This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission perfo...This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission performance in underwater environments.The proposed encryption approach provides strong confusion and diffusion properties and is evaluated over five Jerlov water types with different optical attenuation characteristics.Security analysis demonstrates that the encrypted images achieve information entropy values close to the ideal value of 8(7.9925–7.9993),with very low correlation coefficients in horizontal,vertical,and diagonal directions,as well as the system achieves high values in key metrics such as the Unified Average Changing Intensity(UACI)and Number of Pixel Change Rate(NPCR),ranging from 33.42 to 33.47 and from 99.58%to 99.62%,respectively,both near their theoretical optima.In addition to improving confidentiality,the hyperchaotic encryption process decorrelates pixel intensities and redistributes image spectral content,which enhances robustness against underwater absorption and scattering effects.As a result,improved transmission performance is observed;for example,in Jerlov type I(JI)water,the effective transmission distance is extended from16mfor plain images to 24mfor encrypted images,while the Peak Signal to Noise Ratio(PSNR)at 24 m increases from 9.25 to 20.13 dB after decryption and enhancement.These results confirmthat the proposed scheme provides a dual benefit of secure and reliable image transmission in UOWC systems.展开更多
The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphert...The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphertext attack. The encryption systems based on chaotic synchronization do not have high privacy.展开更多
With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security pr...With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs.展开更多
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption S...Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level.展开更多
Big data cloud platforms provide users with on-demand configurable computing,storage resources to users,thus involving a large amount of user data.However,most of the data is processed and stored in plaintext,resultin...Big data cloud platforms provide users with on-demand configurable computing,storage resources to users,thus involving a large amount of user data.However,most of the data is processed and stored in plaintext,resulting in data leakage.At the same time,simple encrypted storage ensures the confidentiality of the cloud data,but has the following problems:if the encrypted data is downloaded to the client and then decrypted,the search efficiency will be low.If the encrypted data is decrypted and searched on the server side,the security will be reduced.Data availability is finally reduced,and indiscriminate protection measures make the risk of data leakage uncontrollable.To solve the problems,based on searchable encryption and key derivation,a cipher search system is designed in this paper considering both data security and availability,and the use of a search encryption algorithm that supports dynamic update is listed.Moreover,the system structure has the advantage of adapting different searchable encryption algorithm.In particular,a user-centered key derivation mechanism is designed to realize file-level fine-grained encryption.Finally,extensive experiment and analysis show that the scheme greatly improves the data security of big data platform.展开更多
In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms, which may lead to periodicity in chaotic sequences, the chaos long ...In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms, which may lead to periodicity in chaotic sequences, the chaos long short-term memory(Chaos-LSTM) model is constructed by combining chaotic systems with LSTM neural networks. The chaos sequence proliferation(CSP) algorithm is constructed to address the problem that the limited computational accuracy of computers can lead to periodicity in long chaotic sequences, making them unsuitable for encrypting objects with large amounts of data. By combining the Chaos-LSTM model and CSP algorithm, a geographic information encryption system is proposed. First, the Chaos-LSTM model is used to output chaotic sequences with high spectral entropy(SE) complexity. Then, a shorter chaotic sequence is selected and proliferated using the CSP algorithm to generate chaotic proliferation sequences that match the encrypted object;a randomness analysis is conducted and testing is performed on it. Finally, using geographic images as encryption objects, the chaotic proliferation sequence, along with the scrambling and diffusion algorithms, are combined to form the encryption system, which is implemented on the ZYNQ platform. The system's excellent confidentiality performance and scalability are proved by software testing and hardware experiments, making it suitable for the confidentiality peers of various encryption objects with outstanding application value.展开更多
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica...Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications.展开更多
