Next Article in Journal
Multimedia Applications Processing and Computation Resource Allocation in MEC-Assisted SIoT Systems with DVS
Previous Article in Journal
A Domain Adaptation-Based Method for Classification of Motor Imagery EEG
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Graph Colorings and Labelings Having Multiple Restrictive Conditions in Topological Coding

1
School of Computer, Qinghai Normal University, Xining 810001, China
2
School of Mathmatics and Statistics, Qinghai Normal University, Xining 810001, China
3
Academy of Plateau Science and Sustainability, People’s Government of Qinghai Province, Beijing Normal University, Beijing 100875, China
4
College of Mathematics and Statistics, Northwest Normal University, Lanzhou 730070, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2022, 10(9), 1592; https://doi.org/10.3390/math10091592
Submission received: 14 March 2022 / Revised: 22 April 2022 / Accepted: 26 April 2022 / Published: 7 May 2022
(This article belongs to the Topic Dynamical Systems: Theory and Applications)

Abstract

:
With the fast development of networks, one has to focus on the security of information running in real networks. A technology that might be able to resist attacks equipped with AI techniques and quantum computers is the so-called topological graphic password of topological coding. In order to further study topological coding, we use the multiple constraints of graph colorings and labelings to propose 6C-labeling, 6C-complementary labeling, and its reciprocal-inverse labeling, since they can be applied to build up topological coding. We show some connections between 6C-labeling and other graph labelings/colorings and show graphs admitting twin-type 6C-labelings, as well as the construction of graphs admitting twin-type 6C-labelings.

1. Introduction

In addition to RSA, DSA, and ECDSA [1], there are many important cryptographic systems that are considered to be resistant to classical and quantum computers, such as hash-based cryptography, code-based cryptography [2,3], lattice-based cryptography [4], and key cryptography. Another technology that might be able to resist attacks equipped with AI techniques and quantum computers is the so-called topological graphic passwordof topological coding. The foundation of topological cryptography is based on topological graphic passwords consisting of topological structures and mathematical restrictions [5], and topological graphic passwords belong to a combined branch of topological coding, graph theory, and cryptography. Since topological graphic passwords are related to many mathematical conjectures and NP-hard problems [6,7], topological graphic passwords are computationally unbreakable or have provable security, and the investigation of topological graphic passwords was introduced in [8,9,10].
Topological authentication is a new technique based on topological coding, a mixed branch of discrete mathematics, number theory, algebraic groups, graph theory, and so on. Wang et al. in [8] designed a topological code consisting of a topological structure and graph colorings and labeling. Graph labelings were first introduced in the mid-1960s. In the intervening years, over 200 graph labeling techniques have been studied in over 3000 papers, which provides some technical support for topology coding. As is known, topological coding is related to many mathematical conjectures or NP-hardproblems in graph theory [11], and operations research [7], so topological coding is computationally unbreakable or has provable security.

1.1. An Example of Topological Cryptosystems

To understand topological graphic passwords, we provide an example as follows: Four colored graphs H , H 1 , H 2 , H 3 shown in Figure 1 are topological graphic passwords in topological coding, and they are used as public keys and private keys. The first graph H is a public key, and H 1 , H 2 , H 3 are private keys, respectively. We obtain a matrix for vertices, edges, and vertices in order, which we call a topological matrix; a topological matrix of order 3 × q is a graph G with p vertices and q edges, that is
T c o d e = α ( x 1 ) α ( x 2 ) α ( x q ) α ( x 1 y 1 ) α ( x 2 y 2 ) α ( x q y q ) α ( y 1 ) α ( y 2 ) α ( y q ) 3 × q
α represents a function to obtain the color of vertices and edges. The topological matrix of G can derive ( 3 q ) ! number strings, which can be used as digital-based passwords, and preset coloring may be needed during authentication, called topological authentication. We obtain the topological matrix T c o d e ( H ) from Figure 1 and then convert it into a many-number-based string N i ( H ) , i [ 1 , n ] as follows:
T c o d e ( H ) = 0 0 2 2 2 6 6 6 8 8 10 21 17 19 15 13 9 5 11 7 3 1 21 17 21 17 15 15 11 17 15 11 11
N 1 ( H ) = 021210171721921215172131569156511611178715831110111
N 2 ( H ) = 002226668810137115913151917212117211715151117151111
N 3 ( H ) = 101000038871517116651115962131517152219211717002121
and so on. In the same way, the topological matrix and number-based string of the other three private keys can be obtained.
We use the multiple constraints of graph colorings and labelings to propose 6C-labeling, 6C-complementary labeling, and its reciprocal-inverse labeling, since they can be applied to building up topological coding. We show some connections between 6C-labeling and other graph labelings/colorings and show graphs admitting twin-type 6C-labelings, as well as the construction of graphs admitting twin-type 6C-labelings and constructing graph classes with new labels to provide a new technology for topological coding. See the examples in Figure 2 and Figure 3.

