Unitary reconstruction of secret for stabilizer-based quantum secret sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
2017-08-01
We propose a unitary procedure to reconstruct quantum secret for a quantum secret sharing scheme constructed from stabilizer quantum error-correcting codes. Erasure correcting procedures for stabilizer codes need to add missing shares for reconstruction of quantum secret, while unitary reconstruction procedures for certain class of quantum secret sharing are known to work without adding missing shares. The proposed procedure also works without adding missing shares.
Threshold multi-secret sharing scheme based on phase-shifting interferometry
NASA Astrophysics Data System (ADS)
Deng, Xiaopeng; Wen, Wei; Shi, Zhengang
2017-03-01
A threshold multi-secret sharing scheme is proposed based on phase-shifting interferometry. The K secret images to be shared are firstly encoded by using Fourier transformation, respectively. Then, these encoded images are shared into many shadow images based on recording principle of the phase-shifting interferometry. In the recovering stage, the secret images can be restored by combining any 2 K + 1 or more shadow images, while any 2 K or fewer shadow images cannot obtain any information about the secret images. As a result, a (2 K + 1 , N) threshold multi-secret sharing scheme can be implemented. Simulation results are presented to demonstrate the feasibility of the proposed method.
NASA Astrophysics Data System (ADS)
Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen
2017-10-01
A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.
Secret sharing based on quantum Fourier transform
NASA Astrophysics Data System (ADS)
Yang, Wei; Huang, Liusheng; Shi, Runhua; He, Libao
2013-07-01
Secret sharing plays a fundamental role in both secure multi-party computation and modern cryptography. We present a new quantum secret sharing scheme based on quantum Fourier transform. This scheme enjoys the property that each share of a secret is disguised with true randomness, rather than classical pseudorandomness. Moreover, under the only assumption that a top priority for all participants (secret sharers and recovers) is to obtain the right result, our scheme is able to achieve provable security against a computationally unbounded attacker.
Nonlinear secret image sharing scheme.
Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young
2014-01-01
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.
Nonlinear Secret Image Sharing Scheme
Shin, Sang-Ho; Yoo, Kee-Young
2014-01-01
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2m⌉ bit-per-pixel (bpp), respectively. PMID:25140334
Quantum secret sharing with identity authentication based on Bell states
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
A Secret 3D Model Sharing Scheme with Reversible Data Hiding Based on Space Subdivision
NASA Astrophysics Data System (ADS)
Tsai, Yuan-Yu
2016-03-01
Secret sharing is a highly relevant research field, and its application to 2D images has been thoroughly studied. However, secret sharing schemes have not kept pace with the advances of 3D models. With the rapid development of 3D multimedia techniques, extending the application of secret sharing schemes to 3D models has become necessary. In this study, an innovative secret 3D model sharing scheme for point geometries based on space subdivision is proposed. Each point in the secret point geometry is first encoded into a series of integer values that fall within [0, p - 1], where p is a predefined prime number. The share values are derived by substituting the specified integer values for all coefficients of the sharing polynomial. The surface reconstruction and the sampling concepts are then integrated to derive a cover model with sufficient model complexity for each participant. Finally, each participant has a separate 3D stego model with embedded share values. Experimental results show that the proposed technique supports reversible data hiding and the share values have higher levels of privacy and improved robustness. This technique is simple and has proven to be a feasible secret 3D model sharing scheme.
Entanglement-secured single-qubit quantum secret sharing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scherpelz, P.; Resch, R.; Berryrieser, D.
In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less
Threshold quantum secret sharing based on single qubit
NASA Astrophysics Data System (ADS)
Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue
2018-03-01
Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
We show a simple example of a secret sharing scheme encoding classical secret to quantum shares that can realize an access structure impossible by classical information processing with limitation on the size of each share. The example is based on quantum stabilizer codes.
Threshold secret sharing scheme based on phase-shifting interferometry.
Deng, Xiaopeng; Shi, Zhengang; Wen, Wei
2016-11-01
We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.
A Note on Threshold Schemes with Disenrollment
2003-01-01
such a way that t or more participants can construct the secret by pooling their shares, but the secret remains undetermined to (t − 1) or fewer par...the threshold size t by 1, because (t− 1) shares plus the disclosed share can decrypt the secret . To keep the same level of secrecy in terms of...t. (2) In a (t, n) threshold scheme, the secret K is recoverable from t or more shares based on condition (1), but the secret remains uncertain even
Sagnac secret sharing over telecom fiber networks.
Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed
2009-01-19
We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.
Optical threshold secret sharing scheme based on basic vector operations and coherence superposition
NASA Astrophysics Data System (ADS)
Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen
2015-04-01
We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.
Unconditional security of entanglement-based continuous-variable quantum secret sharing
NASA Astrophysics Data System (ADS)
Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo
2017-01-01
The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.
Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation
NASA Astrophysics Data System (ADS)
Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min
2016-05-01
In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. PMID:27792784
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.
Quantum secret sharing for a general quantum access structure
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Si, Meng-Meng; Li, Yong-Ming
2017-10-01
Quantum secret sharing is a procedure for sharing a secret among a number of participants such that only certain subsets of participants can collaboratively reconstruct it, which are called authorized sets. The quantum access structure of a secret sharing is a family of all authorized sets. Firstly, in this paper, we propose the concept of decomposition of quantum access structure to design a quantum secret sharing scheme. Secondly, based on a maximal quantum access structure (MQAS) [D. Gottesman, Phys. Rev. A 61, 042311 (2000)], we propose an algorithm to improve a MQAS and obtain an improved maximal quantum access structure (IMQAS). Then, we present a sufficient and necessary condition about IMQAS, which shows the relationship between the minimal authorized sets and the players. In accordance with properties, we construct an efficient quantum secret sharing scheme with a decomposition and IMQAS. A major advantage of these techniques is that it allows us to construct a method to realize a general quantum access structure. Finally, we present two kinds of quantum secret sharing schemes via the thought of concatenation or a decomposition of quantum access structure. As a consequence, we find that the application of these techniques allows us to save more quantum shares and reduces more cost than the existing scheme.
Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue; Wang, Dong
2018-03-01
In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
NASA Astrophysics Data System (ADS)
Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta
2017-08-01
This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.
Computing on quantum shared secrets
NASA Astrophysics Data System (ADS)
Ouyang, Yingkai; Tan, Si-Hui; Zhao, Liming; Fitzsimons, Joseph F.
2017-11-01
A (k ,n )-threshold secret-sharing scheme allows for a string to be split into n shares in such a way that any subset of at least k shares suffices to recover the secret string, but such that any subset of at most k -1 shares contains no information about the secret. Quantum secret-sharing schemes extend this idea to the sharing of quantum states. Here we propose a method of performing computation securely on quantum shared secrets. We introduce a (n ,n )-quantum secret sharing scheme together with a set of algorithms that allow quantum circuits to be evaluated securely on the shared secret without the need to decode the secret. We consider a multipartite setting, with each participant holding a share of the secret. We show that if there exists at least one honest participant, no group of dishonest participants can recover any information about the shared secret, independent of their deviations from the algorithm.
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Li-Ping
2010-11-01
We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.
Graph State-Based Quantum Secret Sharing with the Chinese Remainder Theorem
NASA Astrophysics Data System (ADS)
Guo, Ying; Luo, Peng; Wang, Yijun
2016-11-01
Quantum secret sharing (QSS) is a significant quantum cryptography technology in the literature. Dividing an initial secret into several sub-secrets which are then transferred to other legal participants so that it can be securely recovered in a collaboration fashion. In this paper, we develop a quantum route selection based on the encoded quantum graph state, thus enabling the practical QSS scheme in the small-scale complex quantum network. Legal participants are conveniently designated with the quantum route selection using the entanglement of the encoded graph states. Each participant holds a vertex of the graph state so that legal participants are selected through performing operations on specific vertices. The Chinese remainder theorem (CRT) strengthens the security of the recovering process of the initial secret among the legal participants. The security is ensured by the entanglement of the encoded graph states that are cooperatively prepared and shared by legal users beforehand with the sub-secrets embedded in the CRT over finite fields.
Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.
Bao, Long; Yi, Shuang; Zhou, Yicong
2017-12-01
This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.
Two-party secret key distribution via a modified quantum secret sharing protocol.
Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M
2015-03-23
We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.
Two-Party secret key distribution via a modified quantum secret sharing protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Two-Party secret key distribution via a modified quantum secret sharing protocol
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin; ...
2015-01-01
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu
2018-02-01
In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.
Zhou, Zhi; Arce, Gonzalo R; Di Crescenzo, Giovanni
2006-08-01
Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the n shares, however, have no visual meaning and hinder the objectives of visual cryptography. Extended visual cryptography [1] was proposed recently to construct meaningful binary images as shares using hypergraph colourings, but the visual quality is poor. In this paper, a novel technique named halftone visual cryptography is proposed to achieve visual cryptography via halftoning. Based on the blue-noise dithering principles, the proposed method utilizes the void and cluster algorithm [2] to encode a secret binary image into n halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares are observably better than that attained by any available visual cryptography method known to date.
Secret Key Generation via a Modified Quantum Secret Sharing Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J
We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less
Matroids and quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep; Raussendorf, Robert
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less
A novel semi-quantum secret sharing scheme based on Bell states
NASA Astrophysics Data System (ADS)
Yin, Aihan; Wang, Zefan; Fu, Fangbo
2017-05-01
A semi-quantum secret sharing (SQSS) scheme based on Bell states is proposed in this paper. The sender who can perform any relevant quantum operations uses Bell states to share the secret keys with her participants that are limited to perform classical operations on the transmitted qubits. It is found that our scheme is easy to generalize from three parties to multiparty and more efficient than the previous schemes [Q. Li, W. H. Chan and D. Y. Long, Phys. Rev. A 82 (2010) 022303; L. Z. Li, D. W. Qiu and P. Mateus, J. Phys. A: Math. Theor. 26 (2013) 045304; C. Xie, L. Z. Li and D. W. Qiu, Int. J. Theor. Phys. 54 (2015) 3819].
Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses
NASA Astrophysics Data System (ADS)
Zhang, Zhan-Jun; Man, Zhong-Xiao
2005-07-01
Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.
Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger
NASA Technical Reports Server (NTRS)
2002-01-01
Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.
Efficient multiparty quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xiao Li; Deng Fuguo; Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] wheremore » all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.« less
Semiquantum secret sharing using entangled states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li Qin; Department of Computer Science, Sun Yat-sen University, Guangzhou 510006; Department of Mathematics, Hong Kong Baptist University, Kowloon
Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but onemore » of them cannot. The presented protocols are also shown to be secure against eavesdropping.« less
Quantum secret sharing with qudit graph states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keet, Adrian; Fortescue, Ben; Sanders, Barry C.
We present a unified formalism for threshold quantum secret sharing using graph states of systems with prime dimension. We construct protocols for three varieties of secret sharing: with classical and quantum secrets shared between parties over both classical and quantum channels.
Security of a kind of quantum secret sharing with entangled states.
Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng
2017-05-30
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.
Verifying Secrets and Relative Secrecy
2000-01-01
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given...value. For example, an ATM machine allows one to ask whether a string is the secret PIN of a (lost or stolen) ATM card. Yet such queries are prohibited
An Image Secret Sharing Method
2006-07-01
the secret image in lossless manner and (2) any or fewer image shares cannot get sufficient information to reveal the ... secret image. It is an effective, reliable and secure method to prevent the secret image from being lost, stolen or corrupted. In comparison with...other image secret sharing methods, this approach’s advantages are its large compression rate on the size of the image shares, its strong protection of the secret image and its ability for real-time
2002-11-26
Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.
Relativistic (2,3)-threshold quantum secret sharing
NASA Astrophysics Data System (ADS)
Ahmadi, Mehdi; Wu, Ya-Dong; Sanders, Barry C.
2017-09-01
In quantum secret sharing protocols, the usual presumption is that the distribution of quantum shares and players' collaboration are both performed inertially. Here we develop a quantum secret sharing protocol that relaxes these assumptions wherein we consider the effects due to the accelerating motion of the shares. Specifically, we solve the (2,3)-threshold continuous-variable quantum secret sharing in noninertial frames. To this aim, we formulate the effect of relativistic motion on the quantum field inside a cavity as a bosonic quantum Gaussian channel. We investigate how the fidelity of quantum secret sharing is affected by nonuniform motion of the quantum shares. Furthermore, we fully characterize the canonical form of the Gaussian channel, which can be utilized in quantum-information-processing protocols to include relativistic effects.
Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing
NASA Astrophysics Data System (ADS)
Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.
2016-11-01
The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.
Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment
ERIC Educational Resources Information Center
Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes
2013-01-01
It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
Privacy-preserving photo sharing based on a public key infrastructure
NASA Astrophysics Data System (ADS)
Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj
2015-09-01
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.
Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A
2016-08-12
With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding
Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A.
2016-01-01
With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications. PMID:27515908
Eavesdropping on the improved three-party quantum secret sharing protocol
NASA Astrophysics Data System (ADS)
Gao, Gan
2011-02-01
Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed.
Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.
2016-01-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566
Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M
2016-07-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).
NASA Astrophysics Data System (ADS)
Li, Xianye; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Yin, Yongkai; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi
2017-09-01
A multiple-image encryption method is proposed that is based on row scanning compressive ghost imaging, (t, n) threshold secret sharing, and phase retrieval in the Fresnel domain. In the encryption process, after wavelet transform and Arnold transform of the target image, the ciphertext matrix can be first detected using a bucket detector. Based on a (t, n) threshold secret sharing algorithm, the measurement key used in the row scanning compressive ghost imaging can be decomposed and shared into two pairs of sub-keys, which are then reconstructed using two phase-only mask (POM) keys with fixed pixel values, placed in the input plane and transform plane 2 of the phase retrieval scheme, respectively; and the other POM key in the transform plane 1 can be generated and updated by the iterative encoding of each plaintext image. In each iteration, the target image acts as the input amplitude constraint in the input plane. During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation. Theoretical analysis and numerical simulations both verify the feasibility of the proposed method.
Sequential quantum secret sharing in a noisy environment aided with weak measurements
NASA Astrophysics Data System (ADS)
Ray, Maharshi; Chatterjee, Sourav; Chakrabarty, Indranil
2016-05-01
In this work we give a (n,n)-threshold protocol for sequential secret sharing of quantum information for the first time. By sequential secret sharing we refer to a situation where the dealer is not having all the secrets at the same time, at the beginning of the protocol; however if the dealer wishes to share secrets at subsequent phases she/he can realize it with the help of our protocol. First of all we present our protocol for three parties and later we generalize it for the situation where we have more (n> 3) parties. Interestingly, we show that our protocol of sequential secret sharing requires less amount of quantum as well as classical resource as compared to the situation wherein existing protocols are repeatedly used. Further in a much more realistic situation, we consider the sharing of qubits through two kinds of noisy channels, namely the phase damping channel (PDC) and the amplitude damping channel (ADC). When we carry out the sequential secret sharing in the presence of noise we observe that the fidelity of secret sharing at the kth iteration is independent of the effect of noise at the (k - 1)th iteration. In case of ADC we have seen that the average fidelity of secret sharing drops down to ½ which is equivalent to a random guess of the quantum secret. Interestingly, we find that by applying weak measurements one can enhance the average fidelity. This increase of the average fidelity can be achieved with certain trade off with the success probability of the weak measurements.
