<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Public key cryptography based on the clique and learning parity with noise problems for post-quantum cryptography</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Péter</forename><surname>Hudoba</surname></persName>
							<email>peter.hudoba@inf.elte.hu</email>
							<affiliation key="aff0">
								<orgName type="institution">ELTE Eötvös Loránd University Faculty of Informatics Budapest</orgName>
								<address>
									<country key="HU">Hungary</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Public key cryptography based on the clique and learning parity with noise problems for post-quantum cryptography</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">AF35ADF947F3207A6DF4A1FFB807308E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T00:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper we propose a new method for public key encryption. The scheme's security is based on the well-known clique and learning parity with noise problems.</p><p>The relevance of this approach is justified by its post-quantum nature: unlike RSA and other cryptosystems based on the hardness of factorization or discrete logarithm which could be broken by a suitable large quantum device, no known quantum attacks are known against our candidate system. We examine the time complexity of our scheme and compare it to RSA.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>As Berstein <ref type="bibr" target="#b4">[Ber09]</ref> wrote: "Imagine that it's fifteen years from now and someone announces the successful construction of a large quantum computer. The New York Times runs a front-page article reporting that all of the public-key algorithms used to protect the Internet have been broken. Users panic."</p><p>In this apocalyptic "post-quantum" world, we suppose that we already have a big enough quantum machine, hence we can solve the factorization and the discrete logarithm problems in polynomial time. But what does it mean exactly to cryptography?</p><p>It is an accepted practice to use hard problems (that presumably cannot be solved in polynomial time) as assumptions and use them to postulate the hardness of a public key encryption scheme. The current widely used methods ("classic methods") like RSA, DSA or ECDSA are based on problems that can be solved by Shor's quantum algorithm <ref type="bibr" target="#b32">[Sho94]</ref> in polynomial time (Shor's algorithm needs a bigger quantum machine than what we can build today).</p><p>What will we be able to do if that world comes? The classic schemes will be broken, but we can use other types of methods which remain secure against quantum machines. Several such schemes have been proposed but most such schemes are not considered efficient enough for practical purposes, so we have to give novel algorithms and/or optimize the existing ones to reach an acceptable scheme.</p><p>In this paper we follow this idea and approach for public key encryption to extend the possibilities for constructions. Our aim is to open a new way, but admittedly this method is still not efficient enough for real life internet usage.</p><p>We note that post-quantum cryptography is not to be confused with quantum cryptography. In post-quantum cryptography the schemes use only classic computers but are assumed to be secure against algorithms run on a quantum machine; whereas in quantum cryptography we use quantum techniques, i.e. physical quantum phenomena for encryption.</p><p>In our approach we combine a well-studied lattice problem with a problem from graph theory to obtain a new scheme.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Overview</head><p>In the remaining part of this section we briefly describe the hard problems used.</p><p>In Section 2 we describe prior work which led to the current state of the art and define a building block (encryption method) from an already existing public key encryption scheme, finally discuss the correctness and validity.</p><p>Section 3 gives the proposal of the new key generation method for the given encryption method and we discuss the security of the key.</p><p>Finally in Section 4 we discuss the key security of the new scheme.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">Learning parity with noise (LPN)</head><p>A popular area in post-quantum cryptography is lattice-based cryptography, introduced by Ajtai in 1996 <ref type="bibr" target="#b1">[Ajt96]</ref>.</p><p>Here, lattices are used for building an encryption scheme. A widely studied lattice-based problem is the closest vector problem (CVP) where we have a vector (not necessary on the lattice) and a lattice, and we have to find the closest lattice point and determine that with the given basis. In small dimension it is an easy problem, but in higher dimensions it gets hard -NP-hardness results exist proving that random instances of the problem are basically as hard as the worst case instances. Outside theoretical computer science, the linear code decoding problem is closely related to the CVP, if the lattice is the codeword space and the given vector is the transmitted message with some noise. This problem is also considered hard.