1.2. Definitions

The standard terminology and notation of graph theory can be found in [12,13]. The following terminology, notation, labelings, particular graphs, and definitions will be used in later discussions:
  • A symbol [ a , b ] stands for a consecutive set { a , a + 1 , , b } with integers a , b holding 0 a < b ; [ a , b ] o denotes an odd-set { a , a + 2 , , b } with odd integers a , b with respect to 1 a < b ; [ α , β ] e is an even-set { α , α + 2 , , β } with even integers α , β .
  • The cardinality of a set X is denoted as | X | .
  • The number deg G ( v ) = | N ( v ) | is called the degree of the vertex v, where N ( v ) is the set of neighbors of the vertex v. If deg G ( v ) = 1 . we call the vertex v a leaf.
  • G is a ( p , q ) -graph having p vertices and q edges.
Definition 1 
([13]). Let a connected ( p , q ) -graph G with 1 p 1 q admit a mapping α : V ( G ) { 0 , 1 , 2 , } . For each x y E ( G ) , the labelings are defined as α ( x y ) = | α ( x ) α ( y ) | , and we write the vertex color set by α ( V ( G ) ) = { α ( u ) : u V ( G ) } and the edge color set as α ( E ( G ) ) = { α ( x y ) : x y E ( G ) } . We have the following restrictions:
(1) 
| α ( V ( G ) ) | = p ;
(2) 
α ( V ( G ) ) [ 0 , q ] , min α ( V ( G ) ) = 0 ;
(3) 
α ( V ( G ) ) [ 0 , 2 q 1 ] , min α ( V ( G ) ) = 0 ;
(4) 
α ( E ( G ) ) = { α ( x y ) : x y E ( G ) } = [ 1 , q ] ;
(5) 
α ( E ( G ) ) = { α ( x y ) : x y E ( G ) } = [ 1 , 2 q 1 ] o ;
(6) 
α ( u v ) = α ( u ) + α ( v ) ( mod 2 q ) ;
(7) 
G is a bipartite graph with the bipartition ( X , Y ) such that max { α ( x ) : x X } < min { α ( y ) : y Y } ( α ( X ) < α ( Y ) for short).
We define: a graceful labeling α satisfying the restriction (1), (2), and (4); a set-ordered graceful labeling α satisfies (1), (2), (4), and (7), simultaneously; an odd-graceful labeling α satisfies the restriction (1), (3), and (5); a set-ordered odd-graceful labeling θ satisfies the restriction (1), (3), (5), and (7); a set-ordered odd-elegant labeling α satisfies the restriction (1), (3), (5), (6), and (7).
Definition 2 
([14]). A total labeling α : V ( G ) E ( G ) [ 1 , p + q ] for a bipartite ( p , q ) -graph G is a bijection holding:
(i) α ( u v ) + | α ( u ) α ( v ) | = k ;
(ii) Each edge u v corresponding to another edge x y holds α ( u v ) = | α ( x ) α ( y ) | (or α ( u v ) = ( p + q + 1 ) | α ( x ) α ( y ) | );
(iii) Let s ( u v ) = | α ( u ) α ( v ) | α ( u v ) for u v E ( G ) , then there exists a constant k such that each edge u v corresponds to another edge u v holding s ( u v ) + s ( u v ) = k (or ( p + q + 1 ) + s ( u v ) + s ( u v ) = k ) true;
(iv) min α ( V ( G ) ) > max α ( E ( G ) ) (or max α ( V ( G ) ) < min α ( E ( G ) ) , or α ( V ( G ) ) α ( E ( G ) ) , or α ( E ( G ) ) α ( V ( G ) ) , or α ( V ( G ) ) is an odd-set, and α ( E ( G ) ) is an even-set;
(v) (ve-corresponding) each edge u v corresponds to one vertex w such that α ( u v ) + α ( w ) = k , where k is a fixed constant, and each vertex z corresponds to one edge x y such that α ( z ) + α ( x y ) = k , except the singularity α ( x 0 ) = p + q + 1 2 ;
