LWRNPIP: Design of a light weight restrictive non-fungible token based on practically unclonable functions via image signature patterns
Keywords:
NFT, PuF, Cryptography, Dual, DelayAbstract
Non-fungible tokens (NFT) have recently become a popular method of tokenizing \& commercializing personal artifacts. Designing NFTs requires selecting different blockchain-based consensus models, encryption techniques, and distribution mechanisms. Existing NFT design techniques use computationally complex encryption models like Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), etc., which restricts their general-purpose usability, limiting their scalability for real-time use cases. To overcome this drawback, while maintaining high security, this text proposes a design of a lightweight, restrictive non-fungible token based on Practically Unclonable Functions (PuFs) via image signature patterns. The proposed model initially collects context-specific information sets about the entity that needs tokenization and uses this information to generate restrictive hash sets. These hash sets are passed through a customized PuF model, which generates image-like hash signatures. The generated hash signatures are iteratively embedded into unique images, which are fused via a dual visual encryption-decryption process. The encryption process generates 2 image sets, for distribution among the buyer \& seller, while the decryption process aggregates these image sets to form a single file token. These tokens are passed through another encryption-decryption-based validation process while reselling operations. Due to use of PuFs and restrictive hash sets, the proposed model is capable of deployment for low-power IoT applications and can be scaled for general-purpose scenarios. The proposed model was tested on different NFT use cases, and showcased 10.4% lower processing delay, 8.3% lower energy consumption during selling, and 4.9% lower energy consumption during reselling processes. The tokens generated via this model were also tested under different attack types, and similar efficiency levels were observed under real-time scenarios.
Published
How to Cite
Issue
Section
Copyright (c) 2025 Mahesh Kumar Singh, Pushpa Choudhary, Arun Kumar Singh, Pushpendra Singh

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Similar Articles
- S. A. Osikoya, E. O. Adeyefa, Jensen-based New Cryptographic Scheme , Journal of the Nigerian Society of Physical Sciences: Volume 4, Issue 1, February 2022
- Edikan E. Akpanibah, Udeme O. Ini, An Investor’s Investment Plan with Stochastic Interest Rate under the CEV Model and the Ornstein-Uhlenbeck Process , Journal of the Nigerian Society of Physical Sciences: Volume 3, Issue 3, August 2021
- Bright O. Osu, K. N. C. Njoku, B. I. Oruh, On the Investment Strategy, Effect of Inflation and Impact of Hedging on Pension Wealth during Accumulation and Distribution Phases , Journal of the Nigerian Society of Physical Sciences: Volume 2, Issue 3, August 2020
- C. A. Oyelami, W. Akande, T. O. Kolawole, A Preliminary Geotechnical Assessment of Residual Tropical Soils around Osogbo Metropolis as Materials for Road Subgrade , Journal of the Nigerian Society of Physical Sciences: Volume 4, Issue 2, May 2022
- E. A. Nwaibeh, M. K. M. Ali, M. O. Adewole, The dynamics of hybrid-immune and immunodeficient susceptible individuals and the three stages of COVID-19 vaccination , Journal of the Nigerian Society of Physical Sciences: Volume 6, Issue 3, August 2024
- E. I. Akinola, R. A. Oderinu, S. Alao, O. E. Opaleye, An Integral Transform-Weighted Residual Method for Solving Second Order Linear Boundary Value Differential Equations with Semi-Infinite Domain , Journal of the Nigerian Society of Physical Sciences: Volume 4, Issue 4, November 2022
You may also start an advanced similarity search for this article.