NASA Astrophysics Data System (ADS)
Karimipour, V.
2006-07-01
In the preceding Comment [Jian-Zhong Du, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu, Phys. Rev. A 74, 016301 (2006)], it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating.
Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.
NASA Astrophysics Data System (ADS)
Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng
2018-02-01
The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.
Serial interpolation for secure membership testing and matching in a secret-split archive
Kroeger, Thomas M.; Benson, Thomas R.
2016-12-06
The various technologies presented herein relate to analyzing a plurality of shares stored at a plurality of repositories to determine whether a secret from which the shares were formed matches a term in a query. A threshold number of shares are formed with a generating polynomial operating on the secret. A process of serially interpolating the threshold number of shares can be conducted whereby a contribution of a first share is determined, a contribution of a second share is determined while seeded with the contribution of the first share, etc. A value of a final share in the threshold number of shares can be determined and compared with the search term. In the event of the value of the final share and the search term matching, the search term matches the secret in the file from which the shares are formed.
Robust multiparty quantum secret key sharing over two collective-noise channels
NASA Astrophysics Data System (ADS)
Zhang, Zhan-jun
2006-02-01
Based on a polarization-based quantum key distribution protocol over a collective-noise channel [Phys. Rev. Lett. 92 (2004) 017901], a robust (n,n)-threshold scheme of multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) is proposed. In this scheme the sharer entirety can establish a joint key with the message sender only if all the sharers collaborate together. Since Bell singlets are enough for use and only single-photon polarization needs to be identified, this scheme is feasible according to the present-day technique.
A Generalized Information Theoretical Model for Quantum Secret Sharing
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Xu, Ting-Ting; Li, Yong-Ming
2016-11-01
An information theoretical model for quantum secret sharing was introduced by H. Imai et al. (Quantum Inf. Comput. 5(1), 69-80 2005), which was analyzed by quantum information theory. In this paper, we analyze this information theoretical model using the properties of the quantum access structure. By the analysis we propose a generalized model definition for the quantum secret sharing schemes. In our model, there are more quantum access structures which can be realized by our generalized quantum secret sharing schemes than those of the previous one. In addition, we also analyse two kinds of important quantum access structures to illustrate the existence and rationality for the generalized quantum secret sharing schemes and consider the security of the scheme by simple examples.
Bounds on the information rate of quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep
An important metric of the performance of a quantum-secret-sharing scheme is its information rate. Beyond the fact that the information rate is upper-bounded by one, very little is known in terms of bounds on the information rate of quantum-secret-sharing schemes. Furthermore, not every scheme can be realized with rate one. In this paper we derive upper bounds for the information rates of quantum-secret-sharing schemes. We show that there exist quantum access structures on n players for which the information rate cannot be better than O((log{sub 2}n)/n). These results are the quantum analogues of the bounds for classical-secret-sharing schemes proved bymore » Csirmaz.« less
Experimental demonstration of graph-state quantum secret sharing.
Bell, B A; Markham, D; Herrera-Martí, D A; Marin, A; Wadsworth, W J; Rarity, J G; Tame, M S
2014-11-21
Quantum communication and computing offer many new opportunities for information processing in a connected world. Networks using quantum resources with tailor-made entanglement structures have been proposed for a variety of tasks, including distributing, sharing and processing information. Recently, a class of states known as graph states has emerged, providing versatile quantum resources for such networking tasks. Here we report an experimental demonstration of graph state-based quantum secret sharing--an important primitive for a quantum network with applications ranging from secure money transfer to multiparty quantum computation. We use an all-optical setup, encoding quantum information into photons representing a five-qubit graph state. We find that one can reliably encode, distribute and share quantum information amongst four parties, with various access structures based on the complex connectivity of the graph. Our results show that graph states are a promising approach for realising sophisticated multi-layered communication protocols in quantum networks.
Local distinguishability of Dicke states in quantum secret sharing
NASA Astrophysics Data System (ADS)
Wang, Jing-Tao; Xu, Gang; Chen, Xiu-Bo; Sun, Xing-Ming; Jia, Heng-Yue
2017-03-01
We comprehensively investigate the local distinguishability of orthogonal Dicke states under local operations and classical communication (LOCC) from both qualitative and quantitative aspects. Based on our work, defects in the LOCC-quantum secret sharing (QSS) scheme can be complemented, and the information leakage can be quantified. For (k1 ,k2 , k , n)-threshold LOCC-QSS scheme, more intuitive formulas for unambiguous probability and guessing probability were established, which can be used for determining the parameter k1 and k2 directly.
Verifiable Secret Redistribution
2001-10-01
but they are not trusted with secret. Thus, we require a protocol for redistribution without reconstruction of the secret . We also require...verification that the new shareholders have valid shares (ones that can be used to reconstruct the secret ). We present a new protocol to perform non...secret to shareholders in Shamir’s (m,n) threshold scheme (one in which we require m of n shares to reconstruct the secret ), and wish to redistribute the
Secret Sharing and Shared Information
NASA Astrophysics Data System (ADS)
Rauh, Johannes
2017-11-01
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret. Thus, secret sharing schemes are systems of variables in which it is very clearly specified which subsets have information about the secret. As such, they provide perfect model systems for information decompositions. However, following this intuition too far leads to an information decomposition with negative partial information terms, which are difficult to interpret. One possible explanation is that the partial information lattice proposed by Williams and Beer is incomplete and has to be extended to incorporate terms corresponding to higher order redundancy. These results put bounds on information decompositions that follow the partial information framework, and they hint at where the partial information lattice needs to be improved.
High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum
NASA Astrophysics Data System (ADS)
Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan
2016-11-01
Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.
Secret Sharing of a Quantum State.
Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei
2016-07-15
Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.
NASA Astrophysics Data System (ADS)
Gao, Gan
2017-11-01
In this paper, we show that the attack strategy [A. Yin and F. Fu, Mod. Phys. Lett. B 30 (2016) 1650415] fails, that is, the last agent and other agents cannot get the sender’s secret keys without being detected by using the attack strategy.
Two-out-of-two color matching based visual cryptography schemes.
Machizaud, Jacques; Fournel, Thierry
2012-09-24
Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.
A novel secret sharing with two users based on joint transform correlator and compressive sensing
NASA Astrophysics Data System (ADS)
Zhao, Tieyu; Chi, Yingying
2018-05-01
Recently, joint transform correlator (JTC) has been widely applied to image encryption and authentication. This paper presents a novel secret sharing scheme with two users based on JTC. Two users must be present during the decryption that the system has high security and reliability. In the scheme, two users use their fingerprints to encrypt plaintext, and they can decrypt only if both of them provide the fingerprints which are successfully authenticated. The linear relationship between the plaintext and ciphertext is broken using the compressive sensing, which can resist existing attacks on JTC. The results of the theoretical analysis and numerical simulation confirm the validity of the system.
Applying secret sharing for HIS backup exchange.
Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi
2013-01-01
To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.
Detector-device-independent quantum secret sharing with source flaws.
Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan
2018-04-10
Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.
Notes on two multiparty quantum secret sharing schemes
NASA Astrophysics Data System (ADS)
Gao, Gan
In the paper [H. Abulkasim et al., Int. J. Quantum Inform. 15 (2017) 1750023], Abulkasim et al. proposed a quantum secret sharing scheme based on Bell states. We study the security of the multiparty case in the proposed scheme and detect that it is not secure. In the paper [Y. Du and W. Bao, Opt. Commun. 308 (2013) 159], Du and Bao listed Gao’s scheme and gave a attack strategy on the listed scheme. We point out that their listing scheme is not the genuine Gao’s scheme and their research method is not advisable.