(vi) max α ( X ) < min α ( Y ) (or min α ( X ) > max α ( Y ) ) for the bipartition ( X , Y ) of V ( G ) .
Then, α is called a 6C-labeling of the bipartite ( p , q ) -graph G.
Definition 3.
Let ( p , q ) -tree G admit a 6C-labeling f and g be a 6C-labeling of ( p , q ) -tree H; if they hold, f ( V ( G ) ) \ X = g ( E ( H ) ) , f ( E ( G ) ) = g ( V ( H ) ) \ X and f ( V ( G ) ) g ( V ( H ) ) = X = { z 0 } with z 0 = p + q + 1 2 , then f and g are pairwise reciprocal-inverse. The graph 1 G , H obtained by the coinciding of the vertex x 0 of G having f ( x 0 ) = z 0 with the vertex w 0 of H having g ( w 0 ) = z 0 is called a 6C-complementary labeling.
Definition 4.
Let ( p , q ) -graph G admit a total labeling f : V ( G ) E ( G ) [ 1 , p + q ] and a ( q , p ) -graph H admit another total labeling g : V ( H ) E ( H ) [ 1 , p + q ] . If f ( E ( G ) ) = g ( V ( H ) ) \ X and f ( V ( G ) ) \ X = g ( E ( H ) ) for X = f ( V ( G ) ) g ( V ( H ) ) , then f and g are reciprocal-inverse (or reciprocal complementary) to each other, and H (or G) is an inverse labeling of G (or H).
Example 1.
In Figure 3, a tree T admits a 6C-labeling f T , and other trees G i admit a 6C-labeling f i for i = 1 , 3 , where:
(i) f T ( u v ) + | f T ( u ) f T ( v ) | = 13 for each edge u v E ( T ) ;
(ii) f 1 ( x y ) + | f 1 ( x ) f 1 ( y ) | = 13 for each edge x y E ( G 1 ) ;
(iii) f 3 ( x y ) + | f 3 ( x ) f 3 ( y ) | = 26 for each edge x y E ( G 3 ) ;
The graph T and G 2 are as defined, then f T and g are reciprocal-inverse (or reciprocal complementary) to each other, and T (or G 2 ) is an inverse labeling of G 2 (or T).
Moreover, each 6C-labeling f i is a reciprocal-inverse labeling of the 6C-labeling f T , that is f T ( V ( T ) ) \ { 13 } = f i ( E ( G i ) ) and f T ( E ( T ) ) = f i ( V ( G i ) ) \ { 13 } for i = [ 1 , 3 ] .
The 6C-labeling f T and its reciprocal-inverse labeling f i form a 6C-complimentary labeling f T , f i for i = [ 1 , 3 ] . Each vertex-coinciding tree H i = T , G i admits a 6C-complimentary labeling g i = f T , f i for i = [ 1 , 3 ] , where T , G 1 is a self-isomorphic ve-image, since T G 1 ;
(iv) g j ( u v ) + | g j ( u ) g j ( v ) | = 13 or g j ( u v ) | g j ( u ) g j ( v ) | = 13 with u v E ( H j ) and j = 1 , 2 ;
(v) g 3 ( x y ) + | g 3 ( x ) g 3 ( y ) | = 13 or g 3 ( x y ) + | g 3 ( x ) g 3 ( y ) | = 26 with x y E ( H 3 ) .
If a ( p , q ) -graph T has two subgraphs T 1 and T 2 such that V ( T 1 ) V ( T 2 ) = { w } and E ( T ) = E ( T 1 ) E ( T 2 ) , we denote T as T = T 1 T 2 , called a vertex-identified graph (vi-graph for short). Moreover, we call T a uniformly vertex-identified graph (uniformly vi- ( p , q ) -graph) if q = 2 | E ( T 1 ) | = 2 | E ( T 2 ) | .
Definition 5.
Let a uniformly vi- ( p , q ) -graph T = T 1 T 2 have a mapping f: V ( T ) [ 0 , q ] such that:
(i) f ( x ) f ( y ) for any pair of vertices x , y V ( T ) ;
(ii) f is an odd-graceful labeling (ogl) of T 1 ;
(iii) The edge label set f ( E ( T 1 ) ) = { f ( u v ) = | f ( u ) f ( v ) | : u v E ( T 1 ) } = [ 1 , q 1 ] o . Then, T is called a twin odd-graceful vi- ( p , q ) -graph, f a twin odd-graceful labeling (togl) of T, T 1 a source graph, and T 2 an associated graph of T 1 .

