A pH-regulated camouflage strategy for access control in molecular systems

Abstract

Continuous advancements in DNA nanotechnology have resulted in innovative information security strategies utilizing biomolecular-based encryption mechanisms to achieve effective protection and reliable storage. However, existing molecular encryption schemes are limited in their practical expansion due to their focus on the precise design and strict management of the key itself while neglecting the impact of complex environments, causing them to suffer from insufficient concealment and poor adaptability to complex access control scenarios. Here, we propose a pH-regulated camouflage strategy that significantly enhances the encryption concealment of molecular systems. Using pH-regulated logical operation transformations, we establish a switchable cascaded logic operation strategy that implements a two-layer DNA molecular firewall access control system. By integrating two distinct camouflage rules, the system constructs four differentiated access modes. This design effectively prevents unauthorized access, conceals true input addresses, and deceives potential attackers, thereby ensuring internal information security. This approach provides a simple method for the design and management of molecular systems and is expected to be applied in fields such as information security and environmental monitoring.

Graphical abstract: A pH-regulated camouflage strategy for access control in molecular systems

Supplementary files

Article information

Article type
Communication
Submitted
28 Dec 2025
Accepted
25 Feb 2026
First published
27 Mar 2026

Nanoscale Horiz., 2026, Advance Article

A pH-regulated camouflage strategy for access control in molecular systems

D. Tian, P. Shi, X. Zhang, L. Sun, B. Wang and Q. Zhang, Nanoscale Horiz., 2026, Advance Article , DOI: 10.1039/D5NH00848D

To request permission to reproduce material from this article, please go to the Copyright Clearance Center request page.

If you are an author contributing to an RSC publication, you do not need to request permission provided correct acknowledgement is given.

If you are the author of this article, you do not need to request permission to reproduce figures and diagrams provided correct acknowledgement is given. If you want to reproduce the whole article in a third-party publication (excluding your thesis/dissertation for which permission is not required) please go to the Copyright Clearance Center request page.

Read more about how to correctly acknowledge RSC content.

Social activity

Spotlight

Advertisements