A New Improving Quantum Secret Sharing Scheme
NASA Astrophysics Data System (ADS)
Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min
2017-04-01
An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.
NASA Astrophysics Data System (ADS)
Hughes, Richard
2004-05-01
Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.
Dynamic quantum secret sharing by using d-dimensional GHZ state
NASA Astrophysics Data System (ADS)
Qin, Huawang; Dai, Yuewei
2017-03-01
Through generating the d-dimensional GHZ state in the Z-basis and measuring it in the X-basis, a dynamic quantum secret sharing scheme is proposed. In the proposed scheme, multiple participants can be added or deleted in one update period, and the shared secret does not need to be changed. The participants can be added or deleted by themselves, and the dealer does not need to be online. Compared to the existing schemes, the proposed scheme is more efficient and more practical.
Threshold quantum cryptography
NASA Astrophysics Data System (ADS)
Tokunaga, Yuuki; Okamoto, Tatsuaki; Imoto, Nobuyuki
2005-01-01
We present the concept of threshold collaborative unitary transformation or threshold quantum cryptography, which is a kind of quantum version of threshold cryptography. Threshold quantum cryptography states that classical shared secrets are distributed to several parties and a subset of them, whose number is greater than a threshold, collaborates to compute a quantum cryptographic function, while keeping each share secretly inside each party. The shared secrets are reusable if no cheating is detected. As a concrete example of this concept, we show a distributed protocol (with threshold) of conjugate coding.
Verifiable Secret Redistribution for Threshold Sharing Schemes
2002-02-01
complete verification in our protocol, old shareholders broadcast a commitment to the secret to the new shareholders. We prove that the new...of an m − 1 degree polynomial from m of n points yields a constant term in 1 the polynomial that corresponds to the secret . In Blakley’s scheme [Bla79...the intersection of m of n vector spaces yields a one-dimensional vector that corresponds to the secret . Desmedt surveys other sharing schemes
Semi-counterfactual cryptography
NASA Astrophysics Data System (ADS)
Akshata Shenoy, H.; Srikanth, R.; Srinivas, T.
2013-09-01
In counterfactual quantum key distribution (QKD), two remote parties can securely share random polarization-encoded bits through the blocking rather than the transmission of particles. We propose a semi-counterfactual QKD, i.e., one where the secret bit is shared, and also encoded, based on the blocking or non-blocking of a particle. The scheme is thus semi-counterfactual and not based on polarization encoding. As with other counterfactual schemes and the Goldenberg-Vaidman protocol, but unlike BB84, the encoding states are orthogonal and security arises ultimately from single-particle non-locality. Unlike any of them, however, the secret bit generated is maximally indeterminate until the joint action of Alice and Bob. We prove the general security of the protocol, and study the most general photon-number-preserving incoherent attack in detail.
A kind of universal quantum secret sharing protocol
NASA Astrophysics Data System (ADS)
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol.
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-12
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109
Comment on "Proactive quantum secret sharing"
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue
2017-03-01
In the paper, Qin and Dai (Quantum Inf Process 14:4237-4244, 2015) proposed a proactive quantum secret sharing scheme. We study the security of the proposed scheme and find that it is not secure. In the distribution phase of the proposed scheme, two dishonest participants may collaborate to eavesdrop the secret of the dealer without introducing any error.
On Asymptotically Good Ramp Secret Sharing Schemes
NASA Astrophysics Data System (ADS)
Geil, Olav; Martin, Stefano; Martínez-Peñas, Umberto; Matsumoto, Ryutaroh; Ruano, Diego
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly also partial reconstruction giving a more complete picture of the access structure for sequences of linear ramp secret sharing schemes. Our study involves a detailed treatment of the (relative) generalized Hamming weights of the considered codes.
An efficient (t,n) threshold quantum secret sharing without entanglement
NASA Astrophysics Data System (ADS)
Qin, Huawang; Dai, Yuewei
2016-04-01
An efficient (t,n) threshold quantum secret sharing (QSS) scheme is proposed. In our scheme, the Hash function is used to check the eavesdropping, and no particles need to be published. So the utilization efficiency of the particles is real 100%. No entanglement is used in our scheme. The dealer uses the single particles to encode the secret information, and the participants get the secret through measuring the single particles. Compared to the existing schemes, our scheme is simpler and more efficient.
A novel lost packets recovery scheme based on visual secret sharing
NASA Astrophysics Data System (ADS)
Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao
2017-08-01
In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).
Deterministic MDI QKD with two secret bits per shared entangled pair
NASA Astrophysics Data System (ADS)
Zebboudj, Sofia; Omar, Mawloud
2018-03-01
Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.
Lang, Jun
2012-01-30
In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.
Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol
NASA Astrophysics Data System (ADS)
Gao, Xiang; Zhang, Shibin; Chang, Yan
2017-08-01
Recently, Xie et al. Int. J. Theor. Phys. 54, 3819-3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027-4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.'s paper has some problems, we analyze Yin et al.'s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.
Quantum secret sharing via local operations and classical communication.
Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan
2015-11-20
We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.
Comment on "Dynamic quantum secret sharing"
NASA Astrophysics Data System (ADS)
Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish
2013-10-01
Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.
(t, n) Threshold d-Level Quantum Secret Sharing.
Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang
2017-07-25
Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.
Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-01-01
In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme.
NASA Astrophysics Data System (ADS)
Song, Yun; Li, Yongming; Wang, Wenhua
2018-02-01
This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-07
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-01
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454
Quantum secret sharing via local operations and classical communication
Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan
2015-01-01
We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or “ramp”), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect. PMID:26586412
NASA Astrophysics Data System (ADS)
Qin, Su-Juan; Gao, Fei; Wen, Qiao-Yan; Zhu, Fu-Chen
2008-11-01
The security of a multiparty quantum secret sharing protocol [L.F. Han, Y.M. Liu, J. Liu, Z.J. Zhang, Opt. Commun. 281 (2008) 2690] is reexamined. It is shown that any one dishonest participant can obtain all the transmitted secret bits by a special attack, where the controlled- (-iσy) gate is employed to invalidate the role of the random phase shift operation. Furthermore, a possible way to resist this attack is discussed.