2. Connections between 6C-Labeling and Other Labelings

Lemma 1.
A ( p , q ) -tree T admits a set-ordered graceful labeling if and only if it admits a 6C-labeling.
Proof. 
Let X = { x i : i [ 1 , s ] } and Y = { y j : j [ 1 , t ] } be the bipartition of vertex set ( X , Y ) of a tree T, where | V ( T ) | = p = s + t and | E ( T ) | = s + t 1 .
First, notice that σ is a set-ordered graceful labeling of T, then σ ( x i ) = i 1 for i [ 1 , s ] and σ ( y j ) = s + j 1 for j [ 1 , t ] , and each edge x i y j E ( T ) has its label σ ( x i y j ) = σ ( y j ) σ ( x i ) = s + j i .
Another labeling Φ is defined for the tree T as: Φ ( w ) = p + σ ( w ) for w V ( T ) , and
Φ ( x i y j ) = p σ ( x i y j ) = p | σ ( x i ) σ ( y j ) |
for x i y j E ( T ) . The vertex set and edge set is
Φ ( V ( T ) ) = [ p , 2 p 1 ] , Φ ( E ( T ) ) = [ 1 , p 1 ] .
then we obtain:
(i) Φ ( x i y j ) + | Φ ( x i ) Φ ( y j ) | = p σ ( x i y j ) + σ ( x i y j ) = p .
(ii) Each edge x i y j E ( T ) with another edge x i y j E ( T ) corresponds and holds p σ ( x i y j ) = σ ( x i y j ) such that
Φ ( x i y j ) = p σ ( x i y j ) = σ ( x i y j ) = | σ ( x i ) σ ( y j ) | = | p + σ ( x i ) [ p + σ ( y j ) ] | = | Φ ( x i ) Φ ( y j ) | .
(iii) Let s ( x i y j ) = | Φ ( x i ) Φ ( y j ) | Φ ( x i y j ) for x i y j E ( T ) , so
s ( x i y j ) = | Φ ( x i ) Φ ( y j ) | Φ ( x i y j ) = | σ ( x i ) σ ( y j ) | p + σ ( x i y j ) = 2 σ ( x i y j ) p ,
then we obtain a set [ 2 p , p 2 ] e , where p is even, or a set [ 2 p , p 2 ] o , where p is odd. Therefore, each edge x i y j E ( T ) and another edge x i y j E ( T ) correspond, so s ( x i y j ) + s ( x i y j ) = 0 , except that edge e holds s ( e ) = 0 as p is even.
(iv) max Φ ( E ( T ) ) < min Φ ( V ( T ) ) from Equation (4).
(v) Φ ( u v ) + Φ ( w ) = 2 p for each edge u v corresponding to one vertex w, and Φ ( z ) + Φ ( x y ) = 2 p for each vertex z corresponding to one edge x y , except the singularity f ( w ) = p .
(vi) We obtain max f ( X ) < min f ( Y ) for the bipartition ( X , Y ) of V ( G ) .
Therefore, Φ admits a 6C-labeling.
For the converse, let ψ be a 6C-labeling of T. According to the property (iv) and ψ ( V ( T ) E ( T ) ) = [ 1 , 2 p 1 ] , we obtain the edge label and the vertices’ label set ψ ( E ( T ) ) = [ 1 , p 1 ] and ψ ( V ( T ) ) = [ p , 2 p 1 ] , respectively. A labeling ψ is defined as: ψ ( w ) = ψ ( w ) p for w V ( T ) , which gives ψ ( V ( T ) ) = [ 0 , p 1 ] ; ψ ( x i y j ) = p ψ ( x i y j ) for each edge x i y j E ( T ) , so ψ ( E ( T ) ) = [ 1 , p 1 ] . The property (i) enables us to compute
ψ ( x i y j ) = p ψ ( x i y j ) = p [ p | ψ ( x i ) ψ ( y j ) | ] = | [ ψ ( x i ) p ] [ ψ ( y j ) p ] | = | ψ ( x i ) ψ ( y j ) | ,
that is ψ is graceful. The graceful labeling ψ is set-ordered according to the property (vi). □
Theorem 1.
If two ( p , q ) -trees admit set-ordered graceful labelings, then they are a 6C- complementary labeling.
Proof. 
Let each tree T i of p vertices admit a set-ordered graceful labeling f i and ( X i , Y i ) be the bipartition of T i with i = 1 , 2 . Therefore, we have max f i ( X i ) < min f i ( Y i ) where X i = { x i , j : j [ 1 , s i ] } and Y i = { y i , j : j [ 1 , t i ] } for s i + t i = p with i = 1 , 2 . Then, we can label the vertices’ set as f i ( x i , j ) = j 1 for j [ 1 , s i ] , f i ( y i , j ) = s i + j 1 for j [ 1 , t i ] and label the edge set as f i ( x i , s y i , t ) = f i ( y i , t ) f i ( x i , s ) = s i + t s for each edge x i , s y i , t E ( T i ) , and f i ( E ( T i ) ) = [ 1 , p ] for i = 1 , 2 .
We define another labeling f 1 of T 1 as: f 1 ( w ) = p + f 1 ( w ) for w V ( T 1 ) and f 1 ( x 1 , s y 1 , t ) = p f ( x 1 , s y 1 , t ) for each edge x 1 , s y 1 , t E ( T 1 ) . Therefore, we can compute f 1 ( V ( T 1 ) ) = [ p , 2 p 1 ] and f 1 ( E ( T 1 ) ) = [ 1 , p 1 ] .