In secure communications,lightweight encryption has become crucial,particularly for resource-constrained applications such as embedded devices,wireless sensor networks,and the Internet of Things(IoT).As these systems ...In secure communications,lightweight encryption has become crucial,particularly for resource-constrained applications such as embedded devices,wireless sensor networks,and the Internet of Things(IoT).As these systems proliferate,cryptographic approaches that provide robust security while minimizing computing overhead,energy consumption,and memory usage are becoming increasingly essential.This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission.Two algorithms are proposed,both employing the Logistic map;the first approach utilizes two logistic chaotic maps,while the second algorithm employs a single logistic chaotic map.Algorithm 1,including a two-stage mechanism that uses chaotic maps for both transposition and key generation,is distinguished by its robustness,guaranteeing a secure encryption method.The second techniqueutilized a single logistic chaoticmapeliminating the secondchaoticmapdecreases computing complexity while maintaining security.The efficacy of both algorithms was evaluated by subjecting them to NIST randomness tests following testing on text files of varying sizes.The findings demonstrate that the double chaotic map method regularly achieves elevated unpredictability and resilience.Conversely,the singular chaotic algorithm markedly lowers the duration necessary for encryption and decryption.These data suggest that while both algorithms are effective,their choice may be contingent upon specific security and processing speed requirements in practical applications.展开更多
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt...Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.展开更多
Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabli...Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.展开更多
Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are deterministic.With the same key and same plaintext,the deterministic algorithm will ...Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are deterministic.With the same key and same plaintext,the deterministic algorithm will lead to the same ciphertext.This means that the key in the deterministic encryption algorithm can only be used once,thus the encryption is not practical.To solve this problem,a nondeterministic symmetric encryption end-to-end communication system based on generative adversarial networks is proposed.We design a nonce-based adversarial neural network model,where a“nonce”standing for“number used only once”is passed to communication participants,and does not need to be secret.Moreover,we optimize the network structure through adding Batch Normalization(BN)to the CNNs(Convolutional Neural Networks),selecting the appropriate activation functions,and setting appropriate CNNs parameters.Results of experiments and analysis show that our system can achieve non-deterministic symmetric encryption,where Alice encrypting the same plaintext with the key twice will generate different ciphertexts,and Bob can decrypt all these different ciphertexts of the same plaintext to the correct plaintext.And our proposed system has fast convergence and the correct rate of decryption when the plaintext length is 256 or even longer.展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystem...Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystems.However,the recently developed EC based algorithms usually trade off between computational efficiency and security,necessitating the design of a new algorithm with the desired cryptographic strength.To address these shortcomings,this paper proposes a new scheme based onMordell elliptic curve(MEC)over the complex field for generating distinct,dynamic,and highly uncorrelated S-boxes.Furthermore,we count the exact number of the obtained S-boxes,and demonstrate that the permuted version of the presented S-box is statistically optimal.The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored.Rigorous theoretical analysis and experimental results demonstrate that the proposedmethod is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties,surpassing current state-of-the-art S-box generation algorithms in terms of security.Apart fromthis,the generated S-box is benchmarked using side-channel attacks,and its performance is compared with highly nonlinear S-boxes,demonstrating comparable results.In addition,we present an application of our proposed S-box generator by incorporating it into an image encryption technique.The encrypted and decrypted images are tested by employing extensive standard security metrics,including the Number of Pixel Change Rate,the Unified Average Changing Intensity,information entropy,correlation coefficient,and histogram analysis.Moreover,the analysis is extended beyond conventional metrics to validate the new method using advanced tests,such as the NIST statistical test suite,robustness analysis,and noise and cropping attacks.Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks.展开更多
