Comprehensive Survey of the Cryptographic Framework for Data Security Using Graph Theory Protocol

Authors

  • NVSS. Prabhakar Author
  • Talari Surendra Author
  • R. Hari Kishore Author
  • K. Chittibabu Author

DOI:

https://doi.org/10.64252/f4dc5043

Keywords:

Encryption, Cryptographic models, graph theory, Edwards curves, Certificateless public key encryption, Lattice-based techniques.

Abstract

In the modern digital world, ensuring the confidentiality, authenticity, and integrity of sensitive data has become increasingly critical due to the growing prevalence of cyberattacks and privacy breaches. Traditional cryptosystems face mounting challenges from both advanced classical computing and emerging quantum computing capabilities, which threaten to compromise existing encryption frameworks [11]. To address these concerns, this paper presents a series of advanced cryptographic models incorporating graph theory, identity-based encryption. The proposed systems aim to enhance the security, efficiency, and resilience of digital data protection systems.

Downloads

Download data is not yet available.

Downloads

Published

2025-10-08

Issue

Section

Articles

How to Cite

Comprehensive Survey of the Cryptographic Framework for Data Security Using Graph Theory Protocol. (2025). International Journal of Environmental Sciences, 2139-2149. https://doi.org/10.64252/f4dc5043