Next, we define another labeling f 2 of T 2 as: f 2 ( w ) = f 2 ( w ) + 1 for each vertex w V ( T 2 ) and f 2 ( x 2 , i y 2 , j ) = p + f 2 ( x 2 , i y 2 , j ) for each edge x 2 , i y 2 , j E ( T 2 ) . Thereby, we obtain f 2 ( V ( T 2 ) ) = [ 1 , p ] , f 2 ( E ( T 2 ) ) = [ p + 1 , 2 p 1 ] .
Notice that f 1 ( V ( T 1 ) ) \ { p } = f 2 ( E ( T 2 ) ) and f 1 ( E ( T 1 ) ) = f 2 ( V ( T 2 ) ) \ { p } . By Lemma 1, we have proven the theorem. □
Theorem 2.
If a ( p , q ) -tree T admits a 6C-labeling such that 1 T , T is a 6C-complementary matching, where the tree T is a 6C-labeling tree.
Proof. 
Let tree T admit a 6C-labeling f, another labeling g of T as g ( x ) = 2 ( p + q + 1 ) f ( x ) for each vertex x V ( T ) and g ( u v ) = ( p + q + 1 ) f ( u v ) for each edge u v E ( T ) . We obtain E ( T ) = { u i v i : i [ 1 , q ] } with g ( u j v j ) < g ( u j + 1 v j + 1 ) true with j [ 1 , q 1 ] . Next, a labeling π is defined for a copy T of T in this way: π ( x ) = g ( x ) for x V ( T ) = V ( T ) , and π ( u i v i ) = 2 p + q + 1 g ( u i v i ) for u i v i E ( T ) = E ( T ) . Notice that
π ( u i v i ) = 2 p + q + 1 g ( u i v i ) = 2 p + q + 1 [ ( p + q + 1 ) f ( u i v i ) ] = f ( u i v i ) + p
for u i v i E ( T ) = E ( T ) . We claim that π is a 6C-labeling of T as well, which means that the proof of Theorem 2 is complete. □
Corollary 1.
Let two trees T and H with p vertices admit set-ordered graceful labelings. Then, G = 1 T , H admits a 6C-labeling τ with τ ( x y ) + | τ ( x ) τ ( y ) | = p for each edge x y E ( T ) , and τ ( u v ) | τ ( u ) τ ( v ) | = p for each edge x y E ( H ) .
Corollary 2.
Let a tree T admit a set-ordered odd-graceful labeling, then there exists H admitting a twin odd-graceful labeling, where H is a self-corresponding H = T T graph.
Proof. 
According to the supposition of the corollary, let a tree T have its own vertex bipartition ( X , Y ) with X = { x 1 , x 2 , , x s } and Y = { y 1 , y 2 , , y t } with | V ( T ) | = p = s + t and | E ( T ) | = s + t 1 = p 1 . For a set-ordered graceful labeling f of T, we obtain ϕ ( x i ) = i 1 for i [ 1 , s ] and ϕ ( y j ) = s + j 1 for j [ 1 , t ] , and ϕ ( x i y j ) = ϕ ( y j ) ϕ ( x i ) = s + j i for each edge x i y j E ( T ) :
(1) The labeling ϕ is defined for a copy T of T with ( X , Y ) = ( X , Y ) as: ϕ ( x i ) = 2 f ( x i ) = 2 ( i 1 ) for i [ 1 , s ] and ϕ ( y j ) = 2 f ( y j ) 1 = 2 ( s + j ) 3 for j [ 1 , t ] ; immediately,
ϕ ( x i y j ) = | ϕ ( y j ) ϕ ( x i ) | = | 2 ( s + j ) 3 2 ( i 1 ) | = 2 s + 2 ( j i ) 1 = 2 ( s + j i ) 1 = 2 ϕ ( x i y j ) 1 .
Therefore, ϕ 1 is an ogl of T , since ϕ 1 ( X ) = [ 0 , 2 ( s 1 ) ] e is an even-set, ϕ 1 ( Y ) = [ 2 s 1 , 2 p 3 ] o is an odd-set, and ϕ 1 ( E ( T ) ) = [ 1 , 2 p 3 ] o is an odd-set as well. Next, we another another graph T obtained by copying T with ( X , Y ) = ( X , Y ) and make a complementary labeling ϕ 2 of the ogl ϕ 1 by setting ϕ 2 ( w ) = ϕ 1 + 1 for w V ( T ) ; clearly, ϕ 2 ( E ( T ) ) = ϕ 1 ( E ( T ) ) . Moreover, ϕ 2 ( X ) = [ 1 , 2 s 1 ] o , ϕ 2 ( Y ) = [ 2 s , 2 p 2 ] e ; we can see ϕ 2 ( V ( T ) ) ϕ 1 ( V ( T ) ) = { 2 s 1 } and ϕ 2 ( V ( T ) ) ϕ 1 ( V ( T ) ) = [ 0 , 2 p 2 ] . Therefore, T is the complementary of T . Therefore, T T admits a togl.
The proof is finished for the corollary. □
Theorem 3.
Let T 1 , T 2 , , T m 1 , T m be disjoint trees, and each T i admit a set-ordered graceful labeling for i [ 1 , m 1 ] ; T m is a graceful tree. Then, there are vertices u i V ( T i ) ( i [ 1 , m ] ) such that joining u j V ( T j ) and u j + 1 V ( T j + 1 ) for j [ 1 , m 1 ] produces a new tree T admitting a 6C-labeling.
Proof. 
For each i [ 1 , m ] , each tree T i has n i vertices and bipartition ( X i , Y i ) , where X i = { x i , r : r [ 1 , s i ] } and Y i = { y i , j : j [ 1 , t i ] } with s i + t i = | V ( T i ) | = n i .