Diversity and Phylogenetic Distribution of Extracellular Microbial Peptidases
NASA Astrophysics Data System (ADS)
Nguyen, Trang; Mueller, Ryan; Myrold, David
2017-04-01
Depolymerization of proteinaceous compounds by extracellular proteolytic enzymes is a bottleneck in the nitrogen cycle, limiting the rate of the nitrogen turnover in soils. Protein degradation is accomplished by a diverse range of extracellular (secreted) peptidases. Our objective was to better understand the evolution of these enzymes and how their functional diversity corresponds to known phylogenetic diversity. Peptidase subfamilies from 110 archaeal, 1,860 bacterial, and 97 fungal genomes were extracted from the MEROPS database along with corresponding SSU sequences for each genome from the SILVA database, resulting in 43,177 secreted peptidases belonging to 34 microbial phyla and 149 peptidase subfamilies. We compared the distribution of each peptidase subfamily across all taxa to the phylogenetic relationships of these organisms based on their SSU gene sequences. The occurrence and abundance of genes coding for secreted peptidases varied across microbial taxa, distinguishing the peptidase complement of the three microbial kingdoms. Bacteria had the highest frequency of secreted peptidase coding genes per 1,000 genes and contributed from 1% to 6% of the gene content. Fungi only had a slightly higher number of secreted peptidase gene content than archaea, standardized by the total genes. The relative abundance profiles of secreted peptidases in each microbial kingdom also varied, in which aspartic family was found to be the greatest in fungi (25%), whereas it was only 12% in archaea and 4% in bacteria. Serine, metallo, and cysteine families consistently contributed widely up to 75% of the secreted peptidase abundance across the three kingdoms. Overall, bacteria had a much wider collection of secreted peptidases, whereas fungi and archaea shared most of their secreted peptidase families. Principle coordinate analysis of the peptidase subfamily-based dissimilarities showed distinguishable clusters for different groups of microorganisms. The distribution of secreted peptidases was found to be significantly correlated with phylogenetic relationships within kingdoms (archaea rMantel=0.364, p=0.001; bacteria rMantel=0.257, p=0.001, and fungi rMantel=0.281, p=0.005), inferring an evolutionary relationship where subsets of phylogenetically related organisms share similar types of secreted peptidases. We also tested the phylogenetic signal strength of each peptidase subfamily for each microbial kingdom based on the binary traits of the distribution (presence or absence of secreted peptidase subfamilies in individual species). About one-third of the peptidase subfamilies displayed a strong evolutionary signal; the rest were phylogenetically over-dispersed, suggesting that these subfamilies are randomly distributed across the tree of life or the result of events such as horizontal gene transfer. Study of the diversity and phylogenetic distribution of secreted peptidases offered a mechanistic basis to anticipate the proteolytic potential function of microbial communities.
Pellegrin, Clement; Morin, Emmanuelle; Martin, Francis M.; ...
2015-11-18
Fungi are major players in the carbon cycle in forest ecosystems due to the wide range of interactions they have with plants either through soil degradation processes by litter decayers or biotrophic interactions with pathogenic and ectomycorrhizal symbionts. Secretion of fungal proteins mediates these interactions by allowing the fungus to interact with its environment and/or host. Ectomycorrhizal (ECM) symbiosis independently appeared several times throughout evolution and involves approximately 80% of trees. Despite extensive physiological studies on ECM symbionts, little is known about the composition and specificities of their secretomes. In this study, we used a bioinformatics pipeline to predict andmore » analyze the secretomes of 49 fungal species, including 11 ECM fungi, wood and soil decayers and pathogenic fungi to tackle the following questions: (1) Are there differences between the secretomes of saprophytic and ECM fungi? (2) Are small-secreted proteins (SSPs) more abundant in biotrophic fungi than in saprophytic fungi? and (3) Are there SSPs shared between ECM, saprotrophic and pathogenic fungi? We showed that the number of predicted secreted proteins is similar in the surveyed species, independently of their lifestyle. The secretome from ECM fungi is characterized by a restricted number of secreted CAZymes, but their repertoires of secreted proteases and lipases are similar to those of saprotrophic fungi. Focusing on SSPs, we showed that the secretome of ECM fungi is enriched in SSPs compared with other species. Most of the SSPs are coded by orphan genes with no known PFAM domain or similarities to known sequences in databases. Finally, based on the clustering analysis, we identified shared- and lifestyle-specific SSPs between saprotrophic and ECM fungi. The presence of SSPs is not limited to fungi interacting with living plants as the genome of saprotrophic fungi also code for numerous SSPs. As a result, ECM fungi shared lifestyle-specific SSPs likely involved in symbiosis that are good candidates for further functional analyses.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pellegrin, Clement; Morin, Emmanuelle; Martin, Francis M.
Fungi are major players in the carbon cycle in forest ecosystems due to the wide range of interactions they have with plants either through soil degradation processes by litter decayers or biotrophic interactions with pathogenic and ectomycorrhizal symbionts. Secretion of fungal proteins mediates these interactions by allowing the fungus to interact with its environment and/or host. Ectomycorrhizal (ECM) symbiosis independently appeared several times throughout evolution and involves approximately 80% of trees. Despite extensive physiological studies on ECM symbionts, little is known about the composition and specificities of their secretomes. In this study, we used a bioinformatics pipeline to predict andmore » analyze the secretomes of 49 fungal species, including 11 ECM fungi, wood and soil decayers and pathogenic fungi to tackle the following questions: (1) Are there differences between the secretomes of saprophytic and ECM fungi? (2) Are small-secreted proteins (SSPs) more abundant in biotrophic fungi than in saprophytic fungi? and (3) Are there SSPs shared between ECM, saprotrophic and pathogenic fungi? We showed that the number of predicted secreted proteins is similar in the surveyed species, independently of their lifestyle. The secretome from ECM fungi is characterized by a restricted number of secreted CAZymes, but their repertoires of secreted proteases and lipases are similar to those of saprotrophic fungi. Focusing on SSPs, we showed that the secretome of ECM fungi is enriched in SSPs compared with other species. Most of the SSPs are coded by orphan genes with no known PFAM domain or similarities to known sequences in databases. Finally, based on the clustering analysis, we identified shared- and lifestyle-specific SSPs between saprotrophic and ECM fungi. The presence of SSPs is not limited to fungi interacting with living plants as the genome of saprotrophic fungi also code for numerous SSPs. As a result, ECM fungi shared lifestyle-specific SSPs likely involved in symbiosis that are good candidates for further functional analyses.« less
Pellegrin, Clement; Morin, Emmanuelle; Martin, Francis M.; Veneault-Fourrey, Claire
2015-01-01
Fungi are major players in the carbon cycle in forest ecosystems due to the wide range of interactions they have with plants either through soil degradation processes by litter decayers or biotrophic interactions with pathogenic and ectomycorrhizal symbionts. Secretion of fungal proteins mediates these interactions by allowing the fungus to interact with its environment and/or host. Ectomycorrhizal (ECM) symbiosis independently appeared several times throughout evolution and involves approximately 80% of trees. Despite extensive physiological studies on ECM symbionts, little is known about the composition and specificities of their secretomes. In this study, we used a bioinformatics pipeline to predict and analyze the secretomes of 49 fungal species, including 11 ECM fungi, wood and soil decayers and pathogenic fungi to tackle the following questions: (1) Are there differences between the secretomes of saprophytic and ECM fungi? (2) Are small-secreted proteins (SSPs) more abundant in biotrophic fungi than in saprophytic fungi? and (3) Are there SSPs shared between ECM, saprotrophic and pathogenic fungi? We showed that the number of predicted secreted proteins is similar in the surveyed species, independently of their lifestyle. The secretome from ECM fungi is characterized by a restricted number of secreted CAZymes, but their repertoires of secreted proteases and lipases are similar to those of saprotrophic fungi. Focusing on SSPs, we showed that the secretome of ECM fungi is enriched in SSPs compared with other species. Most of the SSPs are coded by orphan genes with no known PFAM domain or similarities to known sequences in databases. Finally, based on the clustering analysis, we identified shared- and lifestyle-specific SSPs between saprotrophic and ECM fungi. The presence of SSPs is not limited to fungi interacting with living plants as the genome of saprotrophic fungi also code for numerous SSPs. ECM fungi shared lifestyle-specific SSPs likely involved in symbiosis that are good candidates for further functional analyses. PMID:26635749
Quantum secret sharing using the d-dimensional GHZ state
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Xu, Ting-Ting; Li, Yong-Ming
2017-03-01
We propose a quantum secret sharing scheme that uses an orthogonal pair of n-qudit GHZ states and local distinguishability. In the proposed protocol, the participants use an X-basis measurement and classical communication to distinguish between the two orthogonal states and reconstruct the original secret. We also present (2, n)-threshold and generalized restricted (2, n)-threshold schemes that enable any two cooperating players from two disjoint groups to always reconstruct the secret. Compared to the existing scheme by Rahaman and Parker (Phys Rev A 91:022330, 2015), the proposed scheme is more general and the access structure contains more authorized sets.
