Cryptographic Schemes and Protocols for Blockchain Systems

  in Special Issue   Posted on September 28, 2020

Information for the Special Issue

Special Issue Call for Papers:


The blockchain, originated from the Bitcoin in 2008, has shown significant potentials in achieving large-scale self-organizing in trustless distribute networks. Taking the traits of its properties, such as decentralization, autonomous, and other possible functions, it has aroused widespread interest in academia and industry all over the world. Also, its related researches and applications have been quickly extended from the original cryptocurrencies into the financial industry, the Internet of Things and the intelligent manufacturing, etc. However, with the deepening of researches, the security and privacy issues of the blockchain have gradually emerged, such as improper key management, weak anonymity and transactions information leakage.

As the security and privacy is a key evaluation parameter in the practical deployments of the blockchain platforms or the blockchain-based applications, some researches have been conducted in the area of cryptography and cryptographic techniques, which are considered as the underlying fundaments of the blockchain. However, on the one hand, there are still many cryptographic techniques that can provide desirable security properties have not been well-studied or well-applied in blockchain. On the other hand, some cryptographic primitives having been used in existing blockchain systems are high-consuming in computation or communication, which greatly impacts the usability and practicability of the blockchain. Exploring lightweight cryptographic alternatives and new promising cryptographic techniques for blockchain is still a challenging research direction.

Topics of interest:

This special issue entitled will mainly focus on the challenges of cryptographic techniques used for the blockchain systems and its applications. Topics will include but are not limited to:

  • Hash functions for blockchain systems
  • Digital signature schemes for blockchain systems
  • Encryption schemes for blockchain systems
  • Access control protocol for blockchain systems
  • Authentication schemes for blockchain systems
  • Key management protocols for blockchain systems
  • Commitments and zero-knowledge proofs for blockchain systems
  • Secure multi-party computation protocols for blockchain systems
  • Proof of retrievability schemes for blockchain systems
  • Private information retrieval schemes for blockchain systems
  • Post-quantum cryptography for blockchain systems

Submission Guidelines:

Authors should prepare their manuscript according to the guide for authors available from the online submission page of the Journal of Information Security and Applications (JISA) at Authors should select “SI: CSPBC” when they reach the “Article Type” step in the submission process.

Submitted papers must contain original work, which has neither been previously published nor it is currently under review by another journal or conference. Previously published or accepted conference papers must contain at least 50% new material to be considered for the special issue.

All papers will be peer-reviewed by at least two independent reviewers. Requests for additional information should be addressed to the corresponding guest editor.

Important Dates:

  • Submission deadline: 2020-10-31
  • First round notification: 2021-01-31
  • Revised due: 2021-02-28
  • Final notification: 2021-05-31

Guest Editors:

Debiao He received his Ph.D. degree in applied mathematics from School of Mathematics and Statistics, Wuhan University, Wuhan, China in 2009. He is currently a professor of the School of Cyber Science and Engineering, Wuhan University, Wuhan, China. His main research interests include cryptography and information security, in particular, cryptographic protocols. He has published over 150 research papers in refereed international journals and conferences, such as IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Security and Forensic, and Usenix Security Symposium. He is the recipient of the 2018 IEEE Sysems Journal Best Paper Award and the 2019 IET Information Security Best Paper Award. His work has been cited more than 7000 times at Google Scholar. He is in the Editorial Board of several international journals, such as Journal of Information Security and Applications, Frontiers of Computer Science, and Human-centric Computing & Information Sciences.

Kim-Kwang Raymond Choo holds the Cloud Technology Endowed Professorship in the Department of Information Systems and Cyber Security at the University of Texas at San Antonio, and is an Adjunct Associate Professor of Cyber Security and Forensics at the University of South Australia, Australia. He serves on the editorial board of Computers & Electrical Engineering, Cluster Computing, Digital Investigation, IEEE Access, IEEE Cloud Computing, IEEE Communications Magazine, Future Generation Computer Systems, Journal of Network and Computer Applications, PLoS ONE, Soft Computing, etc. He also serves as the Special Issue Guest Editor of ACM Transactions on Embedded Computing Systems (2017; DOI: 10.1145/3015662), ACM Transactions on Internet Technology (2016; DOI: 10.1145/3013520), Digital Investigation (2016; DOI: 10.1016/j.diin.2016.08.003), Future Generation Computer Systems (2016; DOI: 10.1016/j.future.2016.04.017, 2018; DOI: 10.1016/j.future.2017.09.014), IEEE Cloud Computing (2015; DOI: 10.1109/MCC.2015.84), IEEE Network (2016; DOI: 10.1109/MNET.2016.7764272), IEEE Transactions on Cloud Computing (2017; DOI: 10.1109/TCC.2016.2582278), IEEE Transactions on Dependable and Secure Computing (2017; DOI: 10.1109/TDSC.2017.2664183), Journal of Computer and System Sciences (2017; DOI: 10.1016/j.jcss.2016.09.001), Multimedia Tools and Applications (2017; DOI: 10.1007/s11042-016-4081-z), Personal and Ubiquitous Computing (2017; DOI: 10.1007/s00779-017-1043-z), Pervasive and Mobile Computing (2016; DOI: 10.1016/j.pmcj.2016.10.003), Wireless Personal Communications (2017; DOI: 10.1007/s11277-017-4278-0) etc. He is a Fellow of the Australian Computer Society, and a Senior Member of IEEE. He can be contacted at

Aniello Castiglione received the Ph.D. degree in computer science from the University of Salerno, Fisciano, Italy.,He is an Adjunct Professor with the University of Salerno, and the University of Naples Federico II, Naples, Italy. He has authored or co-authored over 190 papers in international journals and conferences. His current research interests include information forensics, digital forensics, security and privacy on cloud, communication networks, applied cryptography, and sustainable computing. Dr. Castiglione has served in the organization (mainly as the Program Chair and a TPC member) of approximately 200 international conferences. He served as a Reviewer for approximately 100 international journals and the Managing Editor of two ISI-ranked international journals. He was a Guest Editor of approximately 20 special issues and served as an Editor on approximately 10 Editorial Boards of international journals. One of his papers (published in the IEEE Transactions on Dependable and Secure Computing) was selected as the “Featured Article” in the “IEEE Cybersecurity Initiative,” in 2014, while in 2018 another paper (published in the IEEE Transactions on Cloud Computing) was selected as the “Featured Article” in the “IEEE Cloud Computing Initiative.” He can be contacted at

Qi Jiang received the B.S. degree in Computer Science from Shaanxi Normal University in 2005 and Ph.D. degree in Computer Science from Xidian University in 2011. He is now a full professor with School of Cyber Engineering, Xidian University. His research interests are in security and privacy in wireless networks and IoT. In particular, the focus of his research has been on authentication protocols. He has published more than 50 journal and conference papers, 10 of them have been selected as highly cited papers. He can be contacted at

Other Special Issues on this journal


Trends in Cybersecurity

Journal of Information Security and Applications
Mon 09 Nov 2020

Closed Special Issues