By the assumption of the theorem, each tree T i for i [ 1 , m 1 ] has a set-ordered graceful coloring f i holding f i ( X i ) < f i ( Y i ) , f i ( x i , r ) = r 1 , f i ( y i , j ) = s i 1 + j , as well as f i ( x i , r y i , j ) = | f i ( x i , r ) f i ( y i , j ) | = s i + j r , which shows that f i ( V ( T i ) ) = [ 0 , n i 1 ] and f i ( E ( T i ) ) = [ 1 , n i 1 ] . T m has a graceful labeling f m defined as f m ( x i ) = i 1 for x i V ( T m ) and i [ 1 , n m ] such that f m ( V ( T m ) ) = [ 0 , n m 1 ] and f m ( E ( T m ) ) = [ 1 , n m 1 ] .
We join the vertex y l , 1 V ( T l ) with the vertex x l + 1 , 1 V ( T l + 1 ) by an edge, l [ 1 , m 2 ] ; we join the vertex y m 1 , 1 V ( T m 1 ) with the vertex x 1 V ( T m ) by an edge, so the resulting tree is denoted as T. Next, we define a labeling g of T in the following steps. Let A ( a , b ) = l = a b n l and B ( a , b ) = l = a b s l , A ( 1 , m ) = l = 1 m n l = p .
We define another labeling g as follows:
Step 1. For each k [ 1 , m 1 ] , the vertices’ color of x i , r as g ( x i , r ) = f i ( x r , i ) + B ( 1 , i 1 ) + A ( 1 , m ) , i [ 1 , s i ] , where x i , r X i V ( T i ) .
Step 2. The vertices’ color of x i as g ( x i ) = f m ( x i ) + B ( 1 , m 1 ) + A ( 1 , m ) , x i V ( T m ) , where i [ 1 , n m ] .
Step 3. The vertices’ color of y i , j as g ( y i , j ) = f i ( y i , j ) + B ( 1 , i 1 ) + A ( i + 1 , m ) + A ( 1 , m ) for each i [ 1 , m 1 ] , j [ 1 , t i ] , where y i , j Y i V ( T i ) .
Step 4. The edges x i , r y i , j are colored as g ( x i , r y i , j ) = A ( 1 , m ) | g ( x i , r ) g ( y i , j ) | for i [ 1 , m 1 ] , g ( x i x j ) = A ( 1 , m ) | g ( x i ) h ( x j ) | , i , j [ 1 , n m ] .
Step 5. The edges x l + 1 , 1 y l , 1 are colored as h ( x l + 1 , 1 y l , 1 ) = A ( 1 , m ) { h ( y l , 1 ) h ( x l + 1 , 1 ) } = A [ l + 1 , m ] for l [ 1 , m 2 ] , h ( x 1 y m 1 , 1 ) = A ( 1 , m ) { h ( y m 1 , 1 ) h ( x 1 ) } = n m .
We can verify the vertices’ and edges’ set as follows:
h ( x i , r ) [ A ( 1 , m ) , B ( 1 , m 1 ) + A ( 1 , m ) 1 ] , i [ 1 , s i ] , i [ 1 , m 1 ] ;
h ( x i ) [ B ( 1 , m 1 ) + A ( 1 , m ) , B ( 1 , m 1 ) + A ( 1 , m ) + n m 1 ] , i [ 1 , n m ] ;
h ( y i , j ) [ B ( 1 , m 1 ) + A ( 1 , m ) + n m , 2 A ( 1 , m ) 1 ] , j [ 1 , t i ] , i [ 1 , m 1 ] ;
g ( x i , r y i , j ) = A ( 1 , m ) | g ( x i , r ) g ( y i , j ) | = A ( 1 , m ) { f i ( y i , j ) f i ( x i , r ) + A ( i + 1 , m ) } = A ( 1 , m ) f i ( x i , r y i , j ) A ( i + 1 , m ) [ 1 + A ( i + 1 , m ) , A ( i , m ) 1 ] , i [ 1 , m 1 ] ;
h ( x i x j ) [ 1 , n m 1 ] for x i x j E ( T m ) .
Let us continue to validate the restriction of labeling g as follows:
(i) Each edge x i , r y i , j E ( T ) :
g ( x i , r y i , j ) + | g ( x i , r ) g ( y i , j ) | = p | f ( x i , r y i , j ) f ( x i , r y i , j ) | = A ( 1 , m )
holds true.
(ii) Each edge x i , r y i , j E ( T ) corresponding to another edge x i , r y i , j E ( T ) holds p g ( x i , r y i , j ) = g ( x i , r y i , j ) such that
f ( x i , r y i , j ) = p g ( x i y j ) = g ( x i , r y i , j ) = | g ( x i , r ) g ( y i , j ) | = | p + g ( x i , r ) [ p + g ( y i , j ) ] | = | f ( x i , r ) f ( y i , j ) | .
(iii) Let s ( x i y j ) = | f ( x i ) f ( y j ) | f ( x i y j ) for x i y j E ( T ) , so
s ( x i y j ) = | f ( x i ) f ( y j ) | f ( x i y j ) = | g ( x i ) g ( y j ) | p + g ( x i y j ) = 2 g ( x i y j ) p ,
which distributes a set [ 2 p , p 2 ] e if p is even or a set [ 2 p , p 2 ] o if p is odd. Thereby, each edge x i y j E ( T ) corresponds to another edge x i y j E ( T ) such that s ( x i y j ) + s ( x i y j ) = 0 , except that edge e holds s ( e ) = 0 as p is even.
The proof of (iv)–(vi) is the same as Lemma 1.
Hence, we claim that the labeling f admits really a 6C-labeling defined in Definition 2.
Thereby, we claim that g ( V ( T ) ) = [ A ( 1 , m ) , 2 A ( 1 , m ) 1 ] and g ( E ( T ) ) = [ 1 , A ( 1 , m ) 1 ] , which shows that g is a 6C-labeling of T. See an example in Figure 4 and Figure 5. □

