Author:
Zhang Xiaohui,Ye Chengfu,Zhang Shumin,Yao Bing
Abstract
With the fast development of networks, one has to focus on the security of information running in real networks. A technology that might be able to resist attacks equipped with AI techniques and quantum computers is the so-called topological graphic password of topological coding. In order to further study topological coding, we use the multiple constraints of graph colorings and labelings to propose 6C-labeling, 6C-complementary labeling, and its reciprocal-inverse labeling, since they can be applied to build up topological coding. We show some connections between 6C-labeling and other graph labelings/colorings and show graphs admitting twin-type 6C-labelings, as well as the construction of graphs admitting twin-type 6C-labelings.
Funder
National Natural Science Foundation of China under grants
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference15 articles.
1. Secure access system on the Q or IQ nxp platform using RSA AND DAS;Malutan;Acta Tech. Napoc.,2016
2. Survey of Lattice-based Cryptography;Yun;J. Cryptologic Res.,2014
3. On lattices, learning with errors, random linear codes, and cryptography
4. Lattice-based cryptography;Micciancio,2009
5. Twin Odd-graceful Trees Towards Information Security
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献