User Authorization at the Molecular Scale

被引:32
|
作者
Lustgarten, Omer [1 ]
Motiei, Leila [1 ]
Margulies, David [1 ]
机构
[1] Weizmann Inst Sci, Dept Organ Chem, IL-7610001 Rehovot, Israel
基金
欧洲研究理事会;
关键词
molecular cryptography; molecular keypad lock; molecular steganography; password protection; pattern-generating molecular sensors; HYBRIDIZATION CHAIN-REACTION; KEYPAD LOCK SYSTEM; LOGIC GATE; SECURITY SYSTEM; FLUORESCENT CHEMOSENSOR; AQUEOUS-SOLUTION; COMPLEX; CU2+; HG2+; IMPLEMENTATION;
D O I
10.1002/cphc.201700506
中图分类号
O64 [物理化学(理论化学)、化学物理学];
学科分类号
070304 ; 081704 ;
摘要
Electronic user authorization systems help us maintain our privacy in many aspects of everyday life. However, the increasing difficulty to secure access and/or information digitally has inspired chemists to devise alternative, molecular approaches, in which users are identified by chemical means. The potential advantages of using molecular user authentication systems over conventional electronic devices are their versatility and unusual operating principles, which complicate replicating and, consequently, breaking into molecular security devices. Their molecular scale is another unique property that enables hiding such systems and, consequently, applying steganography as an additional layer of protection. Although the area of molecular-based user authorization is still in its infancy, the development of various molecular keypad locks and, more recently, a password-protected molecular cryptographic machine, indicate the possibility of protecting information at the molecular scale.
引用
收藏
页码:1678 / 1687
页数:10
相关论文
共 50 条
  • [41] Software Defined Perimeter: improvements in the security of Single Packet Authorization and user authentication
    Rosa Lucion, Everson L.
    Nunes, Raul Ceretta
    2018 XLIV LATIN AMERICAN COMPUTER CONFERENCE (CLEI 2018), 2018, : 708 - 717
  • [42] Supporting user authorization queries in RBAC systems by role-permission reassignment
    Lu, Jianfeng
    Xin, Yun
    Zhang, Zhao
    Peng, Hao
    Han, Jianmin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 707 - 717
  • [43] A multi-user searchable encryption scheme with keyword authorization in a cloud storage
    Deng, Zuojie
    Li, Kenli
    Li, Keqin
    Zhou, Jingli
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 208 - 218
  • [44] Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History
    Bucko, Ahmet
    Vishi, Kamer
    Krasniqi, Bujar
    Rexha, Blerim
    COMPUTERS, 2023, 12 (04)
  • [45] Development of the Burden of Prior Authorization of Psychotherapeutics (BoPAP) Scale to Assess the Effects of Prior Authorization Among Texas Medicaid Providers
    Carolyn M. Brown
    Esmond Nwokeji
    Karen L. Rascati
    Woodie Zachry
    Glenn A. Phillips
    Administration and Policy in Mental Health and Mental Health Services Research, 2009, 36 : 278 - 287
  • [46] Development of the Burden of Prior Authorization of Psychotherapeutics (BoPAP) Scale to Assess the Effects of Prior Authorization Among Texas Medicaid Providers
    Brown, Carolyn M.
    Nwokeji, Esmond
    Rascati, Karen L.
    Zachry, Woodie
    Phillips, Glenn A.
    ADMINISTRATION AND POLICY IN MENTAL HEALTH AND MENTAL HEALTH SERVICES RESEARCH, 2009, 36 (04) : 278 - 287
  • [47] Public key encryption supporting plaintext equality test and user-specified authorization
    Tang, Qiang
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1351 - 1362
  • [48] Edge-based secure image denoising scheme supporting flexible user authorization
    Huang, Yibing
    Xu, Yongliang
    Cheng, Hang
    Chen, Fei
    Wang, Meiqing
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2024, 18
  • [49] UAQ: A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints
    Zhang, Yue
    Joshi, James B. D.
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 83 - 91
  • [50] Multi-User Authorization for Simultaneous Collaborative Situation Analysis Workspaces Using XACML
    Appenzeller, Arno
    Krempel, Erik
    Birnstill, Pascal
    Beyerer, Juergen
    COUNTERTERRORISM, CRIME FIGHTING, FORENSICS, AND SURVEILLANCE TECHNOLOGIES IV, 2020, 11542