3. Conclusions

This paper studied the 6C-labeling having multiple restrictive conditions and showed the graphic codes. We showed some connections between 6C-labeling and other graph labelings/colorings and showed graphs admitting twin-type 6C-labelings, as well as the construction of graphs admitting twin-type 6C-labelings and constructing graph classes with new labels to provide a new technology for topology coding. The result of Theorem 3 can be used to construct some graphic lattice [15]. If artificial intelligence technology and quantum computer attacks use labels and coloring-generated passwords, the decryption process will involve the determination of the graph isomorphism and some coloring conjectures, so it is not easy to crack. In addition, according to the method proposed in this paper, the topological coding has a variety of graph structures, topological matrices, and number-based strings of topological coding. We can use labeled graphs to design topology coding, so as to ensure information security. We can see that this is easy to obtain from the graph to the matrix and then to the string, and the reverse is difficult. Multiple restrictions also ensure the security of encryption.
Topological graphic passwords are based on the open structural cryptographic platform, that is this platform allows people to make themselves pan-topological graphic passwords by their remembered and favorite knowledge kept firmly in mind. We believe: “If a project has practical and effective applications and is supported by mathematics, it can go farther and farther. Practical application makes it live longer, and mathematics makes it stronger and faster. This project gives people feedback on material enjoyment and returns new objects and problems to mathematics”.

