Random Generation Topology Coding Technique in Asymmetric Topology Encryption

被引:0
作者
Su, Jing [1 ]
Yao, Bing [2 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, 58 Yanta Middle Rd, Xian 710054, Peoples R China
[2] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
topological coding; graph labeling; graph coloring; set-ordered odd-graceful labeling;
D O I
10.3390/math12172768
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers on these mathematical problems. The security of this encryption algorithm depends on two types of NP-complete problems: subgraph isomorphism and graph coloring. Topological coding technology refers to the technology of generating key strings or topology signature strings through topological coding graphs. We take odd-graceful labeling and set-ordered odd-graceful labeling as limiting functions, and propose two kinds of topological coding generation technique, which we call the random leaf-adding operation and randomly adding edge-removing operation. Through these two techniques, graphs of the same scale and larger scales can be generated with the same type of labeling so as to derive more number strings, expand the key space, and analyze the topology and property of the generated graphs.
引用
收藏
页数:10
相关论文
共 15 条
  • [1] Bondy J.A., 2008, Graph Theory
  • [2] Gallian J.A., 2020, Electron. J. Comb, V6, P4
  • [3] Grover Lov K., 1996, SIAM J. Comput.
  • [4] Mu YR, 2018, PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), P1106, DOI 10.1109/ITOEC.2018.8740457
  • [5] Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    Shor, PW
    [J]. SIAM REVIEW, 1999, 41 (02) : 303 - 332
  • [6] On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions
    Suhail, Sabah
    Hussain, Rasheed
    Khan, Abid
    Hong, Choong Seon
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) : 1 - 17
  • [7] Achieving flatness: Graph labeling can generate graphical honeywords
    Tian, Yanzhao
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. COMPUTERS & SECURITY, 2021, 104
  • [8] A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs
    Wang, Hongyu
    Xu, Jin
    Ma, Mingyuan
    Zhang, Hongyan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] Exploring New Cryptographical Construction Of Complex Network Data
    Wang, Hongyu
    Xu, Jin
    Yao, Bing
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 155 - 160
  • [10] Yao B., 2022, arXiv