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes
Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-01-01
In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme. PMID:28072851
CloudSat Preps for Launch at Vandenberg Air Force Base, CA
NASA Technical Reports Server (NTRS)
2005-01-01
The CloudSat spacecraft sits encapsulated within its Boeing Delta launch vehicle dual payload attach fitting at Vandenberg Air Force Base, Calif. CloudSat will share its ride to orbit late next month with NASA's CALIPSO spacecraft. The two spacecraft are designed to reveal the secrets of clouds and aerosols.The physical boundaries of public goods cooperation between surface-attached bacterial cells
Weigert, Michael; Kümmerli, Rolf
2017-01-01
Bacteria secrete a variety of compounds important for nutrient scavenging, competition mediation and infection establishment. While there is a general consensus that secreted compounds can be shared and therefore have social consequences for the bacterial collective, we know little about the physical limits of such bacterial social interactions. Here, we address this issue by studying the sharing of iron-scavenging siderophores between surface-attached microcolonies of the bacterium Pseudomonas aeruginosa. Using single-cell fluorescent microscopy, we show that siderophores, secreted by producers, quickly reach non-producers within a range of 100 µm, and significantly boost their fitness. Producers in turn respond to variation in sharing efficiency by adjusting their pyoverdine investment levels. These social effects wane with larger cell-to-cell distances and on hard surfaces. Thus, our findings reveal the boundaries of compound sharing, and show that sharing is particularly relevant between nearby yet physically separated bacteria on soft surfaces, matching realistic natural conditions such as those encountered in soft tissue infections. PMID:28701557
Smart Grid Privacy through Distributed Trust
NASA Astrophysics Data System (ADS)
Lipton, Benjamin
Though the smart electrical grid promises many advantages in efficiency and reliability, the risks to consumer privacy have impeded its deployment. Researchers have proposed protecting privacy by aggregating user data before it reaches the utility, using techniques of homomorphic encryption to prevent exposure of unaggregated values. However, such schemes generally require users to trust in the correct operation of a single aggregation server. We propose two alternative systems based on secret sharing techniques that distribute this trust among multiple service providers, protecting user privacy against a misbehaving server. We also provide an extensive evaluation of the systems considered, comparing their robustness to privacy compromise, error handling, computational performance, and data transmission costs. We conclude that while all the systems should be computationally feasible on smart meters, the two methods based on secret sharing require much less computation while also providing better protection against corrupted aggregators. Building systems using these techniques could help defend the privacy of electricity customers, as well as customers of other utilities as they move to a more data-driven architecture.
A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
NASA Astrophysics Data System (ADS)
Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal
2016-11-01
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
Experimentally feasible security check for n-qubit quantum secret sharing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr,more » Phys. Rev. Lett. 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.« less
Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding
NASA Astrophysics Data System (ADS)
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Tao, Li; Liu, Zhi-Ming; Orgun, Mehmet A.
2016-11-01
In this paper, we develop a large-capacity quantum digital secret sharing (QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum (OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci- and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie' (Bob') detected value. Supported by the Fundamental Research Funds for the Central Universities under Grant No. XDJK2016C043 and the Doctoral Program of Higher Education under Grant No. SWU115091, the National Natural Science Foundation of China under Grant No. 61303039, the Fundamental Research Funds for the Central Universities under Grant No. XDJK2015C153 and the Doctoral Program of Higher Education under Grant No. SWU114112, and the Financial Support the 1000-Plan of Chongqing by Southwest University under Grant No. SWU116007
Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol
NASA Astrophysics Data System (ADS)
Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming
2011-09-01
The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.
Application of homomorphism to secure image sharing
NASA Astrophysics Data System (ADS)
Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert
2011-09-01
In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.
Lee, Kai-Hui; Chiu, Pei-Ling
2013-10-01
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.
ERIC Educational Resources Information Center
Lyngstad, Idar
2014-01-01
This article is based on an interview with a Norwegian physical education (PE) teacher on the social contact she had with pupils when teaching them PE. The article examines a two-dimensional aspect of a teaching situation relating to swimming instruction in PE, especially focusing on pupils' positive experiences of learning to swim and the…
Durand, Eric; Zoued, Abdelrahim; Spinelli, Silvia; Watson, Paul J. H.; Aschtgen, Marie-Stéphanie; Journet, Laure; Cambillau, Christian; Cascales, Eric
2012-01-01
The Type VI secretion system (T6SS) is a macromolecular system distributed in Gram-negative bacteria, responsible for the secretion of effector proteins into target cells. The T6SS has a broad versatility as it can target both eukaryotic and prokaryotic cells. It is therefore involved in host pathogenesis or killing neighboring bacterial cells to colonize a new niche. At the architecture level, the T6SS core apparatus is composed of 13 proteins, which assemble in two subcomplexes. One of these subcomplexes, composed of subunits that share structural similarities with bacteriophage tail and baseplate components, is anchored to the cell envelope by the membrane subcomplex. This latter is constituted of at least three proteins, TssL, TssM, and TssJ. The crystal structure of the TssJ outer membrane lipoprotein and its interaction with the inner membrane TssM protein have been recently reported. TssL and TssM share sequence homology and characteristics with two components of the Type IVb secretion system (T4bSS), IcmH/DotU and IcmF, respectively. In this study, we report the crystal structure of the cytoplasmic domain of the TssL inner membrane protein from the enteroaggregative Escherichia coli Sci-1 T6SS. It folds as a hook-like structure composed of two three-helix bundles. Two TssL molecules associate to form a functional complex. Although the TssL trans-membrane segment is the main determinant of self-interaction, contacts between the cytoplasmic domains are required for TssL function. Based on sequence homology and secondary structure prediction, we propose that the TssL structure is the prototype for the members of the TssL and IcmH/DotU families. PMID:22371492
Insecurity of position-based quantum-cryptography protocols against entanglement attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lau, Hoi-Kwan; Lo, Hoi-Kwong
2011-01-15
Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to underminemore » the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.« less
Fast implementation of length-adaptive privacy amplification in quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Chun-Mei; Li, Mo; Huang, Jing-Zheng; Patcharapong, Treeviriyanupab; Li, Hong-Wei; Li, Fang-Yi; Wang, Chuan; Yin, Zhen-Qiang; Chen, Wei; Keattisak, Sripimanwat; Han, Zhen-Fu
2014-09-01
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. “Length-adaptive” indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.
Simulating cloud environment for HIS backup using secret sharing.
Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto
2013-01-01
In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.
Retrieving and routing quantum information in a quantum network
NASA Astrophysics Data System (ADS)
Sazim, S.; Chiranjeevi, V.; Chakrabarty, I.; Srinathan, K.
2015-12-01
In extant quantum secret sharing protocols, once the secret is shared in a quantum network ( qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instance, if the dealer is part of the two qnets, say {{Q}}_1 and {{Q}}_2 and he/she subsequently finds that {{Q}}_2 is more reliable than {{Q}}_1, he/she may wish to transfer all her secrets from {{Q}}_1 to {{Q}}_2. Known protocols are inadequate to address such a revocation. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, the no-cloning theorem automatically ensures that the secret is no longer shared in the network. The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous qnets. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the qnet. For example, we show that a source S can send quantum information to a destination R even though (a) S and R share no quantum resource, (b) R's identity is unknown to S at the time of sending the message, but is subsequently decided, (c) S herself can be R at a later date and/or in a different location to bequeath her information (`backed-up' in the qnet) and (d) importantly, the path chosen for routing the secret may hit a dead end due to resource constraints, congestion, etc., (therefore the information needs to be back-tracked and sent along an alternate path). Another implication of our technique is the possibility of using insecure resources. For instance, if the quantum memory within an organization is insufficient, it may safely store (using our protocol) its private information with a neighboring organization without (a) revealing critical data to the host and (b) losing control over retrieving the data. Putting the two implications together, namely routing and secure storage, it is possible to envision applications like quantum mail (qmail) as an outsourced service.
