Exploring high‐safety but convenient encryption and decryption technologies to combat threats of information leakage is urgently needed but remains a great challenge. Here, a synergistically time‐ ...and temperature‐resolved information coding/decoding solution based on functional photonic inks is demonstrated. Encrypted messages can be stored into multiple channels with dynamic‐color patterns, and information decryption is only enabled at appointed temperature and time points. Notably, the ink can be easily processed into quick‐response codes and multipixel plates. With high transparency and responsive color variations controlled by ink compositions and ambient temperatures, advanced 3D stacking multichannel coding and Morse coding techniques can be applied for multi‐information storage, complex anticounterfeiting, and information interference. This study paves an avenue for the design and development of dynamic photonic inks and complex encryption technologies for high‐end anticounterfeiting applications.
Here, a synergistically time‐/temperature‐resolved information coding/decoding solution based on a photonic anticounterfeiting ink is demonstrated. The ink can be easily processed into different patterns, which enable the storage of messages into multiple channels as well as the information decryption at appointed temperature and time points, providing inspirations for advanced information‐encryption and anticounterfeiting technologies.
Optical nanomaterials have been widely used in anticounterfeiting applications. There have been significant developments powered by recent advances in material science, printing technologies, and the ...availability of smartphone‐based decoding technology. Recent progress in this field is surveyed, including the availability of optical reflection, absorption, scattering, and luminescent nanoparticles. It is demonstrated that advances in the design and synthesis of lanthanide‐doped upconversion nanoparticles will lead to the next generation of anticounterfeiting technologies. Their tunable optical properties and optical responses to a range of external stimuli allow high‐security level information encoding. Challenges in the scale‐up synthesis of nanomaterials, engineering of assessorial devices for smart‐phone‐based decryption, and alignment to the potential markets which will lead to new directions for research, are discussed.
Recent advances in the development of anticounterfeiting technologies are surveyed. It is demonstrated that lanthanide‐doped upconversion nanoparticles hold significant potential for developing next‐generation high‐level anticounterfeiting technologies. This is a result of synthesis scale‐up, their multidimensional optical properties, and design strategies to encrypt information. Engineering compact smartphone‐based decryption devices is a future trend for next‐generation anticounterfeiting technologies.
Information security protection has a tremendous impact on human life, social stability and national security, leading to the rapid development of anti‐counterfeiting materials and related ...techniques. However, the traditional stored information on hard or dry media is often static and lacks functions, which makes it challenging to deal with increasing and powerful counterfeiting technologies. Modified intelligent polymeric gels exhibit color changes and shape morphing under external stimuli, which give them great potential for applications in information storage. This paper provides an overview of the latest progress in polymeric gel‐based information storage materials in relation to counterfeiting. Following a brief introduction of anti‐counterfeiting materials, the preparation methods for intelligent gels with adjustable colors (e.g., chemical colors and physical colors) and various encryption/decryption modes involving dimensions and diverse colors are outlined. Finally, the challenges and prospects for information storage and anti‐counterfeiting based on smart gels are discussed.
New anti‐counterfeiting materials to deal with the endless phenomena of information leakage and misinformation are a very important and promising field. As one of the most attractive candidates, smart gels possess excellent modifiability and unique stimulus responsiveness. Moreover, elaborate polymeric gels with chemical or physical colors can display polychrome and multistage information through the synergy of multiple functions.
Attribute-based encryption that supports computation outsourcing has been a promising approach to implement fine-grained access control in the Internet of Things (IoT). However, existing outsourcing ...schemes only focus on minimizing computation on user terminals while overlooking the significant computational burden faced by outsourcing devices. In IoT scenarios with a large volume of concurrent outsourcing requests, such burden can overwhelm outsourcing devices, leading to inefficient decryption execution. This paper, for the first time, proposes ORR-CP-ABE, an outsourced attribute-based encryption scheme with decryption results reuse. In ORR-CP-ABE, users with equivalent access privileges are grouped and issued group-oriented translation keys. Through translation, outsourcing devices can directly reuse previously calculated decryption results of other group members, eliminating redundant outsourced task execution. To further alleviate the burden on outsourcing devices, we use Named Data Networking as the underlying network layer to deploy translation functions and distributed caching for results reuse in the edge network. Furthermore, the reuse behavior in our scheme is configured to be under the control of both the data owner and the initial invoker of results. The security analysis proves the security of ORR-CP-ABE. Performance analysis indicates that it significantly reduces the burden on outsourcing devices and improves decryption efficiency by up to 90% compared to the baseline.
