Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Abstract NaCl has widely been used as a seeding promoter for chemical vapor deposition of large-scale 2D transition metal dichalcogenides. In this work, we report a study of the influence of NaCl on the growth and optical properties of layered CVD-grown WS2using steady-state and time-resolved Kerr rotation measurements at room temperature. Strong photoluminescence (PL) signals from single flakes grown with a low NaCl content indicates direct band-gap emission, whereas flakes grown with higher amounts of NaCl exhibit red-shifted, weaker PL. Raman measurements from single flakes also indicate that WS2grown with higher NaCl amounts result in multilayered structures, while lower NaCl quantities yield monolayer WS2. Ultrafast carrier decay measurements from single flakes also indicate a NaCl-dependent on the valley exchange interaction component (<10 ps) and slower decay components (>50 ps), attributed to a combination of phenomena, such as the band gap transitioning from direct to indirect and defect-related localized states. Our study provides insight into the influence of seeding promoters in layered CVD-grown WS2in particular and 2D transition metal dichalcogenides in general.more » « lessFree, publicly-accessible full text available August 20, 2026
-
Tellurium is a heavy chemical element exhibiting chirality, anisotropy, and strong spin-orbit coupling; conse quently, displaying a huge potential in quantum hardware technologies. In this article, tellurium quantum dots, with sizes around 19 ± 3 nm and energy bandgap around 2.4 eV, were successfully synthesized by pulsed laser ablation in liquids (PLAL). The synthesis was performed by using a nanosecond Nd:YAG laser emitting at 1064 nm and pulsing the laser beam at 1 kHz. Toluene (C6H5CH3) was used as a solvent to avoid oxidation of the dots. Non-polarized and polarized Raman spectroscopy as well as X-Ray diffraction were performed on the dots to study their quantum confinement and anisotropy. Finally, strongly confined tellurium quantum dots were obtained; and, their properties underline their potential as quantum light sources.more » « lessFree, publicly-accessible full text available June 1, 2026
-
In this paper, we propose a new secure machine learning inference platform assisted by a small dedicated security processor, which will be easier to protect and deploy compared to today's TEEs integrated into high-performance processors. Our platform provides three main advantages over the state-of-the-art: (i) We achieve significant performance improvements compared to state-of-the-art distributed Privacy-Preserving Machine Learning (PPML) protocols, with only a small security processor that is comparable to a discrete security chip such as the Trusted Platform Module (TPM) or on-chip security subsystems in SoCs similar to the Apple enclave processor. In the semi-honest setting with WAN/GPU, our scheme is 4X-63X faster than Falcon (PoPETs'21) and AriaNN (PoPETs'22) and 3.8X-12X more communication efficient. We achieve even higher performance improvements in the malicious setting. (ii) Our platform guarantees security with abort against malicious adversaries under honest majority assumption. (iii) Our technique is not limited by the size of secure memory in a TEE and can support high-capacity modern neural networks like ResNet18 and Transformer. While previous work investigated the use of high-performance TEEs in PPML, this work represents the first to show that even tiny secure hardware with very limited performance can be leveraged to significantly speed-up distributed PPML protocols if the protocol can be carefully designed for lightweight trusted hardware.more » « less
-
Dynamic Searchable Symmetric Encryption (DSSE) provides efficient techniques for securely searching and updating an encrypted database. However, efficient DSSE schemes leak some sensitive information to the server. Recent works have implemented forward and backward privacy as security properties to reduce the amount of information leaked during update operations. Many attacks have shown that leakage from search operations can be abused to compromise the privacy of client queries. However, the attack literature has not rigorously investigated techniques to abuse update leakage. In this work, we investigate update leakage under DSSE schemes with forward and backward privacy from the perspective of a passive adversary. We propose two attacks based on a maximum likelihood estimation approach, the UFID Attack and the UF Attack, which target forward-private DSSE schemes with no backward privacy and Level 2 backward privacy, respectively. These are the first attacks to show that it is possible to leverage the frequency and contents of updates to recover client queries. We propose a variant of each attack which allows the update leakage to be combined with search pattern leakage to achieve higher accuracy. We evaluate our attacks against a real-world dataset and show that using update leakage can improve the accuracy of attacks against DSSE schemes, especially those without backward privacy.more » « less
-