Experimental quantum secret sharing and third-man quantum cryptography.
Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei
2005-11-11
Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.
Teleradiology mobile internet system with a new information security solution
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiko; Kaneko, Masahiro; Moriyama, Noriyuki
2014-03-01
We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC card is given only to the person to whom the authority to operate web medical image conference system was given.
NASA Astrophysics Data System (ADS)
Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen
2010-01-01
The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.
Experimental circular quantum secret sharing over telecom fiber network.
Wei, Ke-Jin; Ma, Hai-Qiang; Yang, Jian-Hui
2013-07-15
We present a robust single photon circular quantum secret sharing (QSS) scheme with phase encoding over 50 km single mode fiber network using a circular QSS protocol. Our scheme can automatically provide a perfect compensation of birefringence and remain stable for a long time. A high visibility of 99.3% is obtained. Furthermore, our scheme realizes a polarization insensitive phase modulators. The visibility of this system can be maintained perpetually without any adjustment to the system every time we test the system.
2013-01-01
Background Fungal pathogens cause devastating losses in economically important cereal crops by utilising pathogen proteins to infect host plants. Secreted pathogen proteins are referred to as effectors and have thus far been identified by selecting small, cysteine-rich peptides from the secretome despite increasing evidence that not all effectors share these attributes. Results We take advantage of the availability of sequenced fungal genomes and present an unbiased method for finding putative pathogen proteins and secreted effectors in a query genome via comparative hidden Markov model analyses followed by unsupervised protein clustering. Our method returns experimentally validated fungal effectors in Stagonospora nodorum and Fusarium oxysporum as well as the N-terminal Y/F/WxC-motif from the barley powdery mildew pathogen. Application to the cereal pathogen Fusarium graminearum reveals a secreted phosphorylcholine phosphatase that is characteristic of hemibiotrophic and necrotrophic cereal pathogens and shares an ancient selection process with bacterial plant pathogens. Three F. graminearum protein clusters are found with an enriched secretion signal. One of these putative effector clusters contains proteins that share a [SG]-P-C-[KR]-P sequence motif in the N-terminal and show features not commonly associated with fungal effectors. This motif is conserved in secreted pathogenic Fusarium proteins and a prime candidate for functional testing. Conclusions Our pipeline has successfully uncovered conservation patterns, putative effectors and motifs of fungal pathogens that would have been overlooked by existing approaches that identify effectors as small, secreted, cysteine-rich peptides. It can be applied to any pathogenic proteome data, such as microbial pathogen data of plants and other organisms. PMID:24252298
Quantum secret sharing using orthogonal multiqudit entangled states
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming
2017-12-01
In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
NASA Astrophysics Data System (ADS)
Chau, H. F.
2002-12-01
A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1(5)≈27.6%, thereby making it the most error resistant scheme known to date.
Low cost and compact quantum key distribution
NASA Astrophysics Data System (ADS)
Duligall, J. L.; Godfrey, M. S.; Harrison, K. A.; Munro, W. J.; Rarity, J. G.
2006-10-01
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is shown as well as results of error rates and therefore shared secret yields at varying background light levels. As the system is designed to eventually work in short-range consumer applications, we also present a use scenario where the consumer can regularly 'top up' a store of secrets for use in a variety of one-time-pad (OTP) and authentication protocols.
A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud
Seenivasagam, V.; Velumani, R.
2013-01-01
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks. PMID:23970943
Seenivasagam, V; Velumani, R
2013-01-01
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.
Quantum state sharing against the controller's cheating
NASA Astrophysics Data System (ADS)
Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng
2013-08-01
Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.
Position-based quantum cryptography over untrusted networks
NASA Astrophysics Data System (ADS)
Nadeem, Muhammad
2014-08-01
In this article, we propose quantum position verification (QPV) schemes where all the channels are untrusted except the position of the prover and distant reference stations of verifiers. We review and analyze the existing QPV schemes containing some pre-shared data between the prover and verifiers. Most of these schemes are based on non-cryptographic assumptions, i.e. quantum/classical channels between the verifiers are secure. It seems impractical in an environment fully controlled by adversaries and would lead to security compromise in practical implementations. However, our proposed formula for QPV is more robust, secure and according to the standard assumptions of cryptography. Furthermore, once the position of the prover is verified, our schemes establish secret keys in parallel and can be used for authentication and secret communication between the prover and verifiers.
NASA Astrophysics Data System (ADS)
Wang, Jingtao; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-02-01
In this study, we propose the concept of judgment space to investigate the quantum-secret-sharing scheme based on local distinguishability (called LOCC-QSS). Because of the proposing of this conception, the property of orthogonal mutiqudit entangled states under restricted local operation and classical communication (LOCC) can be described more clearly. According to these properties, we reveal that, in the previous (k ,n )-threshold LOCC-QSS scheme, there are two required conditions for the selected quantum states to resist the unambiguous attack: (i) their k -level judgment spaces are orthogonal, and (ii) their (k -1 )-level judgment spaces are equal. Practically, if k
DOE Office of Scientific and Technical Information (OSTI.GOV)
Samudrala, Ram; Heffron, Fred; McDermott, Jason E.
2009-04-24
The type III secretion system is an essential component for virulence in many Gram-negative bacteria. Though components of the secretion system apparatus are conserved, its substrates, effector proteins, are not. We have used a machine learning approach to identify new secreted effectors. The method integrates evolutionary measures, such as the pattern of homologs in a range of other organisms, and sequence-based features, such as G+C content, amino acid composition and the N-terminal 30 residues of the protein sequence. The method was trained on known effectors from Salmonella typhimurium and validated on a corresponding set of effectors from Pseudomonas syringae, aftermore » eliminating effectors with detectable sequence similarity. The method was able to identify all of the known effectors in P. syringae with a specificity of 84% and sensitivity of 82%. The reciprocal validation, training on P. syringae and validating on S. typhimurium, gave similar results with a specificity of 86% when the sensitivity level was 87%. These results show that type III effectors in disparate organisms share common features. We found that maximal performance is attained by including an N-terminal sequence of only 30 residues, which agrees with previous studies indicating that this region contains the secretion signal. We then used the method to define the most important residues in this putative secretion signal. Finally, we present novel predictions of secreted effectors in S. typhimurium, some of which have been experimentally validated, and apply the method to predict secreted effectors in the genetically intractable human pathogen Chlamydia trachomatis. This approach is a novel and effective way to identify secreted effectors in a broad range of pathogenic bacteria for further experimental characterization and provides insight into the nature of the type III secretion signal.« less
Cognitive approaches for patterns analysis and security applications
NASA Astrophysics Data System (ADS)
Ogiela, Marek R.; Ogiela, Lidia
2017-08-01
In this paper will be presented new opportunities for developing innovative solutions for semantic pattern classification and visual cryptography, which will base on cognitive and bio-inspired approaches. Such techniques can be used for evaluation of the meaning of analyzed patterns or encrypted information, and allow to involve such meaning into the classification task or encryption process. It also allows using some crypto-biometric solutions to extend personalized cryptography methodologies based on visual pattern analysis. In particular application of cognitive information systems for semantic analysis of different patterns will be presented, and also a novel application of such systems for visual secret sharing will be described. Visual shares for divided information can be created based on threshold procedure, which may be dependent on personal abilities to recognize some image details visible on divided images.
