
    Abstract Quantum Key Distribution (QKD) ensures secure key establishment through the principles of quantum mechanics; however, its effectiveness in practice hinges on dependable identity verification via classical channels during the post-processing phase. Current QKD implementations typically depend on pre-existing symmetric-key authentication, which suffers from limited scalability and complicated key management in extensive networks. Authentication methods utilizing post-quantum cryptography (PQC) signatures, based on complex mathematical assumptions, introduce extra and uncertain security dependencies, potentially compromising the security model integrity that QKD aims to maintain. This paper explores the application of hash-based signatures (HBS) for identity verification in the… More >

  • Open Access

    ARTICLE

    An AI-Blockchain Hybrid Model to Enhance Security and Trust in Web 4.0

    Samer R. Sabbah, Mohammad Rasmi Al-Mousa, Ala’a Al-Shaikh, Ahmad Al Smadi, Suhaila Abuowaida, Amina Salhi, Arij Alfaidi
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2026.079241
    (This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
    Abstract Web 4.0 platforms introduce intelligent, decentralized agents and real-time interactions that increase both utility and attack surface. This paper presents a comprehensive, reproducible AI blockchain hybrid designed to (1) detect SQL injection attacks at scale using a textual TFIDF + machine-learning pipeline, (2) incorporate reputation signals from a real-world Bitcoin OTC trust dataset to compute a TrustAlert Score (TAS) that prioritizes alerts and guides logging policy, and (3) record privacy-preserving audit digests on blockchain, optionally attested via a zero-knowledge proof (ZKP) pipeline. We evaluate the system on a 148 k SQL corpus and Soc-SignBitcoinOTC reputation More >

  • Open Access

    REVIEW

    Quantum Secure Multiparty Computation: Bridging Privacy, Security, and Scalability in the Post-Quantum Era

    Sghaier Guizani, Tehseen Mazhar, Habib Hamam
    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073883
    (This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
    Abstract The advent of quantum computing poses a significant challenge to traditional cryptographic protocols, particularly those used in Secure Multiparty Computation (MPC), a fundamental cryptographic primitive for privacy-preserving computation. Classical MPC relies on cryptographic techniques such as homomorphic encryption, secret sharing, and oblivious transfer, which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries. This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI, IEEE Explore, Springer, and Elsevier, examining the applications, types, and security issues with the solution of… More >

Share Link