</p><p>A further closely related problem is the learning with errors (LWE) lattice problem introduced in <ref type="bibr" target="#b27">[Reg09]</ref>. In the last few years it has been shown to have nice post-quantum cryptographic uses (summarized by Regev in 2010 <ref type="bibr" target="#b28">[Reg10]</ref>) one of which is the following inversion problems which is hard under certain assumptions: Given M ∈ F m×n q and s ∈ F n q , a secret value, we have to determine s from M s + e where e is some small error.</p><p>Two of the most promising candidates today for post-quantum cryptography are lattice-based schemes: NTRU <ref type="bibr" target="#b15">[HPS98]</ref> and Ring-LWE [LPR10,DXL12,GLP12,Pei14].</p><p>In the special case where q = 2 we use only binary values in LWE.</p><p>The learning parity with noise problem is a well-studied problem widely considered appropriate for constructing cryptography schemes. It has the big advantage that the calculation (M s + e) is a lot cheaper than the classic solutions, but inversion is hard. For some uses and more details, see <ref type="bibr" target="#b23">[Mel13]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.3">Clique problem</head><p>The clique problem is a basic problem from graph theory where given an input graph and an integer k, we have to decide whether the graph contains a complete subgraph (clique) of size k. A classical result is the following (we give quantitative formal hardness results later).</p><p>It is hard to find a clique (complete subgraph) of size k in a random graph.</p><p>The main advantage of using this problem is that it is an NP-complete problem, so if we can reduce breaking our encryption scheme to this hard problem, the attacker will also fight against the millennium problem "P versus NP".</p><p>In the post-quantum world there is a quantum algorithm that solves NP-complete problems: Grover's algorithm <ref type="bibr" target="#b14">[Gro96]</ref>. This algorithm gives a reasonable speedup compared to known classical algorithms but still doesn't pose a threat to NP-hard problems in general.</p><p>The proposed encryption method is not the first one using the clique problem for constructing a scheme, see e.g. <ref type="bibr" target="#b20">[Kuc91,</ref><ref type="bibr" target="#b17">JP00]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.4">Some notation</head><p>In the following subsection we give some basic notations to avoid confusion with the most widely used notations in graph and probability theory.</p><formula xml:id="formula_0">• [n] := {1, ..., n} ∀n ∈ N • a is chosen randomly from A.</formula><p>• U n uniform distribution over binary vectors of length n.</p><p>• Ber n ε distribution binary 0 − 1 vectors of length n where each entry is 1 independently with probability ε.</p><p>• G (n, p) distribution of n sized random graphs where every two nodes are adjacent with probability p (Erdős-Rényi random graphs).</p><p>• Π G (u) set of the neighbors of node u in G.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Prior work used directly</head><p>In the first section we could see the origin of our main problems, but now we describe the encryption algorithm (based on the LPN) which serves as the base of our scheme. The algorithm was introduced in [ABW10] and we can see it is a one-bit encryption method, but it can be easily extended to longer messages (make sure of the independent randomness of x and e).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The encryption method</head><p>The encryption method</p><p>Public key</p><formula xml:id="formula_1">M ∈ F m×n 2 sampled from D.</formula><p>The distribution D is over matrices, in which the last row is a linear combination of q − 1 other rows. (q must be small compared to m and n)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Private key</head><p>A q sized subset S ⊂ [m] with i∈S M i where M i denotes the i-th row of M .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Encryption</head><p>Choose a random vector x ← U n and a random noise vector e ← Ber m ε , let b = M x + e.</p><p>• To encrypt 0, send the vector b.</p><p>• To encrypt 1, send the vector b with its last bit flipped .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Decryption</head><p>To decrypt y ∈ {0, 1} n , output the i∈s y i (mod 2).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Validity and correctness</head><p>Denote the sent message with M x + e + σ, where the σ is zero vector if the message 0, and</p><formula xml:id="formula_2">     0 . . . 0 1      if 1.</formula><p>Clearly the explained scheme is valid, because the M x product is linearly dependent on the position corresponding to S.</p><formula xml:id="formula_3">i∈S y i = i∈S (M x + e + σ) i = i∈S (M x) i + i∈S e i + i∈S (σ) i = 0 + i∈S e + σ</formula><p>Error occurs in the decryption only with at most</p><formula xml:id="formula_4">α = 1 2 − 1 2 (1 − 2ε) q &lt; εq</formula><p>probability by Lemma 5.3 from <ref type="bibr" target="#b0">[ABW10]</ref>.</p><p>Remark 1. We have to keep q small to achieve a good success ratio for transmission.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Key generation</head><p>Theorem 7.3 from <ref type="bibr" target="#b0">[ABW10]</ref> proves the existence of a semantically secure public key encryption scheme under some hardness assumptions using a distribution of d-sparse matrices that is computationally indistinguishable from the uniform distribution of d-sparse matrices.</p><p>3 Proposed public key encryption scheme</p><p>In this section we propose a public key encryption scheme using the encryption method from [ABW10] described in the preceding section. The scheme has a key generation algorithm based on the NP-complete clique problem.</p><p>Our approach uses Erdős-Rényi random graphs for creating a public key -private key pair. Our aim is to inject a small linearly dependent part into the adjacency matrix of the graph and make sure it is hard to find that part.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Key generation</head><p>The key generation parameters:</p><p>• n -graph size 3. Remove all edges between nodes contained in S: replace E by (E\ {(u, v) |u, v ∈ S}) (plant an independent set to the positions corresponding to S).</p><formula xml:id="formula_5">4. Iterate through {u ∈ V \S| |Π G (u) ∩ S| ≡ 1 (mod 2)} with u in random order (a) with p add probability add (u, v) for v ← S\Π G (u) to E, (b) else remove (u, v) for v ← Π G (u) |S from E.</formula><p>Public key: G Private key: S Steps 1 to 3 create a graph with a planted independent set in the position denoted by S.</p><p>Step 4 adds and removes random edges to until we make sure that every node has an even number of connections to S. This latter property guarantees that this generation algorithm gives the (mod 2) linearly dependent part in the adjacency matrix that we need for the encryption scheme.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Expected degree</head><p>To achieve a graph that "looks" similar to an original G (n, p) instance, we make sure that the expected degree in the generated graph equals to the expected degree of a graph instance from G (n, p). To achieve this, we have to add similar number of random edges as we remove during the key generation. Using this observation we can give a formula for the p add variable.</p><p>Theorem 2. The graph generated by our key generation algorithm has similar expected degree as G (n, p) if and only if</p><formula xml:id="formula_6">p add = p k 2 2 • p odd (n − k) + 1 2</formula><p>where</p><formula xml:id="formula_7">p odd = k 2 −1 i=0 k 2i + 1 p 2i+1 (1 − p) k−2i−1 .</formula><p>Proof. The expected number of removed edges with planting the independent set: p k 2 .</p><p>Denote with p odd the probability that a node from V \S has an odd number of edges to the nodes corresponding in S:</p><formula xml:id="formula_8">p odd = k 2 −1 i=0 k 2i + 1 p 2i+1 (1 − p) k−2i−1</formula><p>In the key generation algorithm after the planting we check all of the nodes outside the clique (V \S) and calculate the parity. If the connection number to the S is odd, we have to add or remove one edge to make the connection number even, otherwise we do not do anything, hence the expected number of edges that are added is</p><formula xml:id="formula_9">p odd (n − k) (p add − (1 − p add ))</formula><p>To achieve a similar expected degree as a normal random G n,p graph, we have to add as many edges as we removed (in expectation). This gives a formula for p add :</p><formula xml:id="formula_10">p odd (n − k) (p add − (1 − p add )) − p k 2 = 0 p add = p k 2 2 • p odd (n − k) + 1 2</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Parameter bound</head><p>We have a restriction for the parameters because clearly 0 ≤ p add ≤ 1 has to hold.</p><p>Theorem 3. For the parameters of a key generation the following has to hold:</p><formula xml:id="formula_11">p k 2 p odd + k ≤ n</formula><p>where p odd is like above in Theorem 2.</p><p>Proof. Plug 0 ≤ p add ≤ 1 into the formula from Theorem 2.</p><formula xml:id="formula_12">0 ≤ p k 2 2 • p odd (n − k) + 1 2 ≤ 1 ⇒ −1 ≤ p k 2 p odd (n − k) ≤ 1 ⇒ − (n − k) ≤ p k 2 p odd ≤ n − k</formula><p>which directly leads to the given bound.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Cryptanalysis</head><p>In this section we discuss the hardness of computing the private key from public key without message sending.</p><p>In cryptography it is ordinary to prove the security with some deduction to a well-known problem, so first of all we deduct our key attacking problem to the well-known clique problem via Karp reductions. Next we focus on the distribution G (n, p), and finally discuss some attacking algorithms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">NP-hardness of finding the secret</head><p>In this subsection we discuss the hardness of finding an independent set S in a graph to which every node has an even number of connections. If one could find such sets S efficiently, this would enable breaking the encryption scheme above.</p><p>Definition 4. The independent set problem consists of deciding the following property Input: graph G, positive integer k.</p><p>Property: G has k nodes which do not have edges between each other.</p><p>Lemma 5. The independent set problem is NP-complete.</p><p>Definition 6. Even neighbor independent set problem Input: graph G, positive integer k.</p><p>Property:</p><p>1) G has a set of k nodes (denoted by S) which don't have edges between them.</p><p>2) Each node outside S has an even number of neighbors from S.</p><p>Theorem 7. The even neighbor independent set problem is NP-hard.</p><p>Proof. Using Karp reduction to the independent set problem:</p><formula xml:id="formula_13">Let (V, E) := G V = G × {0, 1} E = {((u, 0) , (v, 0)) | (u, v) ∈ E} ∪ {((u, 1) , (v, 1)) | (u, v) ∈ E} ∪ {((u, 0) , (v, 1)) | (u, v) ∈ E} G := (V , E ) k = 2k</formula><p>If one had an efficient algorithm for the search problem version of the even neighbor independent set problem, one could also solve the search problem version of the clique problem.</p><p>1) We have a k-sized independent set problem with G graph and k, n = |G|.</p><p>2) Use the transformation in Theorem 7 to get G .</p><p>3) Use the oracle on G which solves even neighbor independent set problem in polynomial time and gets solution S.</p><p>4) The original independent set position is {s |s ≡ s mod n, s ∈ S}</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Hardness of finding clique in G (n, p)</head><p>In the previous subsection we only argued that we cannot expect to be able to efficiently solve the even neighbor independent set problem in the worst-case. In order to formally prove the security of the proposed scheme, one would have to prove that finding cliques in graphs obtained as the public key of this scheme is at least as hard as finding cliques in general random graphs. We were not (yet) able to prove this, but below we give heuristic arguments about why this might be the case. The analysis below helps us find the optimal parameters for our encryption, therefore we discuss the potential attacking algorithms and related studies.</p><p>The simple brute force approach needs to check all the combinations of k nodes and check whether every node adjacent with each other. In worst case after we found an independent set we have to check the even connections from outside property.</p><p>The second intuitive approach is the greedy one, which has a lot of good improvement and all of them are based on the following two base steps:</p><p>1. Choose a random node.</p><p>2. Choose a new node which is adjacent with all of the nodes selected before.</p><p>We revise some relevant results from the literature on the clique problem.</p><p>• The following modified version of the clique problem was investigated by Karp <ref type="bibr" target="#b18">[Kar72]</ref>, <ref type="bibr" target="#b19">[Kar76]</ref>: Is there any polynomial time algorithm that finds a k = (1 + ε) • lg (n) sized clique for any constant ε &gt; 0?</p><p>• In <ref type="bibr" target="#b22">[Mat72]</ref>, it is proved that the expected size of the maximal clique is 2</p><formula xml:id="formula_14">• log 1/p (n) − 2 • log 1/p log 1/p (n) + 2 • log 1/p</formula><p>1 2 e + 1 in the Erdős-Rényi model with parameter p. Many papers consider the p = 1/2 case and the approximation 2 • lg (n).</p><p>• In <ref type="bibr" target="#b13">[GM75,</ref><ref type="bibr" target="#b19">Kar76]</ref>, it is proved that in a uniformly generated graph, the greedy algorithm outputs a clique of size lg (n) with high probability. By running the greedy algorithm for n k/4+o(1) times, we find a 1 2 + ε k sized clique also with high probability.</p><p>• The original question hardened by Jerrum <ref type="bibr" target="#b16">[Jer92]</ref>: Is there a polynomial time algorithm that finds a clique with k ≥ 1.01 • log (n) in a random graph which contains a clique of size at least n 0.49 ? In this paper they showed that some search techniques fail to efficiently find a clique of size (1 + ε)</p><formula xml:id="formula_15">• log (n) in a graph G n, 1 2 even if it is known to contain a clique of size n 1 2 −δ .</formula><p>• The G (n, p) Erdős-Rényi random graphs are well-studied (e.g. <ref type="bibr" target="#b6">[Bol98,</ref><ref type="bibr" target="#b36">Wes01]</ref>) especially the uniform case G n, 1 2 .</p><p>• <ref type="bibr" target="#b3">[AKS98]</ref> gave an algorithm which solves the planted clique problem in polynomial time with high probability for k &gt; cn 0.5 cases which have some improvements <ref type="bibr" target="#b9">[DGP14,</ref><ref type="bibr" target="#b11">FR10]</ref>, but only the probability is improved, the lower bound not.</p><p>• In <ref type="bibr" target="#b25">[NP85]</ref> the runtime is n (ω/3)k+o(1) , where n ω+o(1) is the runtime of the matrix multiplication. The lowest possible value (we have not reached that yet) of ω is 2, so if we have the theoretically best matrix multiplication algorithm, this algorithm gives a n (2/3)k+o(1) runtime. In practice this algorithm is inapplicable for our cases, because asymptotically fast matrix multiplication algorithms are not practical for the problem sizes we consider.</p><formula xml:id="formula_16">• [Vas09] gave an algorithm with O n k / ε • log (n) k−1</formula><p>runtime and O (n ε ) space requirement.</p><p>• Several slight improvements appear in the following papers: [Rob01,BSK10,Ros14].</p><p>• Rossman <ref type="bibr" target="#b31">[Ros14]</ref> analyzed Boolean circuits bounds for average case clique complexity and prooved that the boolean circuits of size O n k/4 and depth at most k −2 • log (n) /log (log (n)) cannot solve the k-clique problem with high probability on G (n, p).</p><p>Cryptosystems:</p><p>• Kucera [Kuc91] started to use the clique problem for cryptographic purposes in 1991, they used k = n κ clique size, where 0 &lt; κ &lt; 1 2 .</p><p>• [JP00] used the planted clique problem to construct an encryption scheme, but none of them proposed a public key encryption scheme. They proved it is hard to claim a planted clique from an uniform Erdős-Rényi graph (G n, 1 2 )</p><p>[Ros10] raised a question in 1.3: Is there an O n (1−δ)k/4 time algorithm which solves the k-clique problem with high probability on G (n, p)? If we have a negative answer for it, that would imply P = N P . This question is still not answered.</p><p>We can find a lot of algorithms solving the k-clique or maximal clique problems but still there are not any efficient algorithms even for Karp's question on a clique of size slightly above lg n.</p><p>Remark 8. The most frequently considered case is the uniform G n, 1 2 distribution, and the interval considered hard for the clique size log (n) &lt; k &lt; √ n. If we use this interval as a boundary for the key generation parameters, the attackers do not have any publicly known efficient algorithms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Independent set size</head><p>We saw in the previous section that the hardness of the decryption strongly depends on the size of the independent set. It is clear, we have to use at least a log (n) sized independent set as a secret key, but that is an open question which upper bound would be better for us.</p><p>It was shown that the expected maximum clique size is k ≈ 2 • log (n), so in the remaining part of this paper we investigate only graphs with k = 1.95 • log (n) sized injected independent sets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">Distribution</head><p>We could not formally prove that the distribution of graphs obtained as a public key of our scheme is computationally indistinguishable from the set of all Erdős-Rényi graphs. To compare the distribution of our key generation to the uniform G (n, p) we used the Wilcoxon rank-sum to measure the difference between the two distribution and it shown a really good p-value for the typical properties like diameter, degree, average maximum clique size etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5">Experimental result</head><p>As part of the research we implemented our cryptosystem in sage and compared to the classical RSA security level with some experimental tests. Our aim was to break the cryptosystems with a publicly available algorithm. We tried many implementations of the best algorithms against both of problems (RSA: Pollard Rho, Pollard p-1, field sieve , Clique/independent set: [Akk73,BK73,TIAS77,CN85,MU04,TTT06]) and the final choice against the RSA was the Pari/GP computer algebra system (It was faster than the publicly available sieve based on gmp in c++, polard, etc.), and the Tomita algorithm [TTT06] against our cryptosystem (which was also faster than the famous Bron-Kerbosch algorithm in our cases).</p><p>In our measurements we used the k = 1.95•log (n) clique size, because naturally the expected maximum clique size is 2 • log (n), so our graph will be more similar to the uniform distribution. Our experimental results show that we can use nearly similar n parameter (needed little bit bigger) as used for the RSA, so we can claim an acceptable encryption if we use the following parameter set.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>•</head><label></label><figDesc>p -edge probability (determines the density of the graph) • k -planted clique/independent set size • p add -ratio that determines how to change the outer connection number to even (probability for adding) Denote the nodes of G graph with V and the edges with E. Algorithm 1 The key generation 1. Choose a random G ← G (n, p) graph. 2. Choose a random k sized subset from the nodes of the graph containing the last row. Denote it with S ⊂ [n].</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Compare RSA and clique on logarithmic scale.</figDesc><graphic coords="8,137.70,475.50,340.19,181.62" type="bitmap" /></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>n ≥ 1024 k = 1.95 • log (n) ≈ 14 p = 0.5 p add = 0.545</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Result and conclusion</head><p>We proposed a public key encryption scheme whose security is based on the difficulty of the clique problem and we expect it to be secure against quantum algorithms as well. Yet there are several improvements to be made.</p><p>Currently, our key size is n 2 2 , and the encrypted size / message size ratio is n, so during further development we plan to improve the algorithm to get a better ratio, because now it equals to the graph size, which is a really huge overhead to the encrypted message. The big key size can be negligible in practice, because it has to be transfered only once and can be cached in middle points on the internet.</p><p>By research of Jerrum <ref type="bibr" target="#b16">[Jer92]</ref> we will investigate the 2 • log (n) &lt; k &lt; √ n interval for secret sizes, because as we can see in previous sections, the hardness of finding an independent set exponentially grows together with the size of the independent set. We expect to supplement present work with additional formal proofs of security and perform more extensive experiments in the future.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Public-key cryptography from different assumptions</title>
		<author>
			<persName><forename type="first">B</forename><surname>Applebaum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Barak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Wigderson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the forty-second ACM symposium on Theory of computing</title>
				<meeting>the forty-second ACM symposium on Theory of computing</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="171" to="180" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Generating hard instances of lattice problems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ajtai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the twenty-eighth annual ACM symposium on Theory of computing</title>
				<meeting>the twenty-eighth annual ACM symposium on Theory of computing</meeting>
		<imprint>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="99" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The enumeration of maximal cliques of large graphs</title>
		<author>
			<persName><forename type="first">E</forename><surname>Akkoyunlu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Computing</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="6" />
			<date type="published" when="1973">1973</date>
			<publisher>SIAM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Finding a large hidden clique in a random graph</title>
		<author>
			<persName><forename type="first">N</forename><surname>Alon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Krivelevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sudakov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Random Structures and Algorithms</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="457" to="466" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Introduction to post-quantum cryptography</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Bernstein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Chapter in Post-quantum cryptography</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="1" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Algorithm 457: finding all cliques of an undirected graph</title>
		<author>
			<persName><forename type="first">C</forename><surname>Bron</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kerbosch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="575" to="577" />
			<date type="published" when="1973">1973</date>
			<publisher>ACM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Random graphs</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bollobás</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Chapter in Modern Graph Theory</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="215" to="252" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A simple algorithm to optimize maximum independent set</title>
		<author>
			<persName><forename type="first">S</forename><surname>Balaji</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Swaminathan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kannan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advanced Modeling and Optimization</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="107" to="118" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Arboricity and subgraph listing algorithms</title>
		<author>
			<persName><forename type="first">N</forename><surname>Chiba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Nishizeki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Computing</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="210" to="223" />
			<date type="published" when="1985">1985</date>
			<publisher>SIAM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Finding hidden cliques in linear time with high probability</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Dekel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Gurel-Gurevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Peres</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Combinatorics, Probability and Computing</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">01</biblScope>
			<biblScope unit="page" from="29" to="49" />
			<date type="published" when="2014">2014</date>
			<publisher>Cambridge Univ Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IACR Cryptology ePrint Archive</title>
		<imprint>
			<biblScope unit="page">688</biblScope>
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Finding hidden cliques in linear time</title>
		<author>
			<persName><forename type="first">U</forename><surname>Feige</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ron</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">21st International Meeting on Probabilistic, Combinatorial, and Asymptotic Methods in the Analysis of Algorithms</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="189" to="204" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Practical lattice-based cryptography: A signature scheme for embedded systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Güneysu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lyubashevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Pöppelmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Workshop on Cryptographic Hardware and Embedded Systems</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="530" to="547" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">On colouring random graphs</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Grimmett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Mcdiarmid</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Proceedings of the Cambridge Philosophical Society</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="issue">02</biblScope>
			<biblScope unit="page" from="313" to="324" />
			<date type="published" when="1975">1975</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A fast quantum mechanical algorithm for database search</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">K</forename><surname>Grover</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the twenty-eighth annual ACM symposium on Theory of computing</title>
				<meeting>the twenty-eighth annual ACM symposium on Theory of computing</meeting>
		<imprint>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="212" to="219" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">NTRU: A ring-based public key cryptosystem</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hoffstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pipher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Silverman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Algorithmic Number Theory Symposium</title>
				<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="267" to="288" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Large cliques elude the Metropolis process</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jerrum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Random Structures &amp; Algorithms</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="347" to="359" />
			<date type="published" when="1992">1992</date>
			<publisher>Wiley Online Library</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Hiding cliques for cryptographic security</title>
		<author>
			<persName><forename type="first">A</forename><surname>Juels</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Peinado</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Designs, Codes and Cryptography</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="269" to="280" />
			<date type="published" when="2000">2000</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Reducibility among combinatorial problems</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Karp</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Chapter in Complexity of computer computations</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1972">1972</date>
			<biblScope unit="page" from="85" to="103" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">The probabilistic analysis of some combinatorial search algorithms</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Karp</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Algorithms and complexity: New directions and recent results</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Academic Press</publisher>
			<date type="published" when="1976">1976</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">19</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A generalized encryption scheme based on random graphs</title>
		<author>
			<persName><forename type="first">L</forename><surname>Kučera</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Workshop on Graph-Theoretic Concepts in Computer Science</title>
				<imprint>
			<date type="published" when="1991">1991</date>
			<biblScope unit="page" from="180" to="186" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">On ideal lattices and learning with errors over rings</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lyubashevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Peikert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Regev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Annual International Conference on the Theory and Applications of Cryptographic Techniques</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="1" to="23" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Employee party problem</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">W</forename><surname>Matula</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Notices of the American Mathematical Society</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="A382" to="A382" />
			<date type="published" when="1972">1972</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">On the Learning Parity with Noise Problem</title>
		<author>
			<persName><forename type="first">L</forename><surname>Melis</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">New algorithms for enumerating all maximal cliques</title>
		<author>
			<persName><forename type="first">K</forename><surname>Makino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Uno</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scandinavian Workshop on Algorithm Theory</title>
		<imprint>
			<biblScope unit="page" from="260" to="272" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">On the complexity of the subgraph problem</title>
		<author>
			<persName><forename type="first">J</forename><surname>Nešetřil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Poljak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Commentationes Mathematicae Universitatis Carolinae</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="415" to="419" />
			<date type="published" when="1985">1985</date>
		</imprint>
		<respStmt>
			<orgName>Charles University in Prague ; Faculty of Mathematics and Physics</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Lattice cryptography for the internet</title>
		<author>
			<persName><forename type="first">C</forename><surname>Peikert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Workshop on Post-Quantum Cryptography</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="197" to="219" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">On lattices, learning with errors, random linear codes, and cryptography</title>
		<author>
			<persName><forename type="first">O</forename><surname>Regev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the ACM (JACM)</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page">34</biblScope>
			<date type="published" when="2009">2009</date>
			<publisher>ACM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">The learning with errors problem</title>
		<author>
			<persName><forename type="first">O</forename><surname>Regev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Invited survey in CCC</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Robson</surname></persName>
		</author>
		<idno>1251-01</idno>
		<title level="m">Finding a maximum independent set in time O (2n/4)</title>
				<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
		<respStmt>
			<orgName>LaBRI ; Université Bordeaux I</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Average-Case Complexity of Detecting Cliques</title>
		<author>
			<persName><forename type="first">B</forename><surname>Rossman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>ProQuest LLC</publisher>
			<pubPlace>Ann Arbor, MI</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">The monotone complexity of k-clique on random graphs</title>
		<author>
			<persName><forename type="first">B</forename><surname>Rossman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Computing</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="256" to="279" />
			<date type="published" when="2014">2014</date>
			<publisher>SIAM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Algorithms for quantum computation: Discrete logarithms and factoring</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">W</forename><surname>Shor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings., 35th Annual Symposium on</title>
				<meeting>35th Annual Symposium on</meeting>
		<imprint>
			<date type="published" when="1994">1994. 1994</date>
			<biblScope unit="page" from="124" to="134" />
		</imprint>
	</monogr>
	<note>Foundations of Computer Science</note>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">A new algorithm for generating all the maximal independent sets</title>
		<author>
			<persName><forename type="first">S</forename><surname>Tsukiyama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ide</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ariyoshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Shirakawa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Computing</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="505" to="517" />
			<date type="published" when="1977">1977</date>
			<publisher>SIAM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">The worst-case time complexity for generating all maximal cliques and computational experiments</title>
		<author>
			<persName><forename type="first">E</forename><surname>Tomita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tanaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Takahashi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">363</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="28" to="42" />
			<date type="published" when="2006">2006</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Efficient algorithms for clique problems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Vassilevska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">109</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="254" to="257" />
			<date type="published" when="2009">2009</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">B</forename><surname>West</surname></persName>
		</author>
		<title level="m">Introduction to graph theory, 2</title>
				<imprint>
			<publisher>Prentice hall Upper Saddle River</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
