Twin Odd-graceful Trees Towards Information Security

Hongyu Wang,Jin Xu,Bing Yao
DOI: https://doi.org/10.1016/j.procs.2017.03.050
2017-01-01
Procedia Computer Science
Abstract:We design cryptographical graphs for information security by the following principles: (1) be used conveniently in usually; (2) with strong security, that is, it is difficult to be broken; (3) there are enough graphs and labellings for making desired keys and locks. For answering the above problems, we prove the series cryptographical graphs have good properties, and show the guarantee for constructing large scale of cryptographical trees from smaller cryptographical trees. The methods used for constructing the desired cryptographical graphs can be transformed into efficient algorithms.
What problem does this paper attempt to address?