With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption ar...With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption are urgently required.This study presents a bio-inspired hierarchical composite foam fabricated using supercritical nitrogen foaming technology.This material exhibits a honeycomb structure,with pore cell sizes controllable within a range of 30–92μm by regulating the filler.The carbon fiber felt(CFf)provides efficient reflection of electromagnetic waves,while the chloroprene rubber/carbon fiber/carbon black foam facilitates both wave absorption and temperature monitoring through its optimized conductive network.This synergistic mechanism results in an EMI shielding effectiveness(SE)of 60.06 d B with excellent temperature sensing performance(The temperature coefficient of resistance(TCR)is-2.642%/℃)in the 24–70℃ range.Notably,the material has a thermal conductivity of up to 0.159 W/(m·K),and the bio-inspired layered design enables information encryption,demonstrating the material's potential for secure communication applications.The foam also has tensile properties of up to 5.13 MPa and a tear strength of 33.02 N/mm.This biomimetic design overcomes the traditional limitations of flexible materials and provides a transformative solution for next-generation applications such as flexible electronics,aerospace systems and military equipment,which urgently need integrated electromagnetic protection,thermal management and information security.展开更多
Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a piv...Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a pivotal role in maintaining security.However,existing key revocation mechanisms face two major challenges:(1)High overhead due to ciphertext and key updates,primarily stemming from the reliance on revocation lists during attribute revocation,which increases computation and communication costs.(2)Limited universality,as many attribute revocation mechanisms are tailored to specific ABE constructions,restricting their broader applicability.To address these challenges,we propose LUAR(Lightweight and Universal Attribute Revocation),a novel revocation mechanism that leverages Intel Software Guard Extensions(SGX)while minimizing its inherent limitations.Given SGX’s constrained memory(≈90 MB in a personal computer)and susceptibility to side-channel attacks,we carefully manage its usage to reduce reliance while mitigating potential collusion risks between cloud service providers and users.To evaluate LUAR’s lightweight and universality,we integrate it with the classic BSW07 scheme,which can be seamlessly replaced with other ABE constructions.Experimental results demonstrate that LUAR enables secure attribute revocation with low computation and communication overhead.The processing time within the SGX environment remains stable at approximately 55 ms,regardless of the complexity of access policies,ensuring no additional storage or computational burden on SGX.Compared to the Hardware-based Revocable Attribute-Based Encryption(HR-ABE)scheme(IEEE S&P 2024),LUAR incurs a slightly higher computational cost within SGX;however,the overall time from initiating a data request to obtaining plaintext is shorter.As access policies grow more complex,LUAR’s advantages become increasingly evident,showcasing its superior efficiency and broader applicability.展开更多
The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently...The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks.展开更多
Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond...Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.展开更多
The rapid development of brain-like neural networks and secure data transmission technologies has placed greater demands on highly complex neural network systems and highly secure encryption methods.To this end,the pa...The rapid development of brain-like neural networks and secure data transmission technologies has placed greater demands on highly complex neural network systems and highly secure encryption methods.To this end,the paper proposes a novel high-dimensional memristor synapse-coupled hyperchaotic neural network by using the designed memristor as the synapse to connect an inertial neuron(IN)and a Hopfield neural network(HNN).By using numerical tools including bifurcation plots,phase plots,and basins of attraction,it is found that the dynamics of this system are closely related to the memristor coupling strength,self-connection synaptic weights,and inter-connection synaptic weights,and it can exhibit excellent hyperchaotic behaviors and coexisting multi-stable patterns.Through PSIM circuit simulations,the complex dynamics of the coupled IN-HNN system are verified.Furthermore,a DNA-encoded encryption algorithm is given,which utilizes generated hyperchaotic sequences to achieve encoding,operation,and decoding of DNA.The results show that this algorithm possesses strong robustness against statistical attacks,differential attacks,and noise interference,and can effectively resist known/selected plaintext attacks.This work will provide new ideas for the modeling of large-scale brainlike neural networks and high-security image encryption.展开更多
Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes ...Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology.展开更多
