98%
921
2 minutes
20
The strong emission in the solid state and the feasibility of introducing stimuli responsiveness make aggregation-induced-emission luminogens promising for optical information encryption. Yet, the vast majority of previous reports rely on subtle changes in the molecular conformation or intermolecular interactions, limiting the robustness, multiplicity, capacity, and security of the resulting cryptosystems. Herein, a versatile cryptographic system is presented based on three interconnected and orthogonal covalent transformations concerning a tetraphenylethylene-maleimide conjugate. The cryptosystem is adapted into four configurations with different functionalities by organizing the reactions and molecules in different ways. These variants either balance the accessibility and security of the encrypted information or improve the security and density in data encryption. Significantly, they allow variable decryption from a single encryption and reconstruction of the chemical nature hidden in the fluorescent pattern can only be accessed through given algorithms. These results highlight the importance of multi-component synergies in advancing information encryption systems, which is enabled by the robustness and diversity stemming from the covalent nature of these transformations.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1002/adma.202004616 | DOI Listing |
Sensors (Basel)
August 2025
Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China.
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns.
View Article and Find Full Text PDFSensors (Basel)
July 2025
College of Computing and Informatics, Saudi Electronic University, Riyadh 93499, Saudi Arabia.
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately. Although a few signcryption schemes exist that combine these operations into a single, more efficient process, they typically rely on complex vector, matrix, or polynomial-based structures. In this work, a novel post-quantum public-key encryption and signature (PQES) scheme based entirely on scalar integer operations is presented.
View Article and Find Full Text PDFLight Sci Appl
March 2025
LTCI Télécom Paris, Institut Polytechnique de Paris, Palaiseau, 91120, France.
Optical chaos offers a promising approach to establishing secure communication at high data rates in a shared physical channel, like optical fibers and free space. However, the required synchronization between the transmitter and the receiver can be severely impaired by the nonidealities of the optical link. In particular, free-space optical communications are affected by atmospheric turbulence, which causes beam scintillation and results in time-varying fading of the optical intensity at the receiver side.
View Article and Find Full Text PDFSci Rep
May 2024
Department of Mathematics, Maharshi Dayanand University, Rohtak, 124001, India.
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems. This paper introduces a novel cryptosystem, Public Key Cryptosystem based on Systematic Polar Encoding (PKC-SPE), based on the combination of systematic polar encoding and public-key cryptographic principles. The Systematic Polar Encoding (SPE), derived from the well-established field of polar codes, serves as the foundation for this proposed cryptographic scheme.
View Article and Find Full Text PDFMath Biosci Eng
November 2023
College of Computer Science and Engineering, Northwest Normal University, Lanzhou, China.
Energy utilization rates have been largely improved thanks to the wide application of smart grids, thereby realizing the reliable, economic and efficient operation of the grids. However, such an application is also accompanied by many security issues. In response to the many problems within existing security schemes, such as not supporting the communication between heterogeneous cryptosystems, low security levels and a low data retrieval efficiency, a heterogeneous signcryption (HSC) scheme that supports a trusted multi-ciphertext equality test (MET) is proposed.
View Article and Find Full Text PDF