•An outsourced CP-ABE scheme optimized for efficiency via decryption result reuse.•Named Data Networking for streamlined decryption result caching and reuse.•Mechanisms to ensure feasible and secure reuse of outsourcing decryption results.
In this article, the fault-tolerant consensus control problem is investigated for multiagent systems with sensor faults. A first-order difference equation is utilized to describe the sensor fault, ...and an observer is designed to estimate the state and the fault simultaneously. For security enhancement and/or congestion mitigation purposes, the estimated state is first encrypted into a series of finite-level codewords by an encryption algorithm and, then, transmitted to other agents through a directed topology. After being received, the codewords are then decrypted by the corresponding decryption algorithm and subsequently utilized to design the consensus controller. By constructing a novel matrix norm along with its compatible vector norm, we obtain a necessary and sufficient condition, which serves as an index in the observer and the controller design. In the end, a simulation example is given to demonstrate the validity of the results in this article.
The protection of data is essential in this digitized world and hence the need for cryptographic techniques to aid in this process. Cryptography in general helps achieve three primary goals; ...confidentiality, integrity, and authenticity. The goal of confidentiality is to ensure and allow for authorized access. Encryption is ubiquitous and unavoidable as it plays a pivotal role in confidentiality in both classical and quantum computing and cryptography. This paper proposes a classical and quantum cryptographic scheme known as “Kruptós” that is based on proven mathematical concepts and operations. As part of the scheme, certain principles have been incorporated to further increase its complexity. The traditional system development life cycle (SDLC) methodology was adopted in developing the algorithm. The frameworks and algorithms showed that the proposed technique can be used easily to encrypt textual data
.
Metasurfaces provide a novel platform for information encryption due to their incomparable competence for the manipulation of different optical characteristics. Most current encryption schemes, ...however, decrypt the hidden information through a direct illumination of the metasurface, and the security of which cannot be fully guaranteed since the number of illumination condition is very limited and vulnerable for exhaustive attack. Herein, a cryptographic system based on the indirect‐observation decryption is proposed, the hidden information of which can only be decoded by combining the metasurface‐transformed ciphertext and particular decryption devices based on the digit‐shift images and spatial light modulator, thus possessing ultra‐high confidentiality. In addition, an anti‐counterfeiting label is designed to guarantee the information authenticity. This work builds a distinct bridge between metasurface and other light‐manipulation elements, nanoprint and hologram, and amplitude‐ and phase‐modulated information, thus opening up a new methodology for constructing cryptographic systems in an indirect‐observation way, which may promote the advanced exploration of optical multiplexing and steganography.
A cryptographic system based on the indirect‐observation decryption is proposed, the hidden information of which can only be decoded by combining the metasurface‐transformed ciphertext and particular decryption devices based on digit‐shift images and spatial light modulator, thus possessing ultra‐high confidentiality. In addition, an anti‐counterfeiting label is designed to guarantee the information authenticity.
•An adaptive, separable reversible data hiding scheme in encrypted image is proposed.•Analogues stream-cipher and block permutation are used to encrypt original image.•Classification and selection ...for encrypted blocks are conducted during embedding.•An accurate prediction strategy was employed to achieve perfect image recovery.•Our scheme has better rate-distortion performance than some state-of-the-art schemes.
In this paper, an adaptive reversible data hiding scheme for encrypted images is proposed. Content owner uses an analogues stream-cipher and block permutation to encrypt non-overlapping blocks of original image through encryption key. Then, data hider classifies encrypted blocks into two sets corresponding to smooth and complex regions in original image. With data-hiding key, spare space is vacated to accommodate additional bits by compressing LSBs of the block set corresponding to smooth region. Separable operations of data extraction, direct decryption and image recovery are conducted by receiver according to the availability of encryption key and data-hiding key. Through an accurate prediction strategy, perfect image recovery is achieved. Since only a portion of blocks are modified during embedding, the directly-decrypted image quality is satisfactory. Also, more bits can be embedded into the blocks belonging to smooth set, hence, embedding rate is acceptable. Experimental results demonstrate the effectiveness of our scheme.