树的双奇边标记设计的一些密码模型

Hongyu Wang, Jin Xu, B. Yao
{"title":"树的双奇边标记设计的一些密码模型","authors":"Hongyu Wang, Jin Xu, B. Yao","doi":"10.1109/CIT.2017.41","DOIUrl":null,"url":null,"abstract":"Cryptography has been around for thousands of years. We propose a new cryptographic model, lock trees and key trees, and our idea differs from current graphical passwords in this paper. Graphs and their labellings are applied to establish the concepts of key-trees and lock-trees based on abundant of graphs having smaller orders and their corresponding double odd-edge labellings. We propose two methods, called Edge-Construction and Paste-Construction-w, to construct trees of larger orders by some smaller trees such that the new trees have some DOElabellings. Our results may be valued to information security and graph theory, at the end of this article we propose several conjectures.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Some Cryptography Models Designed by Double Odd-Edge Labelling of Trees\",\"authors\":\"Hongyu Wang, Jin Xu, B. Yao\",\"doi\":\"10.1109/CIT.2017.41\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography has been around for thousands of years. We propose a new cryptographic model, lock trees and key trees, and our idea differs from current graphical passwords in this paper. Graphs and their labellings are applied to establish the concepts of key-trees and lock-trees based on abundant of graphs having smaller orders and their corresponding double odd-edge labellings. We propose two methods, called Edge-Construction and Paste-Construction-w, to construct trees of larger orders by some smaller trees such that the new trees have some DOElabellings. Our results may be valued to information security and graph theory, at the end of this article we propose several conjectures.\",\"PeriodicalId\":378423,\"journal\":{\"name\":\"2017 IEEE International Conference on Computer and Information Technology (CIT)\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Conference on Computer and Information Technology (CIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIT.2017.41\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Computer and Information Technology (CIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIT.2017.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

密码学已经存在了几千年。本文提出了一种新的密码模型,即锁树和密钥树,与现有的图形密码不同。在大量的小阶图及其对应的双奇边标记的基础上,利用图及其标记建立了键树和锁树的概念。我们提出了两种方法,称为Edge-Construction和Paste-Construction-w,通过一些较小的树来构造大阶的树,使新树具有一些doelablabels。我们的研究结果可能对信息安全和图论有价值,在文章的最后,我们提出了几个猜想。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Some Cryptography Models Designed by Double Odd-Edge Labelling of Trees
Cryptography has been around for thousands of years. We propose a new cryptographic model, lock trees and key trees, and our idea differs from current graphical passwords in this paper. Graphs and their labellings are applied to establish the concepts of key-trees and lock-trees based on abundant of graphs having smaller orders and their corresponding double odd-edge labellings. We propose two methods, called Edge-Construction and Paste-Construction-w, to construct trees of larger orders by some smaller trees such that the new trees have some DOElabellings. Our results may be valued to information security and graph theory, at the end of this article we propose several conjectures.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信