{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:21:51Z","timestamp":1774171311977,"version":"3.50.1"},"reference-count":106,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Math. and Nat. Computation"],"published-print":{"date-parts":[[2026,3]]},"abstract":"<jats:p>Since the advent of networked systems, fuzzy graph theory has surfaced as a fertile paradigm for handling uncertainties and ambiguities. Among the different modes of handling challenges created by the uncertainties and ambiguities of current networked systems, integrating fuzzy graph theory with cryptography has emerged as the most promising approach. In this regard, this review paper elaborates on potentially studying fuzzy graph-based cryptographic techniques, application perspectives, and future research directions. Since the expressive power of fuzzy graphs allows the cryptographic schemes to handle imprecise information and to enhance security in many domains, several domains have benefited, such as image encryption, key management, and attribute-based encryption. The paper analyzes in depth the research landscape, mainly by focusing on the varied techniques used, such as fuzzy logic for key generation and fuzzy attribute representation for access control policies. A comparison with performance metrics unveils the trade-offs and advantages of different fuzzy graph-based approaches in efficiency, security strength, and computational overhead. Additionally, the survey explores the security applications of fuzzy graph-based cryptography and underpins potential development for secure communication in wireless sensor networks, privacy-preserving data mining, fine-grained access control in cloud computing, and blockchain security. Some challenges and research directions, such as the standardization of fuzzy logic operators, algorithmic optimization, integration with emerging technologies, and exploitation of post-quantum cryptography applications, are also brought out. This review will thus bring insight into this interdisciplinary domain and stimulate further research for the design of more robust, adaptive, and secure cryptographic systems in the wake of rising complexities and uncertainties.<\/jats:p>","DOI":"10.1142\/s179300572650016x","type":"journal-article","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T04:09:43Z","timestamp":1724990983000},"page":"271-290","source":"Crossref","is-referenced-by-count":9,"title":["Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications"],"prefix":"10.1142","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6139-466X","authenticated-orcid":false,"given":"Rashmi","family":"Singh","sequence":"first","affiliation":[{"name":"Department of Mathematics, Amity Institute of Applied Sciences, Amity University, Noida, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9484-8608","authenticated-orcid":false,"given":"Saifullah","family":"Khalid","sequence":"additional","affiliation":[{"name":"Airport Authority of India, Amritsar, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5270-0922","authenticated-orcid":false,"given":"D. K.","family":"Nishad","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Madan Mohan Malaviya University of Technology, Gorakhpur, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1982-9866","authenticated-orcid":false,"family":"Ruchira","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh, India"}]}],"member":"219","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"S179300572650016XBIB001","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-775260-0.50008-6"},{"key":"S179300572650016XBIB002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-1854-3"},{"key":"S179300572650016XBIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71407-3"},{"key":"S179300572650016XBIB004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76454-2"},{"key":"S179300572650016XBIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.12.023"},{"key":"S179300572650016XBIB006","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"S179300572650016XBIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1_1"},{"key":"S179300572650016XBIB008","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2019.8858936"},{"key":"S179300572650016XBIB009","doi-asserted-by":"publisher","DOI":"10.1109\/SOCPAR.2010.5686082"},{"key":"S179300572650016XBIB010","first-page":"1451","volume":"33","author":"Sunitha M. S.","year":"2002","journal-title":"Indian Journal of Pure and Applied Mathematics"},{"key":"S179300572650016XBIB011","doi-asserted-by":"publisher","DOI":"10.12988\/ams.2013.13226"},{"key":"S179300572650016XBIB012","doi-asserted-by":"publisher","DOI":"10.1142\/S1793005717400087"},{"key":"S179300572650016XBIB013","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488517500040"},{"key":"S179300572650016XBIB014","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2006.09.005"},{"key":"S179300572650016XBIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2007.10.007"},{"key":"S179300572650016XBIB016","first-page":"39979","volume":"10","author":"Singh R.","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"key":"S179300572650016XBIB017","first-page":"020038","author":"Singh R.","year":"2017","journal-title":"AIP Conference Proceedings, 1897"},{"key":"S179300572650016XBIB018","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-111X(199711\/12)12:11\/12<891::AID-INT7>3.0.CO;2-S"},{"key":"S179300572650016XBIB019","first-page":"118","volume":"18","author":"Singh R.","year":"2019","journal-title":"WSEAS Transactions on