In recent years, there has been a heightened interest in the self-assembly of nanoparticles (NPs) that is mediated by their adsorption onto lipid membranes. The interplay between the adhesive energy of NPs on a lipid membrane and the membrane’s curvature energy causes it to wrap around the NPs. This results in an interesting membrane curvature-mediated interaction, which can lead to the self-assembly of NPs on lipid membranes. Recent studies have demonstrated that Janus spherical NPs, which adhere to lipid vesicles, can self-assemble into well-ordered nanoclusters with various geometries, including a few Platonic solids. The present study explores the additional effect of geometric anisotropy on the self-assembly of Janus NPs on lipid vesicles. Specifically, the current study utilized extensive molecular dynamics simulations to investigate the arrangement of Janus spherocylindrical NPs on lipid vesicles. We found that the additional geometric anisotropy significantly expands the range of NPs’ self-assemblies on lipid vesicles. The specific geometries of the resulting nanoclusters depend on several factors, including the number of Janus spherocylindrical NPs adhering to the vesicle and their aspect ratio. The lipid membrane-mediated self-assembly of NPs, demonstrated by this work, provides an alternative cost-effective route for fabricating highly engineered nanoclusters in three dimensions. Such structures, with the current wide range of material choices, have great potential for advanced applications, including biosensing, bioimaging, drug delivery, nanomechanics, and nanophotonicsmore » « less
-
Storage-as-a-service (STaaS) permits the client to outsource her data to the cloud, thereby reducing data management and maintenance costs. However, STaaS also brings significant data integrity and soundness concerns since the storage provider might not keep the client data intact and retrievable all the time (e.g., cost saving via deletions). Proof of Retrievability (PoR) can validate the integrity and retrievability of remote data effectively. This technique can be useful for regular audits to monitor data compromises, as well as to comply with standard data regulations. In particular, cold storage applications (e.g., MS Azure, Amazon Glacier) require regular and frequent audits with less frequent data modification. Yet, despite their merits, existing PoR techniques generally focus on other metrics (e.g., low storage, fast update, metadata privacy) but not audit efficiency (e.g., low audit time, small proof size). Hence, there is a need to develop new PoR techniques that achieve efficient data audit while preserving update and retrieval performance. In this paper, we propose Porla, a new PoR framework that permits efficient data audit, update, and retrieval functionalities simultaneously. Porla permits data audit in both private and public settings, each of which features asymptotically (and concretely) smaller audit-proof size and lower audit time than all the prior works while retaining the same asymptotic data update overhead. Porla achieves all these properties by composing erasure codes with verifiable computation techniques which, to our knowledge, is a new approach to PoR design. We address several challenges that arise in such a composition by creating a new homomorphic authenticated commitment scheme, which can be of independent interest. We fully implemented Porla and evaluated its performance on commodity cloud (i.e., Amazon EC2) under various settings. Experimental results demonstrated that Porla achieves two to four orders of magnitude smaller audit proof size with 4x–18000x lower audit time than all prior schemes in both private and public audit settings at the cost of only 2x–3x slower update.more » « less
-
End-to-end encrypted file-sharing systems enable users to share files without revealing the file contents to the storage servers. However, the servers still learn metadata, including user identities and access patterns. Prior work tried to remove such leakage but relied on strong assumptions. Metal (NDSS '20) is not secure against malicious servers. MCORAM (ASIACRYPT '20) provides confidentiality against malicious servers, but not integrity. Titanium is a metadata-hiding file-sharing system that offers confidentiality and integrity against malicious users and servers. Compared with MCORAM, which offers confidentiality against malicious servers, Titanium also offers integrity. Experiments show that Titanium is 5x-200x faster or more than MCORAM.more » « less
-
Proof-of-Work (PoW) is one of the fundamental and widely-used consensus algorithms in blockchains. In PoW, nodes compete to receive the mining reward by trying to be the first to solve a puzzle. Despite its fairness and wide availability, traditional PoW incurs extreme computational and energy waste over the blockchain. This waste is considered to be one of the biggest problems in PoW-based blockchains and cryptocurrencies. In this work, we propose a new useful PoW called Proof-of-Useful-Randomness (PoUR) that mitigates the energy waste by incorporating pre-computed (disclosable) randomness into the PoW. The key idea is to inject special randomness into puzzles via algebraic commitments that can be stored and later disclosed. Unlike the traditional wasteful PoWs, our approach enables pre-computed commitments to be utilized by a vast array of public-key cryptography methods that require offline-online processing (e.g., digital signature, key exchange, zero-knowledge protocol). Moreover, our PoW preserves the desirable properties of the traditional PoW and therefore does not require a substantial alteration in the underlying protocol. We showed the security of our PoW, and then fully implemented it to validate its significant energy-saving capabilities.more » « less
An official website of the United States government