The exploration of solvent-driven reversible structural transformation in clusters is crucial for advanced stimulus-responsive optical applications and understanding of structure-property relationships.Herein,we repor...The exploration of solvent-driven reversible structural transformation in clusters is crucial for advanced stimulus-responsive optical applications and understanding of structure-property relationships.Herein,we report a solvent-driven reversible trans-formation between two copper(I)clusters:[Cu(totp)(CH_(3)CN)_(3)][Cu_(2)I_(3)(totp)(DPPPy)]·CH_(3)CN 1 and Cu_(4)I_(4)(DPPPy)_(2)·0.5CH_(2)Cl_(2)2(totp=tri-o-tolylphosphine,DPPPy=2-[diphenylphosphino]pyridine).X-ray radioluminescence and encryption applications were studied based on structure-dependent photophysical properties difference.The noncovalent interaction-mediated space charge transition between isolated ion units of 1 enables more efficient thermally activated delayed fluorescence by reverse intersystem crossing,accounting for structure-dependent luminescence.Notably,compared to 2,1 exhibits a higher scintillation light yield of 14832 photons MeV^(-1),exceeding that of the commercial scintillator Bi_(4)Ge_(3)O_(12)(8000 photons MeV^(-1)),and a low X-ray detection limit of 22.49 nGy s^(-1),far below the typical diagnostic dose(5.5μGy s^(-1)).Furthermore,scintillating film fabricated by 1 achieves X-ray imaging with a high spatial resolution of 16 lp/mm.The reversible structural interconversion enables solvent-responsive luminescent switches,and thus,the dynamic encryption system capable of multistage decryption was developed.This work not only offers new insight into solvent-regulated clusters transformations but also provides a promising strategy for developing high-performance copper(I)clusters-based scintillators and stimulus-responsive optical devices.展开更多
基金funded by Prince Sattam bin Abdulaziz University,grant number PSAU/2025/01/34620.
文摘This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission performance in underwater environments.The proposed encryption approach provides strong confusion and diffusion properties and is evaluated over five Jerlov water types with different optical attenuation characteristics.Security analysis demonstrates that the encrypted images achieve information entropy values close to the ideal value of 8(7.9925–7.9993),with very low correlation coefficients in horizontal,vertical,and diagonal directions,as well as the system achieves high values in key metrics such as the Unified Average Changing Intensity(UACI)and Number of Pixel Change Rate(NPCR),ranging from 33.42 to 33.47 and from 99.58%to 99.62%,respectively,both near their theoretical optima.In addition to improving confidentiality,the hyperchaotic encryption process decorrelates pixel intensities and redistributes image spectral content,which enhances robustness against underwater absorption and scattering effects.As a result,improved transmission performance is observed;for example,in Jerlov type I(JI)water,the effective transmission distance is extended from16mfor plain images to 24mfor encrypted images,while the Peak Signal to Noise Ratio(PSNR)at 24 m increases from 9.25 to 20.13 dB after decryption and enhancement.These results confirmthat the proposed scheme provides a dual benefit of secure and reliable image transmission in UOWC systems.
文摘The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphertext attack. The encryption systems based on chaotic synchronization do not have high privacy.
文摘With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs.
基金Supported by the National Natural Science Foun-dation of China (60374008)
文摘Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level.
基金the Sichuan Science and Technology Program(2021JDRC0077)the Sichuan Province’s Key Research and Development Plan.“Distributed Secure StorageTechnology for Massive Sensitive Data”Project(2020YFG0298)Applied Basic Research Project of Sichuan Province(No.2018JY0370).
文摘Big data cloud platforms provide users with on-demand configurable computing,storage resources to users,thus involving a large amount of user data.However,most of the data is processed and stored in plaintext,resulting in data leakage.At the same time,simple encrypted storage ensures the confidentiality of the cloud data,but has the following problems:if the encrypted data is downloaded to the client and then decrypted,the search efficiency will be low.If the encrypted data is decrypted and searched on the server side,the security will be reduced.Data availability is finally reduced,and indiscriminate protection measures make the risk of data leakage uncontrollable.To solve the problems,based on searchable encryption and key derivation,a cipher search system is designed in this paper considering both data security and availability,and the use of a search encryption algorithm that supports dynamic update is listed.Moreover,the system structure has the advantage of adapting different searchable encryption algorithm.In particular,a user-centered key derivation mechanism is designed to realize file-level fine-grained encryption.Finally,extensive experiment and analysis show that the scheme greatly improves the data security of big data platform.
基金Project supported by the Open Topic of Hunan Engineering Research Center of Geographic Information Security and Application China (No. HNGISA2023005)。
文摘In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms, which may lead to periodicity in chaotic sequences, the chaos long short-term memory(Chaos-LSTM) model is constructed by combining chaotic systems with LSTM neural networks. The chaos sequence proliferation(CSP) algorithm is constructed to address the problem that the limited computational accuracy of computers can lead to periodicity in long chaotic sequences, making them unsuitable for encrypting objects with large amounts of data. By combining the Chaos-LSTM model and CSP algorithm, a geographic information encryption system is proposed. First, the Chaos-LSTM model is used to output chaotic sequences with high spectral entropy(SE) complexity. Then, a shorter chaotic sequence is selected and proliferated using the CSP algorithm to generate chaotic proliferation sequences that match the encrypted object;a randomness analysis is conducted and testing is performed on it. Finally, using geographic images as encryption objects, the chaotic proliferation sequence, along with the scrambling and diffusion algorithms, are combined to form the encryption system, which is implemented on the ZYNQ platform. The system's excellent confidentiality performance and scalability are proved by software testing and hardware experiments, making it suitable for the confidentiality peers of various encryption objects with outstanding application value.
基金funded by Deanship of Research and Graduate Studies at King Khalid University.The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Group Project under grant number(RGP.2/556/45).
文摘Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications.
文摘In secure communications,lightweight encryption has become crucial,particularly for resource-constrained applications such as embedded devices,wireless sensor networks,and the Internet of Things(IoT).As these systems proliferate,cryptographic approaches that provide robust security while minimizing computing overhead,energy consumption,and memory usage are becoming increasingly essential.This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission.Two algorithms are proposed,both employing the Logistic map;the first approach utilizes two logistic chaotic maps,while the second algorithm employs a single logistic chaotic map.Algorithm 1,including a two-stage mechanism that uses chaotic maps for both transposition and key generation,is distinguished by its robustness,guaranteeing a secure encryption method.The second techniqueutilized a single logistic chaoticmapeliminating the secondchaoticmapdecreases computing complexity while maintaining security.The efficacy of both algorithms was evaluated by subjecting them to NIST randomness tests following testing on text files of varying sizes.The findings demonstrate that the double chaotic map method regularly achieves elevated unpredictability and resilience.Conversely,the singular chaotic algorithm markedly lowers the duration necessary for encryption and decryption.These data suggest that while both algorithms are effective,their choice may be contingent upon specific security and processing speed requirements in practical applications.
基金supported by the National Natural Science Foundation of China(12471416,12171124,12301567)the Heilongjiang Provincial Natural Science Foundation of China(PL2024F015)+2 种基金the Postdoctoral Science Foundation of Heilongjiang Province of China(LBH-Z22199)the Fundamental Research Foun-dation for Universities of Heilongjiang Province of China(2022-KYYWF-0141)the Alexander von Humboldt Foundation of Germany.
文摘Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.
基金supported in part by the Major Science and Technology Projects in Yunnan Province(202202AD080013)King Khalid University for funding this work through Large Group Project under grant number RGP.2/373/45.
文摘Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.
基金supported by The National Defense Innovation Project(No.ZZKY20222411)Natural Science Basic Research Plan in Shaanxi Province of China(No.2024JC-YBMS-546).
文摘Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are deterministic.With the same key and same plaintext,the deterministic algorithm will lead to the same ciphertext.This means that the key in the deterministic encryption algorithm can only be used once,thus the encryption is not practical.To solve this problem,a nondeterministic symmetric encryption end-to-end communication system based on generative adversarial networks is proposed.We design a nonce-based adversarial neural network model,where a“nonce”standing for“number used only once”is passed to communication participants,and does not need to be secret.Moreover,we optimize the network structure through adding Batch Normalization(BN)to the CNNs(Convolutional Neural Networks),selecting the appropriate activation functions,and setting appropriate CNNs parameters.Results of experiments and analysis show that our system can achieve non-deterministic symmetric encryption,where Alice encrypting the same plaintext with the key twice will generate different ciphertexts,and Bob can decrypt all these different ciphertexts of the same plaintext to the correct plaintext.And our proposed system has fast convergence and the correct rate of decryption when the plaintext length is 256 or even longer.
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
文摘Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystems.However,the recently developed EC based algorithms usually trade off between computational efficiency and security,necessitating the design of a new algorithm with the desired cryptographic strength.To address these shortcomings,this paper proposes a new scheme based onMordell elliptic curve(MEC)over the complex field for generating distinct,dynamic,and highly uncorrelated S-boxes.Furthermore,we count the exact number of the obtained S-boxes,and demonstrate that the permuted version of the presented S-box is statistically optimal.The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored.Rigorous theoretical analysis and experimental results demonstrate that the proposedmethod is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties,surpassing current state-of-the-art S-box generation algorithms in terms of security.Apart fromthis,the generated S-box is benchmarked using side-channel attacks,and its performance is compared with highly nonlinear S-boxes,demonstrating comparable results.In addition,we present an application of our proposed S-box generator by incorporating it into an image encryption technique.The encrypted and decrypted images are tested by employing extensive standard security metrics,including the Number of Pixel Change Rate,the Unified Average Changing Intensity,information entropy,correlation coefficient,and histogram analysis.Moreover,the analysis is extended beyond conventional metrics to validate the new method using advanced tests,such as the NIST statistical test suite,robustness analysis,and noise and cropping attacks.Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks.
基金financially supported by the Natural Science Foundation of Shandong Province(No.ZR2024QE446)。
文摘With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption are urgently required.This study presents a bio-inspired hierarchical composite foam fabricated using supercritical nitrogen foaming technology.This material exhibits a honeycomb structure,with pore cell sizes controllable within a range of 30–92μm by regulating the filler.The carbon fiber felt(CFf)provides efficient reflection of electromagnetic waves,while the chloroprene rubber/carbon fiber/carbon black foam facilitates both wave absorption and temperature monitoring through its optimized conductive network.This synergistic mechanism results in an EMI shielding effectiveness(SE)of 60.06 d B with excellent temperature sensing performance(The temperature coefficient of resistance(TCR)is-2.642%/℃)in the 24–70℃ range.Notably,the material has a thermal conductivity of up to 0.159 W/(m·K),and the bio-inspired layered design enables information encryption,demonstrating the material's potential for secure communication applications.The foam also has tensile properties of up to 5.13 MPa and a tear strength of 33.02 N/mm.This biomimetic design overcomes the traditional limitations of flexible materials and provides a transformative solution for next-generation applications such as flexible electronics,aerospace systems and military equipment,which urgently need integrated electromagnetic protection,thermal management and information security.
基金support from the National Key Research and Development Program of China(Grant No.2021YFF0704102)the Chongqing Education Commission Key Project of Science and Technology Research(Grant No.KJZD-K202400610)the Chongqing Natural Science Foundation General Project(Grant No.CSTB2025NSCQ-GPX1263).
文摘Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a pivotal role in maintaining security.However,existing key revocation mechanisms face two major challenges:(1)High overhead due to ciphertext and key updates,primarily stemming from the reliance on revocation lists during attribute revocation,which increases computation and communication costs.(2)Limited universality,as many attribute revocation mechanisms are tailored to specific ABE constructions,restricting their broader applicability.To address these challenges,we propose LUAR(Lightweight and Universal Attribute Revocation),a novel revocation mechanism that leverages Intel Software Guard Extensions(SGX)while minimizing its inherent limitations.Given SGX’s constrained memory(≈90 MB in a personal computer)and susceptibility to side-channel attacks,we carefully manage its usage to reduce reliance while mitigating potential collusion risks between cloud service providers and users.To evaluate LUAR’s lightweight and universality,we integrate it with the classic BSW07 scheme,which can be seamlessly replaced with other ABE constructions.Experimental results demonstrate that LUAR enables secure attribute revocation with low computation and communication overhead.The processing time within the SGX environment remains stable at approximately 55 ms,regardless of the complexity of access policies,ensuring no additional storage or computational burden on SGX.Compared to the Hardware-based Revocable Attribute-Based Encryption(HR-ABE)scheme(IEEE S&P 2024),LUAR incurs a slightly higher computational cost within SGX;however,the overall time from initiating a data request to obtaining plaintext is shorter.As access policies grow more complex,LUAR’s advantages become increasingly evident,showcasing its superior efficiency and broader applicability.