Mathematics"},{"key":"S179300572650016XBIB020","doi-asserted-by":"publisher","DOI":"10.1063\/1.5086638"},{"key":"S179300572650016XBIB021","doi-asserted-by":"publisher","DOI":"10.37394\/23206.2020.19.53"},{"key":"S179300572650016XBIB022","doi-asserted-by":"publisher","DOI":"10.1109\/ISCON52037.2021.9702321"},{"key":"S179300572650016XBIB023","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7346-8_56"},{"key":"S179300572650016XBIB024","doi-asserted-by":"publisher","DOI":"10.3390\/math11040853"},{"issue":"1","key":"S179300572650016XBIB025","first-page":"174","volume":"32","author":"Yadav P.","year":"2024","journal-title":"Journal of Computational Analysis and Applications"},{"issue":"1","key":"S179300572650016XBIB026","first-page":"61","volume":"22","author":"Akram M.","year":"2021","journal-title":"Scalable Computing: Practice and Experience"},{"key":"S179300572650016XBIB027","doi-asserted-by":"publisher","DOI":"10.1006\/jaer.2001.0705"},{"key":"S179300572650016XBIB028","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.201012.002"},{"key":"S179300572650016XBIB029","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(87)90012-2"},{"key":"S179300572650016XBIB030","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"S179300572650016XBIB031","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"issue":"1","key":"S179300572650016XBIB032","first-page":"145","volume":"22","author":"Gani A. N.","year":"2003","journal-title":"Bulletin of Pure and Applied Sciences"},{"key":"S179300572650016XBIB033","doi-asserted-by":"publisher","DOI":"10.3390\/math8030424"},{"key":"S179300572650016XBIB034","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2017.10.004"},{"key":"S179300572650016XBIB035","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2018.06.007"},{"key":"S179300572650016XBIB036","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.2973941"},{"key":"S179300572650016XBIB037","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2019.8858940"},{"key":"S179300572650016XBIB038","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1995.409789"},{"key":"S179300572650016XBIB039","first-page":"611","volume":"9","author":"Vengatesan K.","year":"2015","journal-title":"Journal of Pure and Applied Microbiology"},{"key":"S179300572650016XBIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.06.024"},{"key":"S179300572650016XBIB041","first-page":"21","volume-title":"Proc. 2010 Int. Conf. on Intelligent Computing and Cognitive Informatics","author":"Wang Y.","year":"2014"},{"key":"S179300572650016XBIB042","first-page":"1659","volume":"28","author":"Anjali N.","year":"2015","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"S179300572650016XBIB043","first-page":"271","volume":"24","author":"Mordeson J. N.","year":"2016","journal-title":"Journal of Fuzzy Mathematics"},{"key":"S179300572650016XBIB044","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1007\/978-981-15-1084-7_71","volume-title":"Intelligent Computing and Communication, Advances in Intelligent Systems and Computing","volume":"1034","author":"Jain K.","year":"2019"},{"key":"S179300572650016XBIB045","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2012.157"},{"key":"S179300572650016XBIB046","first-page":"1","volume-title":"11th Int. Conf. Wireless Communications, Networking and Mobile Computing (WiCOM 2015)","author":"Sheu S.-T.","year":"2015"},{"issue":"5","key":"S179300572650016XBIB047","first-page":"5386","volume":"35","author":"Tong Q.","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"S179300572650016XBIB048","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4364"},{"key":"S179300572650016XBIB049","doi-asserted-by":"publisher","DOI":"10.3390\/app13127113"},{"issue":"3","key":"S179300572650016XBIB050","first-page":"160","volume":"2019","author":"Sitara","year":"2019","journal-title":"Journal of Fuzzy Set Valued Analysis"},{"issue":"1","key":"S179300572650016XBIB051","first-page":"92","volume":"4","author":"Sunitha M. S.","year":"2013","journal-title":"Annals of Pure and Applied Mathematics"},{"key":"S179300572650016XBIB052","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04265-z"},{"issue":"1","key":"S179300572650016XBIB053","first-page":"145","volume":"26","author":"Gani A. N.","year":"2007","journal-title":"Bulletin of Pure & Applied Sciences-Mathematics and Statistics"},{"issue":"2","key":"S179300572650016XBIB054","first-page":"571","volume":"28","author":"Rashmanlou H.","year":"2011","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"S179300572650016XBIB055","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-39756-1"},{"issue":"3","key":"S179300572650016XBIB056","first-page":"261","volume":"18","author":"Akram M.","year":"2017","journal-title":"Scalable Computing: Practice and Experience"},{"issue":"1","key":"S179300572650016XBIB057","first-page":"39","volume":"19","author":"Akram M.","year":"2018","journal-title":"Scalable Computing: Practice and Experience"},{"issue":"3","key":"S179300572650016XBIB058","first-page":"455","volume":"21","author":"Akram M.","year":"2020","journal-title":"Scalable Computing: Practice and Experience"},{"key":"S179300572650016XBIB059","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1637154"},{"key":"S179300572650016XBIB060","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1637153"},{"key":"S179300572650016XBIB061","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"S179300572650016XBIB062","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0475-x"},{"key":"S179300572650016XBIB063","doi-asserted-by":"publisher","DOI":"10.3390\/axioms11120697"},{"key":"S179300572650016XBIB064","doi-asserted-by":"publisher","DOI":"10.1142\/S1793005718500278"},{"issue":"3","key":"S179300572650016XBIB065","first-page":"2649","volume":"38","author":"Mathew