A method for implementing a secret sharing scheme at the molecular level is presented. By creating molecular code generators that are self‐assembled from several molecular components, we established a means for distributing distinct code‐activating elements among several participants. In this way, an authorization code can only be generated when all the participants are present, which ensures that highly secured systems cannot be operated by unauthorized individuals or disloyal users. Additional layers of protection result from the ability to program the security code by replacing one or several molecular components and by subjecting the system to distinct chemical inputs.
Electronic user authorization systems help us maintain our privacy in many aspects of everyday life. However, the increasing difficulty to secure access and/or information digitally has inspired chemists to devise alternative, molecular approaches, in which users are identified by chemical means. The potential advantages of using molecular user authentication systems over conventional electronic devices are their versatility and unusual operating principles, which complicate replicating and, consequently, breaking into molecular security devices. Their molecular scale is another unique property that enables hiding such systems and, consequently, applying steganography as an additional layer of protection. Although the area of molecular‐based user authorization is still in its infancy, the development of various molecular keypad locks and, more recently, a password‐protected molecular cryptographic machine, indicate the possibility of protecting information at the molecular scale.
A method for implementing a secret sharing scheme at the molecular level is presented. By creating molecular code generators that are self‐assembled from several molecular components, we established a means for distributing distinct code‐activating elements among several participants. In this way, an authorization code can only be generated when all the participants are present, which ensures that highly secured systems cannot be operated by unauthorized individuals or disloyal users. Additional layers of protection result from the ability to program the security code by replacing one or several molecular components and by subjecting the system to distinct chemical inputs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.