{"title":"树的双奇边标记设计的一些密码模型","authors":"Hongyu Wang, Jin Xu, B. Yao","doi":"10.1109/CIT.2017.41","DOIUrl":null,"url":null,"abstract":"Cryptography has been around for thousands of years. We propose a new cryptographic model, lock trees and key trees, and our idea differs from current graphical passwords in this paper. Graphs and their labellings are applied to establish the concepts of key-trees and lock-trees based on abundant of graphs having smaller orders and their corresponding double odd-edge labellings. We propose two methods, called Edge-Construction and Paste-Construction-w, to construct trees of larger orders by some smaller trees such that the new trees have some DOElabellings. Our results may be valued to information security and graph theory, at the end of this article we propose several conjectures.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Some Cryptography Models Designed by Double Odd-Edge Labelling of Trees\",\"authors\":\"Hongyu Wang, Jin Xu, B. Yao\",\"doi\":\"10.1109/CIT.2017.41\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography has been around for thousands of years. We propose a new cryptographic model, lock trees and key trees, and our idea differs from current graphical passwords in this paper. Graphs and their labellings are applied to establish the concepts of key-trees and lock-trees based on abundant of graphs having smaller orders and their corresponding double odd-edge labellings. We propose two methods, called Edge-Construction and Paste-Construction-w, to construct trees of larger orders by some smaller trees such that the new trees have some DOElabellings. Our results may be valued to information security and graph theory, at the end of this article we propose several conjectures.\",\"PeriodicalId\":378423,\"journal\":{\"name\":\"2017 IEEE International Conference on Computer and Information Technology (CIT)\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Conference on Computer and Information Technology (CIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIT.2017.41\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Computer and Information Technology (CIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIT.2017.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Some Cryptography Models Designed by Double Odd-Edge Labelling of Trees
Cryptography has been around for thousands of years. We propose a new cryptographic model, lock trees and key trees, and our idea differs from current graphical passwords in this paper. Graphs and their labellings are applied to establish the concepts of key-trees and lock-trees based on abundant of graphs having smaller orders and their corresponding double odd-edge labellings. We propose two methods, called Edge-Construction and Paste-Construction-w, to construct trees of larger orders by some smaller trees such that the new trees have some DOElabellings. Our results may be valued to information security and graph theory, at the end of this article we propose several conjectures.