Add like
Add dislike
Add to saved papers

A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures.

Advanced Materials 2024 Februrary 20
User authentication is one of the most critical aspects within any information exchange system and encompasses the process of verifying the identity of individuals seeking access to sensitive information. Conventionally, this verification process has relied on establishing robust and secure digital signature protocols employing asymmetric encryption techniques which effectively address the vulnerabilities inherent to symmetric encryption methods that necessitate sharing and reuse of the secret key. In this article, we present a comprehensive hardware-based digital signature platform constructed using integrated circuits (ICs) with atomically thin two-dimensional (2D) monolayer molybdenum disulfide (MoS2 ) memtransistors. First, we demonstrate generation of secure and robust cryptographic keys by exploiting the inherent stochasticity of carrier trapping and detrapping at the 2D/oxide interface trap sites as the source of randomness. Subsequently, we leverage the capability of manipulating the functionality of logical NOR through localized programming of MoS2 memtransistor to create a secure one-way hash function which when homomorphically operated upon with NAND, XOR, OR, NOT, and AND logic circuits generate distinct and secure signatures. These signatures are subsequently decrypted to verify the authenticity of the receiver while ensuring complete preservation of data integrity and confidentiality as the underlying information is never revealed. Finally, we provide an insight on the advantages of implementing NOR based hashing techniques in comparison to the conventional XOR based encryption method. Our demonstration highlights the potential of 2D-based ICs in advancing the development of critical information security primitives. This article is protected by copyright. All rights reserved.

Full text links

We have located links that may give you full text access.
Can't access the paper?
Try logging in through your university/institutional subscription. For a smoother one-click institutional access experience, please use our mobile app.

Related Resources

For the best experience, use the Read mobile app

Mobile app image

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app

All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.

By using this service, you agree to our terms of use and privacy policy.

Your Privacy Choices Toggle icon

You can now claim free CME credits for this literature searchClaim now

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app