• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种使用直觉模糊图和图论支配的多层加密框架,用于安全通信网络。

A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks.

作者信息

Meenakshi A, Dhanushiya S, Mrsic Leo, Kalampakas Antonios, Samanta Sovan

机构信息

Department of Mathematics, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, Tamilnadu, India.

Department of Technical Sciences, Algebra Bernays University, Gradiscanska 24, 10000, Zagreb, Croatia.

出版信息

Sci Rep. 2025 Jul 1;15(1):20992. doi: 10.1038/s41598-025-01924-0.

DOI:10.1038/s41598-025-01924-0
PMID:40593822
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12217488/
Abstract

Secure communication is essential in today's rapidly evolving digital environment, and strong encryption methods are required to protect private data from unwanted access. The aim of this study is to strengthen the security and complexity of encrypted communications by adopting a new form of cryptographic encryption technique based on the principles of an intuitionistic fuzzy graph. Key graph-theoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. Domination number finds the key vertices of the network, while vertex strength categorization and fuzzy graph coloring provide multiple encryption layers, hence the encoded message is highly resistant to decryption unless a proper key is used. The chromatic number offers further security through various patterns of vertex coloring. The comparative analysis shows the proposed approach to be superior compared to RSA, AES, ECC, and Blowfish due to its increased security, computational efficiency, and resilience to attacks. This framework can be applied to the protection of banking PINs, military access codes, government identification numbers, cryptographic keys, and medical records, so it is an extremely versatile solution for protecting sensitive data. This multi-step approach to encryption through the proposed technique ensures safe transfer and efficient encoding as it establishes a complicated framework.

摘要

在当今快速发展的数字环境中,安全通信至关重要,需要强大的加密方法来保护私人数据不被非法访问。本研究的目的是通过采用一种基于直觉模糊图原理的新型加密技术,来增强加密通信的安全性和复杂性。关键的图论度量,如支配数、顶点分类(α-强、β-强和γ-强)、顶点序着色和色数,在此过程中发挥着重要作用。支配数用于找出网络的关键顶点,而顶点强度分类和模糊图着色提供了多个加密层,因此除非使用正确的密钥,否则编码后的消息极难被解密。色数通过各种顶点着色模式提供了进一步的安全性。对比分析表明,由于其更高的安全性、计算效率和抗攻击能力,所提出的方法优于RSA、AES、ECC和Blowfish。该框架可应用于保护银行密码、军事访问码、政府身份证号码、加密密钥和医疗记录,因此是一种保护敏感数据的极其通用的解决方案。通过所提出的技术进行的这种多步骤加密方法,通过建立一个复杂的框架,确保了安全传输和高效编码。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/05de50ccc4f3/41598_2025_1924_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/f1cd1dd30078/41598_2025_1924_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/919485b0b4a6/41598_2025_1924_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/c2d537487b6c/41598_2025_1924_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/73c71740633c/41598_2025_1924_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/45f0e2ec6913/41598_2025_1924_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/cc7924c0c3bc/41598_2025_1924_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/05de50ccc4f3/41598_2025_1924_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/f1cd1dd30078/41598_2025_1924_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/919485b0b4a6/41598_2025_1924_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/c2d537487b6c/41598_2025_1924_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/73c71740633c/41598_2025_1924_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/45f0e2ec6913/41598_2025_1924_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/cc7924c0c3bc/41598_2025_1924_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f6cd/12217488/05de50ccc4f3/41598_2025_1924_Fig7_HTML.jpg

相似文献

1
A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks.一种使用直觉模糊图和图论支配的多层加密框架,用于安全通信网络。
Sci Rep. 2025 Jul 1;15(1):20992. doi: 10.1038/s41598-025-01924-0.
2
Management of urinary stones by experts in stone disease (ESD 2025).结石病专家对尿路结石的管理(2025年结石病专家共识)
Arch Ital Urol Androl. 2025 Jun 30;97(2):14085. doi: 10.4081/aiua.2025.14085.
3
A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes.一种基于新型扩张加权递归神经网络(RNN)的智能合约,用于使用混合加密方案在以太坊区块链中安全共享大数据。
PeerJ Comput Sci. 2025 Jun 17;11:e2930. doi: 10.7717/peerj-cs.2930. eCollection 2025.
4
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach.通过基于分形的密码系统进行安全数据传输:一种努尔迭代方法。
Sci Rep. 2025 Jul 1;15(1):22206. doi: 10.1038/s41598-025-04700-2.
5
Assessing the comparative effects of interventions in COPD: a tutorial on network meta-analysis for clinicians.评估慢性阻塞性肺疾病干预措施的比较效果:面向临床医生的网状Meta分析教程
Respir Res. 2024 Dec 21;25(1):438. doi: 10.1186/s12931-024-03056-x.
6
Accreditation through the eyes of nurse managers: an infinite staircase or a phenomenon that evaporates like water.护士长眼中的认证:是无尽的阶梯还是如流水般消逝的现象。
J Health Organ Manag. 2025 Jun 30. doi: 10.1108/JHOM-01-2025-0029.
7
A rapid and systematic review of the clinical effectiveness and cost-effectiveness of paclitaxel, docetaxel, gemcitabine and vinorelbine in non-small-cell lung cancer.对紫杉醇、多西他赛、吉西他滨和长春瑞滨在非小细胞肺癌中的临床疗效和成本效益进行的快速系统评价。
Health Technol Assess. 2001;5(32):1-195. doi: 10.3310/hta5320.
8
Health professionals' experience of teamwork education in acute hospital settings: a systematic review of qualitative literature.医疗专业人员在急症医院环境中团队合作教育的经验:对定性文献的系统综述
JBI Database System Rev Implement Rep. 2016 Apr;14(4):96-137. doi: 10.11124/JBISRIR-2016-1843.
9
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications.基于复数理论的圆锥曲线加密与数字签名在网络安全应用中的研究
Sci Rep. 2025 Jul 1;15(1):21566. doi: 10.1038/s41598-025-00334-6.
10
Home treatment for mental health problems: a systematic review.心理健康问题的居家治疗:一项系统综述
Health Technol Assess. 2001;5(15):1-139. doi: 10.3310/hta5150.

本文引用的文献

1
A Deniable Encryption Method for Modulation-Based DNA Storage.基于调制的 DNA 存储的可否认加密方法。
Interdiscip Sci. 2024 Dec;16(4):872-881. doi: 10.1007/s12539-024-00648-5. Epub 2024 Aug 19.