Comprehensive Survey of the Cryptographic Framework for Data Security Using Graph Theory Protocol
DOI:
https://doi.org/10.64252/f4dc5043Keywords:
Encryption, Cryptographic models, graph theory, Edwards curves, Certificateless public key encryption, Lattice-based techniques.Abstract
In the modern digital world, ensuring the confidentiality, authenticity, and integrity of sensitive data has become increasingly critical due to the growing prevalence of cyberattacks and privacy breaches. Traditional cryptosystems face mounting challenges from both advanced classical computing and emerging quantum computing capabilities, which threaten to compromise existing encryption frameworks [11]. To address these concerns, this paper presents a series of advanced cryptographic models incorporating graph theory, identity-based encryption. The proposed systems aim to enhance the security, efficiency, and resilience of digital data protection systems.