{"title":"On Multiple Topological Authentications In The Encryption of Tree-like Networks","authors":"Hongyu Wang, B. Yao","doi":"10.1109/ITNEC48623.2020.9084707","DOIUrl":null,"url":null,"abstract":"Blockchain uses a large number of cryptographic algorithms to ensure security. We will construct multiple topological authentications by topological graphic passwords and Topsnut-matchings, since matchings' phenomenon appear in almost branches of mathematics. We present two new techniques for our works, and design three construction algorithms for building up our multiple topological authentications. Our algorithms are based on graph labellings and graph operations. We give detail examples for illustrating each construction algorithm, and distribute a matching of two multiple topological authentication sets for producing text-based passwords with million or billion bytes in order to use them in quantum computer age.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC48623.2020.9084707","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Blockchain uses a large number of cryptographic algorithms to ensure security. We will construct multiple topological authentications by topological graphic passwords and Topsnut-matchings, since matchings' phenomenon appear in almost branches of mathematics. We present two new techniques for our works, and design three construction algorithms for building up our multiple topological authentications. Our algorithms are based on graph labellings and graph operations. We give detail examples for illustrating each construction algorithm, and distribute a matching of two multiple topological authentication sets for producing text-based passwords with million or billion bytes in order to use them in quantum computer age.