文摘The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks.
基金supported by the National Natural Science Foundation of China(62303353,62273030,62573320)。
文摘Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.
基金Project supported by the Training Plan of Young Backbone Teachers in Universities of Henan Province(Grant No.2023GGJS142)the Key Scientific Research of Colleges and Universities in Henan Province,China(Grant No.25A120009)+1 种基金Changzhou Leading Innovative Talent Introduction and Cultivation Project(Grant No.CQ20240102)Changzhou Applied Basic Research Program(Grant No.CJ20253065)。
文摘The rapid development of brain-like neural networks and secure data transmission technologies has placed greater demands on highly complex neural network systems and highly secure encryption methods.To this end,the paper proposes a novel high-dimensional memristor synapse-coupled hyperchaotic neural network by using the designed memristor as the synapse to connect an inertial neuron(IN)and a Hopfield neural network(HNN).By using numerical tools including bifurcation plots,phase plots,and basins of attraction,it is found that the dynamics of this system are closely related to the memristor coupling strength,self-connection synaptic weights,and inter-connection synaptic weights,and it can exhibit excellent hyperchaotic behaviors and coexisting multi-stable patterns.Through PSIM circuit simulations,the complex dynamics of the coupled IN-HNN system are verified.Furthermore,a DNA-encoded encryption algorithm is given,which utilizes generated hyperchaotic sequences to achieve encoding,operation,and decoding of DNA.The results show that this algorithm possesses strong robustness against statistical attacks,differential attacks,and noise interference,and can effectively resist known/selected plaintext attacks.This work will provide new ideas for the modeling of large-scale brainlike neural networks and high-security image encryption.
基金supported by the National Natural Science Foundation of China(62376106)The Science and Technology Development Plan of Jilin Province(20250102212JC).
文摘Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology.
基金supported by the National Natural Science Foundation of China(21971240 and 22271283)the Natural Science Foundation of Shandong Province(ZR2025QC1361)。
文摘The exploration of solvent-driven reversible structural transformation in clusters is crucial for advanced stimulus-responsive optical applications and understanding of structure-property relationships.Herein,we report a solvent-driven reversible trans-formation between two copper(I)clusters:[Cu(totp)(CH_(3)CN)_(3)][Cu_(2)I_(3)(totp)(DPPPy)]·CH_(3)CN 1 and Cu_(4)I_(4)(DPPPy)_(2)·0.5CH_(2)Cl_(2)2(totp=tri-o-tolylphosphine,DPPPy=2-[diphenylphosphino]pyridine).X-ray radioluminescence and encryption applications were studied based on structure-dependent photophysical properties difference.The noncovalent interaction-mediated space charge transition between isolated ion units of 1 enables more efficient thermally activated delayed fluorescence by reverse intersystem crossing,accounting for structure-dependent luminescence.Notably,compared to 2,1 exhibits a higher scintillation light yield of 14832 photons MeV^(-1),exceeding that of the commercial scintillator Bi_(4)Ge_(3)O_(12)(8000 photons MeV^(-1)),and a low X-ray detection limit of 22.49 nGy s^(-1),far below the typical diagnostic dose(5.5μGy s^(-1)).Furthermore,scintillating film fabricated by 1 achieves X-ray imaging with a high spatial resolution of 16 lp/mm.The reversible structural interconversion enables solvent-responsive luminescent switches,and thus,the dynamic encryption system capable of multistage decryption was developed.This work not only offers new insight into solvent-regulated clusters transformations but also provides a promising strategy for developing high-performance copper(I)clusters-based scintillators and stimulus-responsive optical devices.