S.","year":"2020","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"5","key":"S179300572650016XBIB066","first-page":"5089","volume":"35","author":"Qaid A. M.","year":"2018","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"S179300572650016XBIB067","first-page":"60","volume-title":"2019 1st Int. Conf. on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)","author":"Khokhlov N.","year":"2019"},{"key":"S179300572650016XBIB068","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1637151"},{"key":"S179300572650016XBIB069","volume-title":"Graph Databases: New Opportunities for Connected Data","author":"Robinson I.","year":"2015"},{"key":"S179300572650016XBIB070","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03915-7_26"},{"key":"S179300572650016XBIB072","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24666-1_9"},{"key":"S179300572650016XBIB073","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-557-3.ch189"},{"issue":"18","key":"S179300572650016XBIB074","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5120\/21637-4965","volume":"121","author":"Mudiaa P. M.","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"S179300572650016XBIB075","doi-asserted-by":"publisher","DOI":"10.1109\/6104.956807"},{"key":"S179300572650016XBIB076","first-page":"012067","volume":"1591","author":"Ajeena R.","year":"2020","journal-title":"Journal of Physics: Conference Series"},{"key":"S179300572650016XBIB077","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.11.001"},{"key":"S179300572650016XBIB078","doi-asserted-by":"publisher","DOI":"10.1109\/ICINC58035.2022.00034"},{"key":"S179300572650016XBIB079","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.047"},{"key":"S179300572650016XBIB080","first-page":"611","volume":"9","author":"Vengatesan K.","year":"2015","journal-title":"Journal of Pure and Applied Microbiology"},{"key":"S179300572650016XBIB081","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103801"},{"key":"S179300572650016XBIB082","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43505-2_14"},{"issue":"11","key":"S179300572650016XBIB083","first-page":"16923","volume":"80","author":"Zulqarnain M.","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"S179300572650016XBIB084","first-page":"55","volume":"360","author":"Mathew S.","year":"2019","journal-title":"Fuzzy Sets and Systems"},{"key":"S179300572650016XBIB085","first-page":"1","volume-title":"Int. Con. on Fuzzy Systems","author":"Bouchon-Meunier B."},{"key":"S179300572650016XBIB086","doi-asserted-by":"publisher","DOI":"10.1080\/00207179108934205"},{"key":"S179300572650016XBIB087","first-page":"179","volume-title":"17th IFSA World Congress","author":"Sugeno M.","year":"1993"},{"key":"S179300572650016XBIB088","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btz868"},{"key":"S179300572650016XBIB089","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2017.09.001"},{"key":"S179300572650016XBIB090","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491524"},{"key":"S179300572650016XBIB091","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.001"},{"key":"S179300572650016XBIB092","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(93)90070-3"},{"key":"S179300572650016XBIB093","doi-asserted-by":"publisher","DOI":"10.1109\/3477.678632"},{"key":"S179300572650016XBIB094","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(02)00112-4"},{"key":"S179300572650016XBIB095","doi-asserted-by":"publisher","DOI":"10.1109\/91.755394"},{"key":"S179300572650016XBIB096","doi-asserted-by":"publisher","DOI":"10.1109\/3477.740162"},{"key":"S179300572650016XBIB097","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2022.0639"},{"key":"S179300572650016XBIB099","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1771-8_29"},{"issue":"3","key":"S179300572650016XBIB100","first-page":"149","volume":"4","author":"Khalid S.","year":"2016","journal-title":"Indonesian Journal of Electrical Engineering and Informatics"},{"issue":"3","key":"S179300572650016XBIB101","first-page":"229","volume":"10","author":"Kaur G.","year":"2021","journal-title":"International Journal of Engineering and Advanced Technology"},{"key":"S179300572650016XBIB102","doi-asserted-by":"publisher","DOI":"10.1016\/S0890-6955(02)00078-0"},{"key":"S179300572650016XBIB104","doi-asserted-by":"publisher","DOI":"10.1109\/91.842154"},{"key":"S179300572650016XBIB105","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313399"},{"key":"S179300572650016XBIB106","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ48607.2020.9177565"},{"key":"S179300572650016XBIB107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66824-6_9"},{"key":"S179300572650016XBIB108","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45493-4_19","volume-title":"Computational Intelligence, Theory and Applications, Fuzzy Days 2001","volume":"2206","author":"Szmidt E.","year":"2001"},{"key":"S179300572650016XBIB109","doi-asserted-by":"publisher","DOI":"10.1109\/91.928739"}],"container-title":["New Mathematics and Natural Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S179300572650016X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:12:06Z","timestamp":1762333926000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S179300572650016X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":106,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["10.1142\/S179300572650016X"],"URL":"https:\/\/doi.org\/10.1142\/s179300572650016x","relation":{},"ISSN":["1793-0057","1793-7027"],"issn-type":[{"value":"1793-0057","type":"print"},{"value":"1793-7027","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,7]]}}}