Security and Communication Networks

Cryptographic Schemes and Protocols for Artificial Intelligence

Publishing date
01 Jan 2023
Submission deadline
09 Sep 2022

Lead Editor

1Wuhan University, Wuhan, China

2University of Texas at San Antonio, San Antonio, USA

3Northeastern University, Qinhuangdao, China

4Sejong University, Seoul, Republic of Korea

This issue is now closed for submissions.

Cryptographic Schemes and Protocols for Artificial Intelligence

This issue is now closed for submissions.


Relying on cloud computing, big data, and Internet of Things (IoT), artificial intelligence (AI) has developed rapidly and been widely researched in various fields such as machine learning, recommender system, and natural language processing. In recent years, remarkable surges in AI have led to several innovations including autonomous vehicles and connected IoT devices in our homes. AI is even contributing to the development of a brain-controlled robotic arm that can help a paralyzed person feel again through complex direct human-brain interfaces.

However, security issues have posed serious challenges for the widespread application of these technologies. Without the security technology, AI may not only bring convenience, but also disaster. Cryptography is the core technology to solve security problems, how to adapt it to AI is a key issue. The state-of-the-art mainly focuses on secure multiparty computation, homomorphic encryption, secure outsourcing computation, and federated learning. In addition, verifiable technology has also become important to ensure correctness and integrity of AI systems. However, there is still a lack of appropriate cryptographic technology that can balance security and accuracy for AI. On the other hand, some cryptographic primitives having been used in AI are high consuming in computation or communication, which greatly impacts the usability and practicability. Exploring lightweight cryptographic alternatives and new promising cryptographic techniques for AI is still a challenging research direction.

This Special Issue welcomes original research and review articles on the topic of cryptographic schemes and protocols for artificial intelligence.

Potential topics include but are not limited to the following:

  • Security and privacy risks/models for AI system
  • Security and privacy issues for AI in blockchains
  • Security and privacy issues for AI in IoT
  • Security and privacy issues for AI in specific application scenarios
  • Security and privacy issues for distributed AI systems
  • Cryptographic schemes and protocols for AI
  • Secure multiparty computation protocols for AI
  • Homomorphic encryption scheme for AI
  • Secure outsourcing scheme for AI
  • Privacy-preserving data mining and machine learning
  • Privacy-preserving federated learning
  • Privacy-preserving natural language processing
  • Privacy-preserving graphics


  • Special Issue
  • - Volume 2023
  • - Article ID 9308909
  • - Research Article

DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security

Lei Zhang | Ya Peng | ... | Xiaoyu Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 7751845
  • - Research Article

Practical Privacy Preserving-Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment

Ruoli Zhao | Yong Xie | ... | Neeraj Kumar
  • Special Issue
  • - Volume 2022
  • - Article ID 3670107
  • - Research Article

A User-Centered Medical Data Sharing Scheme for Privacy-Preserving Machine Learning

Lianhai Wang | Lingyun Meng | ... | Shuhui Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 9032828
  • - Research Article

LPS-ORAM: Perfectly Secure Oblivious RAM with Logarithmic Bandwidth Overhead

Yunping Gong | Fei Gao | ... | Qiaoyan Wen
  • Special Issue
  • - Volume 2022
  • - Article ID 7963004
  • - Research Article

Horizontally Partitioned Data Publication with Differential Privacy

Zhen Gu | Guoyin Zhang | Chen Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 1321198
  • - Research Article

Privacy-Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption

Xiaopeng Yu | Wei Zhao | ... | Dianhua Tang
  • Special Issue
  • - Volume 2022
  • - Article ID 5498058
  • - Research Article

Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications

Dharminder Dharminder | Ashok Kumar Das | ... | Athanasios V. Vasilakos
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate22%
Submission to final decision72 days
Acceptance to publication28 days
Journal Citation Indicator-
Impact Factor-

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.