Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi

    Ahmed I. Alutaibi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 875-903, 2025, DOI:10.32604/cmc.2025.067078 - 29 August 2025

    Abstract The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes, particularly in Decentralized Finance (DeFi) systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification. This paper proposes a quantum-resilient, blockchain-based identity verification framework designed to address critical challenges in privacy preservation, scalability, and post-quantum security. The proposed model integrates Post-quantum Cryptography (PQC), specifically lattice-based cryptographic primitives, with Decentralized Identifiers (DIDs) and Zero-knowledge Proofs (ZKPs) to ensure verifiability, anonymity, and resistance to quantum attacks. A dual-layer architecture is introduced, comprising an identity layer for credential generation and validation,… More >

  • Open Access

    ARTICLE

    Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption

    Fatima Asiri*, Wajdan Al Malwi

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 2053-2077, 2025, DOI:10.32604/cmes.2025.064348 - 30 May 2025

    Abstract Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing. To address these concerns, this paper presents the mathematical and computer modeling of a novel two-dimensional (2D) chaotic system for secure key generation in quantum image encryption (QIE). The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence, named as Trigonometric-Rational-Saturation (TRS) map. Through rigorous mathematical analysis and computational simulations, the map is extensively evaluated for bifurcation behaviour, chaotic trajectories, and Lyapunov exponents. The security evaluation validates the map’s… More >

  • Open Access

    ARTICLE

    Secure Image Communication Using Galois Field, Hyper 3D Logistic Map, and B92 Quantum Protocol

    De Rosal Ignatius Moses Setiadi1,2, Nova Rijati2,*, Ahmad Rofiqul Muslikh3, Bonifacius Vicky Indriyono4, Aceng Sambas5,6

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4435-4463, 2024, DOI:10.32604/cmc.2024.058478 - 19 December 2024

    Abstract In this paper, we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption. Specifically, we leverage the B92 Quantum Key Distribution (QKD) protocol to secure the distribution of encryption keys, which are further processed through Galois Field (GF(28)) operations for increased security. The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map (H3LM), a chaotic system that generates complex and unpredictable sequences, thereby ensuring strong confusion and diffusion in the encryption process. This hybrid approach More >

  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439 - 30 January 2024

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks,… More >

Displaying 1-10 on page 1 of 4. Per Page