Author Contributions

Data Funding acquisition, C.Y. and S.Z.; Writing—original draft, X.Z. and B.Y.; Writing—review & editing, X.Z. and B.Y.; Supervision, C.Y.and S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China under Grant No. 61363060 and No. 61662066 and the Science Found of Qinghai Province Grant No. 2021-ZJ-703 and NSFC No. 11661068.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Malutan, R.; Pop, M.; Cislariu, M.; Borda, M. Secure access system on the Q or IQ nxp platform using RSA AND DAS. Acta Tech. Napoc. 2016, 57, 42–45. [Google Scholar]
  2. Yun, W.X.; Jie, L.M. Survey of Lattice-based Cryptography. J. Cryptologic Res. 2014, 1, 13–27. [Google Scholar]
  3. Regev, O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. J. ACM 2009, 56, 1–40. [Google Scholar] [CrossRef]
  4. Micciancio, D.; Regev, O. Lattice-based cryptography. In Post-Quanturn Cryptography; Bernstein, D.J., Buchmann, J., Dahmen, E., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 147–191. [Google Scholar]
  5. Wang, H.; Xu, J.; Yao, B. Twin Odd-Graceful Trees Towards Information Security. Procedia Comput. Sci. 2017, 107, 15–20. [Google Scholar] [CrossRef]
  6. Anuj, K.; Amit, K.V. Application of graph labeling in crystallography. Mater. Today Proc. 2020, in press. [Google Scholar] [CrossRef]
  7. Ascher, E. Aloysio Janner Algebraic aspects of crystallography. Commun. Math. Phys. 1968, 11, 138–167. [Google Scholar] [CrossRef]
  8. Tian, Y.; Li, L.; Peng, H.; Yang, Y. Achieving flatness: Graph labeling can generate graphical honeywords. Comput. Secur. 2021, 104, 102212. [Google Scholar] [CrossRef]
  9. Mageshwaran, K.; Kalaimurugan, G.; Hammachukiattikul, B.; Govindan, V.; Cangul, I.N. On-Labeling Index of Inverse Graphs Associated with Finite Cyclic Groups. J. Math. 2021, 2021, 5583433. [Google Scholar] [CrossRef]
  10. Prasanna, N.L.; Sravanthi, K.; Sudhakar, N. Applications of Graph Labeling in Communication Networks. Orient. J. Comput. Sci. Technol. 2014, 7, 139–145. [Google Scholar]
  11. Balakrishnan, R.; Ranganathan, K. A Textbook of Graph Theory; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  12. Bondy, J.A.; Murty, U.S.R. Graph Theory; Springer: London, UK, 2008. [Google Scholar]
  13. Gallian, J.A. A Dynamic Survey of Graph Labeling. The Electronic Journal of Combinatorics. 2021. DS61. Available online: https://www.combinatorics.org/ds6 (accessed on 13 March 2022).
  14. Yao, B.; Sun, H.; Zhang, X.; Mu, Y.; Sun, Y.; Wang, H.; Su, J.; Zhang, M.; Yang, S.; Yang, C. Topological Graphic Passwords And Their Matchings Towards Cryptography. arXiv 2018, arXiv:1808.03324v1. [Google Scholar]
  15. Su, J.; Sun, H.; Yao, B. Odd-Graceful Total Colorings for Constructing Graphic Lattice. Mathematics 2022, 10, 109. [Google Scholar] [CrossRef]
Figure 1. A set-ordered odd-graceful topological public key H and its own topological private keys H 1 , H 2 , H 3 .
Figure 1. A set-ordered odd-graceful topological public key H and its own topological private keys H 1 , H 2 , H 3 .
Mathematics 10 01592 g001
Figure 2. Examples The graphs T , G 1 , G 2 , G 3 for illustrating the 6C-labeling defined in Definition 2, the graphs T H 1 , H 2 , H 3 reciprocal-inverse labeling defined in Definition 3, and the 6C-complimentary matching defined in Definition 4.
Figure 2. Examples The graphs T , G 1 , G 2 , G 3 for illustrating the 6C-labeling defined in Definition 2, the graphs T H 1 , H 2 , H 3 reciprocal-inverse labeling defined in Definition 3, and the 6C-complimentary matching defined in Definition 4.
Mathematics 10 01592 g002
Figure 3. Examples for illustrating Corollary 2. (ad) are T, T , T , and T T , respectively.
Figure 3. Examples for illustrating Corollary 2. (ad) are T, T , T , and T T , respectively.
Mathematics 10 01592 g003
Figure 4. Four graphs T i with i [ 1 , 4 ] for understanding the proof of Theorem 3.
Figure 4. Four graphs T i with i [ 1 , 4 ] for understanding the proof of Theorem 3.
Mathematics 10 01592 g004
Figure 5. An example for illustrating the proof of Theorem 3.
Figure 5. An example for illustrating the proof of Theorem 3.
Mathematics 10 01592 g005
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, X.; Ye, C.; Zhang, S.; Yao, B. Graph Colorings and Labelings Having Multiple Restrictive Conditions in Topological Coding. Mathematics 2022, 10, 1592. https://doi.org/10.3390/math10091592

AMA Style

Zhang X, Ye C, Zhang S, Yao B. Graph Colorings and Labelings Having Multiple Restrictive Conditions in Topological Coding. Mathematics. 2022; 10(9):1592. https://doi.org/10.3390/math10091592

Chicago/Turabian Style

Zhang, Xiaohui, Chengfu Ye, Shumin Zhang, and Bing Yao. 2022. "Graph Colorings and Labelings Having Multiple Restrictive Conditions in Topological Coding" Mathematics 10, no. 9: 1592. https://doi.org/10.3390/math10091592

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop