Abstract
Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since the multiplication is actually an ordinary addition of numbers and there is no ordinary multiplication of numbers in the tropical semiring. However, most of these tropical cryptosystems have security defects because they adopt a public matrix to construct commutative semirings. This paper proposes new public-key cryptosystems based on tropical circular matrices. The security of the cryptosystems relies on the NP-hard problem of solving tropical nonlinear systems of integers. Since the used commutative semiring of circular matrices cannot be expressed by a known matrix, the cryptosystems can resist KU attacks. There is no tropical matrix addition operation in the cryptosystem, and it can resist RM attacks. The new cryptosystems can be considered as a potential post-quantum cryptosystem.
1. Introduction
Public-key cryptography was introduced by Diffie and Hellman [1]. In a public-key cryptosystem, the key for encryption is public and the key for decryption is private. Since then, public-key cryptography has been booming and has been widely used in modern communications. Modern public-key cryptography relies mainly on the integer factorization problem (IFP) [2] and discrete logarithm problem (DLP) [1,3]. However, Shor [4] proposed a quantum algorithm that can solve the integer factorization problem and discrete logarithm problem in polynomial time on a quantum computer. So, it is a research area focused on public-key cryptography to design public-key cryptosystems that can resist quantum attacks [5].
In the past two decades, different algebraic structures have been recommended to improve the existing public-key cryptosystems. Some researchers considered non-abelian groups to design public-key cryptosystems such as matrix groups [6,7,8,9], braid groups [10,11], inner automorphism groups [12], and ring structures [13] for cryptographic primitives. However, many successful attacks on such cryptosystems have been published [14,15,16,17].
Maze, Monico, and Rosenthal proposed one of the first cryptosystems based on semigroups and semirings [18], using some ideas from [10], as well as from their previous article [19]. However, it was broken by Steinwandt et al. [20]. Atani published a cryptosystem using semimodules over factor semirings [21]. Durcheva applied some idempotent semirings to construct cryptographic protocols [22]. A survey on semirings and their cryptographic applications was carried out by Durcheva [23].
Grigoriev and Shpilrain proved that the problem of solving the systems of min-plus polynomial equations in tropical algebra is NP-hard and suggested using a min-plus (tropical) semiring to design a public-key cryptosystem [24]. An obvious advantage of using tropical algebras as platforms is high efficiency because, in tropical schemes, one does not have to perform any multiplication of numbers since tropical multiplication is the usual addition. However, “tropical powers” of an element exhibit some patterns, even if such an element is a matrix over a tropical algebra. This weakness was exploited by Kotov and Ushakov to propose a fairly successful attack on the public-key cryptosystem in [25]. Then, Grigoriev and Shpilrain improved the original scheme and proposed the public-key cryptosystems based on the semi-direct product of the tropical matrix semiring [26]. However, some attacks on the improved public-key cryptosystem have been suggested by Rudy and Monico [27] and Isaac and Kahrobei [28]. As we know, most of these tropical public-key cryptosystems have security defects because they adopt a public matrix to construct commutative semirings or there is a tropical matrix addition operation in the cryptosystems. A review of the tropical approach in cryptography was carried out by Ahmed, Pal and Mohan [29].
Our contribution: This paper provides new public-key cryptosystems based on tropical t-circular matrices. The security of the cryptosystem relies on the NP-hard problem of solving tropical nonlinear systems of integers. Since the used commutative semirings of circular matrices cannot be represented by a known matrix and there is no tropical matrix addition operation in the cryptosystem, these cryptosystems can resist all known attacks such as KU attacks and RM attacks. Our results show that these cryptosystems are secure when the computational two-side tropical circular matrices action problem (CTCMAP) and the decisional two-side tropical circular matrices action problem (DTCMAP) are hard. It seems that our cryptosystems based on tropical circular matrices can be considered as potential post-quantum cryptosystems.
The rest of the paper is organized as follows: We focus on some definitions as fundamental key notions of tropical matrix algebra in Section 2. In Section 3, we present the new public-key cryptosystems based on tropical circular matrices. Then, in Section 4, parameter selection and efficiency of the cryptosystems are discussed. Finally, the conclusion and further research are given in Section 5.
2. Tropical Matrix Semiring over Integer
The definition of a semiring was first given by Vandiver [30]. These are structures that satisfy all the properties of a ring, except for the existence of additive inverses. Imre Simon, a Brazilian mathematician and computer scientist, discovered what is now known as the tropical semiring [31].
Definition 1 ([32]).
Let be a non-empty set with binary operations “+” and “”; then, is called a semiring if it satisfies the following conditions:
- (1)
- is a commutative semigroup with an identity element 0;
- (2)
- is a semigroup with an identity element ;
- (3)
- Multiplication satisfies the left and right distribution law for addition;
- (4)
- .
If is commutative, then the semiring is called a commutative semiring.
Definition 2 ([24]).
The integer tropical commutative semiring is the set with addition and multiplication as follows:
satisfies the following equations:
It is clear thatis a commutative semiring whose zero element and unitary element areand 0, respectively.
Letbe the set of allmatrices over. We can also define the tropical matrixandoperations.
Example 1.
Letbe an integer. If a matrixhas the following form,
then it is called an upper t-circular matrix. We denotebyor. Let
Proposition 1.
For any integer , is a commutative sub-semiring of .
3. Public-Key Cryptography Using Tropical T-Circular Matrices
3.1. Key Exchange Protocol Based on Tropical Circular Matrices
Definition 3.
Let and be two integers. Let , , and . Suppose that . The two-side tropical circular matrix action problem (TCMAP) is to find two matrices , such that , given the matrices and .
Protocol 1.
Let be three positive integers. Let . In addition, and are public.
- (1)
- Alice selects at random two matricesand, and computes. In addition, she sends to Bob the matrix.
- (2)
- Bob selects at random two matricesand, and computes. He sends to Alice the vector.
- (3)
- Alice computes. In addition, Bob computes.
Sinceandare commutative sub-semirings of, we have,and
Then, Alice and Bob share a secret key.
Definition 4.
Let be three positive integers. Let , and . Suppose that and . The computational two-side tropical circular matrix action problem (CTCMAP) is to find a matrix such that , given the matrices and .
Proposition 2.
An algorithm that solves TCMAP can be used to solve CTCMAP.
Theorem 1.
Finding the common secret key from the public information of Protocol 1 is equivalent to solving CTCMAP.
We give a practical example of Protocol 1 with small parameters in Appendix A.
Remark 1.
Protocol 1 is simplified. It can only resist passive attacks, but not active attacks, such as intruder-in-the-middle attacks. To avoid these attacks, it is desirable to have a procedure that authenticates Alice and Bob’s identities to each other while the key is being formed. A standard way to stop an intruder-in-the-middle attack is the station-to-station (STS) protocol, which uses digital signatures.
The extended protocol makes use of certificates that, as usual, are signed by a TA (trusted authority). Each user U will have a signature scheme with a verification algorithmand a signing algorithm. The TA also has a signature scheme with a public verification algorithm. Each user U has a certificate
where ID(U) is certain identification information for U.
Protocol 2.
The public domain parameters consist ofandas Protocol 1.
(1) Alice selects at random two matrices and, and computes. She sends Cert(A) and to Bob.
(2) Bob selects at random two matrices and, and computes
Then, Bob sends Cert(B),andto Alice.
(3) Alice verifies using. If the signature is not valid, then she “rejects” and quits. Otherwise, she “accepts” and computes
and she sends to Bob.
(4) Bob verifies using. If the signature is not valid, then he “rejects”; otherwise, he “accepts”.
3.2. Public-Key Encryption Scheme Based on Tropical Circular Matrices
- Cryptosystem 1.
- (1)
- Key generation:Let be three positive integers. Let , and . Suppose that . are public. Alice’s public key is . Alice’s secret key is .
- (2)
- Encryption:Bob wants to send a message to Alice.
- (i)
- Bob chooses at random , and computes as a part of the ciphertext.
- (ii)
- Bob computes as the rest of the ciphertext, where “+” is the ordinary integer matrix addition.
- (iii)
- Bob sends the ciphertext to Alice.
- (3)
- Decryption:Alice receives the ciphertext and tries to decrypt it.
- (i)
- Using her secret key , Alice computes .
- (ii)
- Alice computes , where “” is the ordinary integer matrix subtraction.
SinceAlice obtains the plaintext messages .
Definition 5.
Let be three positive integers. Let , and . Suppose that and . The decisional two-side tropical circular matrix action problem (DTCMAP) is to decide whether , given .
Proposition 3.
An algorithm that solves CTCMAP can be used to solve DTCMAP.
Theorem 2.
An algorithm that solves DTCMAP can be used to decide the validity of the ciphertexts of Cryptosystem 1, and an algorithm that decides the validity of the ciphertexts of Cryptosystem 1 can be used to solve DTCMAP.
Proof of Theorem 2.
Suppose first that the algorithm can decide whether a decryption of Cryptosystem 1 is correct. In other words, when given the inputs , the algorithm outputs “yes” if is the decryption of and outputs “no” otherwise. Let us use to solve the decisional two-side tropical circular matrix action problem. Suppose you are given , , and , and you want to decide whether or not . Let be the public key and be the first part of the ciphertext. Moreover, let be the second part of the ciphertext and be the zero matrix in . Input all of these into . Note that, in the present setup, are the secret keys. The correct decryption of is . Therefore, outputs “yes” exactly when is the same as , namely, when . This solves DTCMAP.
Conversely, suppose an algorithm can solve DTCMAP. This means that if you give inputs , , and , then outputs “yes” if and outputs “no” if not. Let be the claimed decryption of the ciphertext . Input the public key and input as . Input as .
Note that is the correct plaintext for the ciphertext if and only if , which happens if and only if . Therefore, is the correct plaintext if and only if . Therefore, with these inputs, outputs “yes” exactly when is the correct plaintext. □
4. Security and Parameter Selection
Through Theorem 1, Proposition 3, and Theorem 2, an efficient algorithm for solving the two-side tropical circular matrix action problem can be used to attack Protocol 1 and Cryptosystem 1.
Proposition 4.
TCMAP can be reduced to the problem of solving a tropical nonlinear system of equations.
Proof of Proposition 4.
Let , and . Suppose that . Now, we can try to find two matrices, and , such that , given and .
Suppose that and . Then,
Since and are known, we obtain a tropical nonlinear system of equations about with unknowns and equations. □
As we know, the problem of solving a tropical nonlinear system of equations is usually NP-hard [24]. We present an algorithm for solving the two-side tropical circular matrix action problem with exponential computational complexity.
Proposition 5.
There exists an algorithm for solving the two-side tropical circular matrix action problem with computational complexity .
Proof of Proposition 5.
With Proposition 4, we obtain a tropical nonlinear system of equations about with unknowns and equations. Note that every term of the equations is the form of (). Denote . Then, we obtain a tropical linear system of equations with unknowns and equations.
After solving the tropical linear system of equations of , we can obtain a system of nonlinear equations
Since multiplication in tropical algebra is an ordinary addition, it is actually a system of linear equations over an integer ring. The linear equations have unknowns and equations. Generally, the system of linear equations has no solution. However, if the equations in these equations have a solution, it is possible to find such that
Using the algorithm in [33], the complexity of solving the tropical linear system of equations with unknowns and equations is . The number of possible choices for selecting equations from equations is . The complexity of solving integer linear equations with equations and unknowns is . Therefore, the computational complexity of the above algorithm is . □
An example of solving TMCAP with small parameters is given in Appendix B.
4.1. KU Attack
Because the commutative semiring used in our cryptosystems is the semiring of all t-circular matrices, this is different from that of Grigoriev and Shpilrain’s public-key cryptosystem I [24]. They used two public tropical matrices and () and then adopted the commutative semiring . Let , and . The security of their cryptosystem relies on the difficulty of the problem of finding and such that . (Note that may not be equal to and may not be equal to .) Because the secret matrix can be represented by a polynomial of , Kotov and Ushakov [25] designed an efficient algorithm to attack the key exchange protocol in [24]. Suppose that
where unknowns , and D is the upper bound for the degree of polynomials. gives . This translates to
where . A specific description of KU attack is presented as Algorithm 1.
| Algorithm 1: KU Attack algorithm |
| Input: , .
Output: , such that , where , . (1) Compute and ; (2) Among all minimal covers of by , that is, all minimal subsets such that find a cover for which the system is solvable. |
Experimental results show that the attack algorithm can succeed in a short amount of time when the parameters are small (, , and the entries of matrices and the coefficients of polynomials are integers in [−1010, 1010]).
Since tropical t-circular matrices cannot be represented by a known matrix, our cryptosystem can resist KU attacks.
4.2. RM Attacks
Grigoriev and Shpilrain [26] improved the original scheme and proposed a public-key cryptosystem based on the semidirect product of the tropical matrix semiring. Let be the tropical semiring of tropical matrices over . It can be seen that is a semigroup under the operation given as
Using the semigroup , Grigoriev and Shpilrain proposed an improved tropical public-key cryptosystem. However, cryptanalysis of the improved tropical public-key cryptosystem was successfully implemented using a simple binary search by Rudy and Monico [27]. A partial order on S is defined as
It can be easily observed that for the operations , if is denoted by , then the sequence is monotonically decreasing, i.e., and so on. Algorithm 2 gives the pseudocode description of RM attack.
| Algorithm 2: RM Attack algorithm |
| Input: , where , for some positive integer m (). Output: m. (1) Let and ; (2) Execute the following loop when . (i) (ii) Compute . If , ; If , ; If , output . |
In our cryptosystems, there is no tropical matrix addition operation and the partial order cannot be used. Thus, our cryptosystems can resist RM attacks. We compare the security among relevant cryptosystems in [24,26] and our proposed cryptosystem. The comparison results are depicted in Table 1.
Table 1.
Comparison among relevant tropical schemes.
4.3. Parameter Selection
Table 2 shows the performance comparison of the cryptosystem under some different parameters, where the entries of the matrices are integers in .
Table 2.
Performance comparison under some different parameters.
In Table 3, we list the computation time for related cryptographic operations in our cryptosystem on different platforms, where k = 50, s = t = 100101, and the entries of the matrices are integers in .
Table 3.
Timings for cryptographic operations in our cryptosystem.
We recommend using the parameters , , and the entries of the matrices of integers in to avoid potential heuristic attacks similar to KU attacks.
5. Conclusions and Further Research
In this paper, we present a new key exchange protocol and a new public-key encryption scheme based on tropical matrices. We use a class of tropical commuting matrix, that is, the tropical t-circular matrix, other than matrix powers or matrix polynomials. The security of new public-key cryptosystems relies on a two-side tropical circular matrix action problem (TCMAP). The use of t-circular matrices allows us to share less information with the attacker. Since tropical circular matrices cannot be represented by a known matrix, our public-key cryptosystems can resist KU attacks. There is no addition of tropical matrices in our schemes. So, the attack method proposed by Rudy and Monico does not work for our public-key cryptosystems. Our public-key cryptosystem can resist all known attacks. As we know, the best way to solve TCMAP is to solve a tropical nonlinear system of equations, which is NP-hard. So, the new cryptosystems can be considered as a potential post-quantum cryptosystem.
Future works worth studying include the following:
- (1)
- A possible algorithm for solving TCMAP. If we can find some algorithms for solving the systems of min-plus polynomial equations, then they can be used to attack our schemes.
- (2)
- Other cryptographic applications of TCMAP. For example, we can try to design digital signature schemes and identity authentication schemes based on TCMAP.
Author Contributions
Conceptualization, H.H. and C.L.; methodology, H.H. and L.D.; software, H.H. and L.D.; validation, H.H. and L.D.; formal analysis, H.H., C.L. and L.D.; writing—original draft preparation, H.H. and L.D.; writing—review and editing, H.H., C.L. and L.D. All authors have read and agreed to the published version of the manuscript.
Funding
This work is supported by the National Natural Science Foundation of China (No. 61962011, 61462016) and the Science and Technology Foundation of Guizhou Province (QIANKEHEJICHU-ZK [2021] 313).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Notations
In this paper, the matrix is generally denoted by capital letters. Frequently used notations are listed below with their meanings:
| set of integers; | |
| tropical semiring of integers ; | |
| set of all tropical matrices over ; | |
| set of all tropical upper -circular matrices over ; | |
| TCMAP | two-side tropical circular matrix action problem; |
| CTCMAP | computational two-side tropical circular matrix action problem; |
| DTCMAP | decisional two-side tropical circular matrix action problem. |
Appendix A. An Example of Protocol 1 with Small Parameters
We choose the parameters and and the entries of the matrices in . The public matrix is as follows:
- (1)
- Alice selects at random two t-circular matrices as follows:
Alice computes . She sends the matrix to Bob.
- (2)
- Bob selects at random two t-circular matrices as follows:
Bob computes . He sends the matrix to Alice.
- (3)
- Alice computes . Bob computes .
Appendix B. An Example of Solving TMCAP with Small Parameters
We choose the parameters and and the entries of the matrices in . The public matrix is as follows:
Alice selects at random two t-circular matrices as follows:
Alice computes . She sends the matrix to Bob.
The attacker knows and obtains . They try to find and .
Let and . Then,
From it, they can obtain the tropical linear equations,
where denotes . After solving the tropical linear equations, the attacker can obtain a solution, for example:
where “+” denotes the ordinary addition.
It is easy to verify that (A1)–(A6) have no solution. (A2)–(A7) also have no solution.
The attacker keeps looking for a combination that may have a solution until they find a combination that has a solution. For example, they find that combinations (A1)–(A3), (A5), (A6), and (A8) have a solution . The attacker substitutes this solution into to verify that it is a true solution of . An attacker can find a solution by trying, at most, cases.
References
- Diffie, W.D.; Hellman, E. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
- Shor, P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 1997, 26, 1484–1509. [Google Scholar] [CrossRef]
- Bernstein, D.J.; Lange, T. Post-quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef] [PubMed]
- Baumslag, G.; Fine, B.; Xu, X. Cryptosystems using linear groups. Appl. Algebra Eng. Commun. Comput. 2006, 17, 205–217. [Google Scholar] [CrossRef]
- Kahrobaei, D.; Koupparis, C.; Shpilrain, V. Public key exchange using matrices over group rings. Groups-Complex. Cryptol. 2013, 5, 97–115. [Google Scholar] [CrossRef]
- Rososhek, S.K. New practical algebraic public-key cryptosystem and some related algebraic and computational aspects. Appl. Math. 2013, 4, 1043–1049. [Google Scholar] [CrossRef][Green Version]
- Rososhek, S.K. Modified matrix modular cryptosystems. Br. J. Math. Comput. Sci. 2015, 5, 613–636. [Google Scholar] [CrossRef]
- Anshel, I.; Anshel, M.; Goldfeld, D. An algebraic method for public-key cryptography. Math. Res. Lett. 1999, 6, 287–291. [Google Scholar] [CrossRef]
- Garber, D. Braid group cryptography. In Braids: Introductory Lectures on Braids, Configurations and Their Applications; World Scientific: Singapore, 2010; pp. 329–403. [Google Scholar]
- Paeng, S.H.; Ha, K.C.; Kim, J.H.; Chee, S.; Park, C. New public key cryptosystem using finite non Abelian groups. In Proceedings of the 21st Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 470–485. [Google Scholar]
- Hoffstein, J.; Pipher, J.; Silverman, J.H. NTRU: A ring-based public key cryptosystem. In Proceedings of the International Algorithmic Number Theory Symposium, Portland, OR, USA, 21–25 June 1998; Springer: Berlin/Heidelberg, Germany, 1998; pp. 267–288. [Google Scholar]
- Eftekhari, M. Cryptanalysis of some protocols using matrices over group rings. In Proceedings of the 9th International Conference on Cryptology in Africa, Dakar, Senegal, 24–26 May 2017; Springer: Cham, Switzerland, 2017; pp. 223–229. [Google Scholar]
- Steinwandt, R. Loopholes in two public key cryptosystems using the modular group. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, 13–15 February 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 180–189. [Google Scholar]
- Hofheinz, D.; Steinwandt, R. A practical attack on some braid group based cryptographic primitives. In Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, 6–8 January 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 187–198. [Google Scholar]
- Gentry, C.; Szydlo, M. Cryptanalysis of the revised NTRU signature scheme. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, 28 April–2 May 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 299–320. [Google Scholar]
- Maze, G.; Monico, C.; Rosenthal, J. Public Key Cryptography based on semigroup Actions. Adv. Math. Commun. 2007, 1, 489–507. [Google Scholar] [CrossRef]
- Maze, G.; Monico, C.; Rosenthal, J. A Public Key Cryptosystem Based on Actions by Semigroups. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002; pp. 266–289. [Google Scholar]
- Steinwandt, R.; Corona, A. Cryptanalysis of a 2-party key establishment based on a semigroup action problem. Adv. Math. Commun. 2011, 5, 87–92. [Google Scholar] [CrossRef]
- Atani, R.E. Public Key Cryptography Based on Semimodules over Quotient Semirings. Int. Math. Forum 2007, 2, 2561–2570. [Google Scholar] [CrossRef][Green Version]
- Durcheva, M. Public Key Cryptosystem Based on Two Sided Action of Different Exotic Semirings. J. Math Syst. Sci. 2014, 4, 6–13. [Google Scholar]
- Durcheva, M. Semirings as Building Blocks in Cryptography; Cambridge Scholars Publishing: Newcastle upon Tyne, UK, 2020. [Google Scholar]
- Grigoriev, D.; Shpilrain, V. Tropical cryptography. Commun. Algebra 2014, 42, 2624–2632. [Google Scholar] [CrossRef]
- Kotov, M.; Ushakov, A. Analysis of a key exchange protocol based on tropical matrix algebra. J. Math. Cryptol. 2018, 12, 137–141. [Google Scholar] [CrossRef]
- Grigoriev, D.; Shpilrain, V. Tropical cryptography II-Extensions by homomorphisms. Commun. Algebra 2019, 47, 4224–4229. [Google Scholar] [CrossRef]
- Rudy, D.; Monico, C. Remarks on a Tropical Key Exchange System. J. Math. Cryptol. 2021, 15, 280–283. [Google Scholar] [CrossRef]
- Isaac, S.; Kahrobaei, D. A closer look at the tropical cryptography. Int. J. Comput. Math. Comput. Syst. Theory 2021, 6, 137–142. [Google Scholar] [CrossRef]
- Ahmed, K.; Pal, S.; Mohan, R. A review of the tropical approach in cryptography. Cryptologia 2021, 1–25. [Google Scholar] [CrossRef]
- Vandiver, H. Note on a simple type of algebra in which the cancellation law of addition does not hold. Bull. Am. Math. Soc. 1934, 40, 914–920. [Google Scholar] [CrossRef]
- Speyer, D.; Sturmfels, B. Tropical mathematics. Math. Mag. 2009, 82, 163–173. [Google Scholar] [CrossRef]
- Gupta, V.; Chaudhari, J.N. Monic ideals in a groupsemiring. Asian-Eur. J. Math. 2011, 4, 445–450. [Google Scholar] [CrossRef]
- Litvinov, G.L.; Rodionov, A.Y.; Sergeev, S.N.; Sobolevski, A.N. Universal algorithms for solving the matrix Bellman equations over semirings. Soft Comput. 2013, 17, 1767–1785. [Google Scholar] [CrossRef][Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).