• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

自组装共振能量转移键用于经典信道上的安全通信。

Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

机构信息

Department of Electrical and Computer Engineering, Duke University , 130 Hudson Hall, Durham, North Carolina 27708, United States.

Department of Electrical Engineering, Harvard University , 33 Oxford Street, Room 308, Cambridge, Massachusetts 02138, United States.

出版信息

ACS Nano. 2015 Dec 22;9(12):11840-8. doi: 10.1021/acsnano.5b04066. Epub 2015 Nov 10.

DOI:10.1021/acsnano.5b04066
PMID:26525314
Abstract

Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.

摘要

现代认证和通信协议越来越多地使用物理密钥代替传统的基于软件的密钥来保证安全。这种转变主要是因为可以从物理密钥中得出独特的、不可伪造的签名。到目前为止,唯一证明不可伪造密钥的方法是通过量子密钥分发,该方法受到通信距离有限和昂贵基础设施要求的限制。在这里,我们展示了一种通过共振能量转移 (RET) 器件的分子自组装来创建不可克隆密钥的方法。由于无法使用当前技术对密钥进行特征化、每个密钥的输入-输出组合数量巨大以及密钥响应随时间的变化,因此无法克隆 RET 密钥。但是,制造商可以生产多个相同的设备,从而实现了廉价、安全的经典通道认证和通信,因此可以在任何距离进行。通过对纳米级密钥的详细实验调查,我们证明了合法用户在两次尝试中成功认证的时间为 99.48%,错误警报率仅为 0.39%。我们估计,合法用户相对于攻击者具有超过 10(340)年的计算优势。我们的方法使得基于物理密钥的多方认证和通信方案的发现成为可能,这些方案既实用又具有前所未有的安全性。

相似文献

1
Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.自组装共振能量转移键用于经典信道上的安全通信。
ACS Nano. 2015 Dec 22;9(12):11840-8. doi: 10.1021/acsnano.5b04066. Epub 2015 Nov 10.
2
Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.抗量子攻击的强前向安全签名方案研究
Entropy (Basel). 2023 Aug 2;25(8):1159. doi: 10.3390/e25081159.
3
All-optical multilevel physical unclonable functions.全光多级物理不可克隆函数
Nat Mater. 2024 Mar;23(3):369-376. doi: 10.1038/s41563-023-01734-7. Epub 2024 Jan 8.
4
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.一种基于椭圆曲线密码学的无线自组织网络用户认证方案。
Sensors (Basel). 2015 Jul 14;15(7):17057-75. doi: 10.3390/s150717057.
5
Using Quantum Confinement to Uniquely Identify Devices.利用量子限制效应来唯一识别设备。
Sci Rep. 2015 Nov 10;5:16456. doi: 10.1038/srep16456.
6
Self-Powered Random Number Generator Based on Coupled Triboelectric and Electrostatic Induction Effects at the Liquid-Dielectric Interface.基于液-电介质界面上的耦合摩擦电和静电感应效应的自供电随机数发生器。
ACS Nano. 2016 Dec 27;10(12):11434-11441. doi: 10.1021/acsnano.6b07030. Epub 2016 Dec 9.
7
Cryptographic framework for document-objects resulting from multiparty collaborative transactions.多方协作交易产生的文档对象的加密框架。
Stud Health Technol Inform. 2000;77:1069-73.
8
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.面向舒适生活方式的安全物联网技术中的相互认证方案。
Sensors (Basel). 2015 Dec 24;16(1):20. doi: 10.3390/s16010020.
9
Secure communications using nonlinear silicon photonic keys.使用非线性硅光子密钥的安全通信。
Opt Express. 2018 Feb 19;26(4):4710-4722. doi: 10.1364/OE.26.004710.
10
Memory attacks on device-independent quantum cryptography.对设备无关量子密码学的记忆攻击。
Phys Rev Lett. 2013 Jan 4;110(1):010503. doi: 10.1103/PhysRevLett.110.010503. Epub 2013 Jan 2.

引用本文的文献

1
Pursuing excitonic energy transfer with programmable DNA-based optical breadboards.采用可编程 DNA 光学实验平台实现激子能量转移。
Chem Soc Rev. 2023 Nov 13;52(22):7848-7948. doi: 10.1039/d0cs00936a.
2
Writing and erasing multicolored information in diarylethene-based supramolecular gels.基于二芳基乙烯的超分子凝胶中多色信息的写入与擦除
Chem Sci. 2018 Sep 4;9(41):8019-8023. doi: 10.1039/c8sc03127d. eCollection 2018 Nov 7.
3
Layered host-guest long-afterglow ultrathin nanosheets: high-efficiency phosphorescence energy transfer at 2D confined interface.
层状主客体长余辉超薄纳米片:二维受限界面处的高效磷光能量转移
Chem Sci. 2017 Jan 1;8(1):590-599. doi: 10.1039/c6sc03515a. Epub 2016 Sep 6.