Topological Authentication Technique In Topologically Asymmetric Cryptosystem

02/08/2022
by   Bing Yao, et al.
0

Making topological authentication from theory to practical application is an important and challenging task. More and more researchers pay attention on coming quantum computation, privacy data protection, lattices and cryptography. Research show the advantages of topological authentications through graph operations, various matrices, graph colorings and graph labelings are: related with two or more different mathematical areas, be not pictures, there are huge number of colorings and labelings, rooted on modern mathematics, diversity of asymmetric ciphers, simplicity and convenience, easily created, irreversibility, computational security, provable security, and so on. Topological authentications based on various graph homomorphisms, degree-sequence homomorphisms, graph-set homomorphisms. Randomly topological coding and topological authentications are based on Hanzi authentication, randomly adding-edge-removing operation, randomly leaf-adding algorithms, graph random increasing techniques, operation graphic lattice and dynamic networked models and their spanning trees and maximum leaf spanning trees. Realization of topological authentication is an important topic, we study: number-based strings generated from colored graphs, particular graphs (complete graphs, trees, planar graphs), some methods of generating public-keys. some techniques of topologically asymmetric cryptosystem are: W-type matching labelings, dual-type labelings, reciprocal-type labelings, topological homomorphisms, indexed colorings, graphic lattices, degree-sequence lattices, every-zero Cds-matrix groups of degree-sequences, every-zero graphic groups, graphic lattices having coloring closure property, self-similar networked lattices.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/29/2021

Recent Colorings And Labelings In Topological Coding

Topological Coding consists of two different kinds of mathematics: topol...
research
09/13/2018

Text-based Passwords Generated From Topological Graphic Passwords

Topological graphic passwords (Topsnut-gpws) are one of graph-type passw...
research
07/26/2018

Topological Graphic Passwords And Their Matchings Towards Cryptography

Graphical passwords (GPWs) are convenient for mobile equipments with tou...
research
05/05/2022

New Techniques Based On Odd-Edge Total Colorings In Topological Cryptosystem

For building up twin-graphic lattices towards topological cryptograph, w...
research
05/08/2020

Graphic Lattices and Matrix Lattices Of Topological Coding

Lattice-based Cryptography is considered to have the characteristics of ...
research
01/31/2022

Graph Set-colorings And Hypergraphs In Topological Coding

In order to make more complex number-based strings from topological codi...
research
07/07/2022

Parameterized Colorings And Labellings Of Graphs In Topological Coding

The coming quantum computation is forcing us to reexamine the cryptosyst...

Please sign up or login with your details

Forgot password? Click here to reset