Matrix‐Free and Highly Efficient Room‐Temperature Phosphorescence Carbon Dots towards Information Encryption and Decryption
Designing efficient room‐temperature phosphorescence (RTP) carbon dots (C‐dots) without the need of an additional matrix is important for various applications. Herein, matrix‐free and highly efficient C‐dots with yellow‐green RTP emission have been successfully synthesized towards information encryp...
Saved in:
Published in | Chemistry, an Asian journal Vol. 15; no. 8; pp. 1281 - 1284 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Germany
Wiley Subscription Services, Inc
17.04.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Designing efficient room‐temperature phosphorescence (RTP) carbon dots (C‐dots) without the need of an additional matrix is important for various applications. Herein, matrix‐free and highly efficient C‐dots with yellow‐green RTP emission have been successfully synthesized towards information encryption and decryption. Phytic acid (PA) and triethylenetetramine are used as molecular precursors, and a facile microwave‐assisted heating method is selected as synthesis method. The obtained C‐dots exhibit a maximum phosphorescence emission at around 535 nm under an excitation wavelength of 365 nm and a long average lifetime up to 750 ms (more than 9 s to the naked eye). PA containing six phosphate groups and serving as P source plays a significant role in producing the RTP C‐dots. Furthermore, potential applications of the RTP C‐dots in the field of information encryption and decryption are successfully demonstrated.
Matrix‐free and highly efficient C‐dots with yellow‐green room‐temperature phosphorescence emission and a long lifetime up to 750 ms (more than 9 s to the naked eye) have been successfully synthesized by selecting phytic acid with six phosphate groups and triethylenetetramine as molecular precursors via a facile microwave‐assisted heating method. Potential applications in information encryption and decryption are demonstrated. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 1861-4728 1861-471X |
DOI: | 10.1002/asia.202000063 |