Entropic inequalities for a class of quantum secret-sharing states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep
It is well known that von Neumann entropy is nonmonotonic, unlike Shannon entropy (which is monotonically nondecreasing). Consequently, it is difficult to relate the entropies of the subsystems of a given quantum state. In this paper, we show that if we consider quantum secret-sharing states arising from a class of monotone span programs, then we can partially recover the monotonicity of entropy for the so-called unauthorized sets. Furthermore, we can show for these quantum states that the entropy of the authorized sets is monotonically nonincreasing.
Deterministic secure quantum communication using a single d-level system.
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-03-22
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.
Brough, David; Pelegrin, Pablo; Nickel, Walter
2017-10-01
Extracellular proteins with important signalling roles in processes, such as inflammation and angiogenesis, are known to employ unconventional routes of protein secretion. Although mechanisms of unconventional protein secretion are beginning to emerge, the precise molecular details have remained elusive for the majority of cargo proteins secreted by unconventional means. Recent findings suggest that for two examples of unconventionally secreted proteins, interleukin 1β (IL-1β) and fibroblast growth factor 2 (FGF2), the common molecular principle of pore formation may be shared. Under specific experimental conditions, secretion of IL-1β and FGF2 is triggered by phosphatidylinositol 4,5-bisphosphate [PI(4,5)P 2 ]-dependent formation of pores across the plasma membrane. However, the underlying mechanisms are different, with FGF2 known to directly interact with PI(4,5)P 2 , whereas in the case of IL-1β secretion, it is proposed that the N-terminal fragment of gasdermin D interacts with PI(4,5)P 2 to form the pore. Thus, although implemented in different ways, these findings suggest that pore formation may be shared by the unconventional secretion mechanisms for FGF2 and IL-1β in at least some cases. In this Opinion article, we discuss the unconventional mechanisms of FGF2 and IL-1β release with a particular emphasis on recent discoveries suggesting the importance of pore formation on the plasma membrane. © 2017. Published by The Company of Biologists Ltd.
NASA Astrophysics Data System (ADS)
Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing
2015-09-01
In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.
The general theory of three-party quantum secret sharing protocols over phase-damping channels
NASA Astrophysics Data System (ADS)
Song, Ting-Ting; Wen, Qiao-Yan; Qin, Su-Juan; Zhang, Wei-Wei; Sun, Ying
2013-10-01
The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial pure three-qubit tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels and figure out, for different kinds of initial states, the successful probabilities that Alice's secret can be recovered by legal agents are different. Comparing with one recent QSS protocol based on GHZ states, our scheme is secure, and has a little smaller key rate than that of the recent protocol.
Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm
NASA Astrophysics Data System (ADS)
Moumen, Abdelkader; Sissaoui, Hocine
2017-03-01
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.
Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.
Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong
2015-01-01
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.
Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow
Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong
2015-01-01
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time. PMID:26351657
Plants as models for the study of human pathogenesis.
Guttman, David S
2004-05-01
There are many common disease mechanisms used by bacterial pathogens of plants and humans. They use common means of attachment, secretion and genetic regulation. They share many virulence factors, such as extracellular polysaccharides and some type III secreted effectors. Plant and human innate immune systems also share many similarities. Many of these shared bacterial virulence mechanisms are homologous, but even more appear to have independently converged on a common function. This combination of homologous and analogous systems reveals conserved and critical steps in the disease process. Given these similarities, and the many experimental advantages of plant biology, including ease of replication, stringent genetic and reproductive control, and high throughput with low cost, it is proposed that plants would make excellent models for the study of human pathogenesis.
Cheating prevention in visual cryptography.
Hu, Chih-Ming; Tzeng, Wen-Guey
2007-01-01
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion.
SSeCloud: Using secret sharing scheme to secure keys
NASA Astrophysics Data System (ADS)
Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang
2017-08-01
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
Al Kindi, Mahmood A; Colella, Alex D; Chataway, Tim K; Jackson, Michael W; Wang, Jing J; Gordon, Tom P
2016-04-01
The structures of epitopes bound by autoantibodies against RNA-protein complexes have been well-defined over several decades, but little is known of the clonality, immunoglobulin (Ig) variable (V) gene usage and mutational status of the autoantibodies themselves at the level of the secreted (serum) proteome. A novel proteomic workflow is presented based on affinity purification of specific Igs from serum, high-resolution two-dimensional gel electrophoresis, and de novo and database-driven sequencing of V-region proteins by mass spectrometry. Analysis of anti-Ro52/Ro60/La proteomes in primary Sjögren's syndrome (SS) and anti-Sm and anti-ribosomal P proteomes in systemic lupus erythematosus (SLE) has revealed that these antibody responses are dominated by restricted sets of public (shared) clonotypes, consistent with common pathways of production across unrelated individuals. The discovery of shared sets of specific V-region peptides can be exploited for diagnostic biomarkers in targeted mass spectrometry platforms and for tracking and removal of pathogenic clones. Copyright © 2016 Elsevier B.V. All rights reserved.
Accelerating Innovation Through Coopetition: The Innovation Learning Network Experience.
McCarthy, Chris; Ford Carleton, Penny; Krumpholz, Elizabeth; Chow, Marilyn P
Coopetition, the simultaneous pursuit of cooperation and competition, is a growing force in the innovation landscape. For some organizations, the primary mode of innovation continues to be deeply secretive and highly competitive, but for others, a new style of shared challenges, shared purpose, and shared development has become a superior, more efficient way of working to accelerate innovation capabilities and capacity. Over the last 2 decades, the literature base devoted to coopetition has gradually expanded. However, the field is still in its infancy. The majority of coopetition research is qualitative, primarily consisting of case studies. Few studies have addressed the nonprofit sector or service industries such as health care. The authors believe that this article may offer a unique perspective on coopetition in the context of a US-based national health care learning alliance designed to accelerate innovation, the Innovation Learning Network or ILN. The mission of the ILN is to "Share the joy and pain of innovation," accelerating innovation by sharing solutions, teaching techniques, and cultivating friendships. These 3 pillars (sharing, teaching, and cultivating) form the foundation for coopetition within the ILN. Through the lens of coopetition, we examine the experience of the ILN over the last 10 years and provide case examples that illustrate the benefits and challenges of coopetition in accelerating innovation in health care.
Application of Quantum Gauss-Jordan Elimination Code to Quantum Secret Sharing Code
NASA Astrophysics Data System (ADS)
Diep, Do Ngoc; Giang, Do Hoang; Phu, Phan Huy
2017-12-01
The QSS codes associated with a MSP code are based on finding an invertible matrix V, solving the system vATMB (s a) = s. We propose a quantum Gauss-Jordan Elimination Procedure to produce such a pivotal matrix V by using the Grover search code. The complexity of solving is of square-root order of the cardinal number of the unauthorized set √ {2^{|B|}}.
Application of Quantum Gauss-Jordan Elimination Code to Quantum Secret Sharing Code
NASA Astrophysics Data System (ADS)
Diep, Do Ngoc; Giang, Do Hoang; Phu, Phan Huy
2018-03-01
The QSS codes associated with a MSP code are based on finding an invertible matrix V, solving the system vATMB (s a)=s. We propose a quantum Gauss-Jordan Elimination Procedure to produce such a pivotal matrix V by using the Grover search code. The complexity of solving is of square-root order of the cardinal number of the unauthorized set √ {2^{|B|}}.
Hepp, Christof; Maier, Berenike
2017-10-01
Secretion systems enable bacteria to import and secrete large macromolecules including DNA and proteins. While most components of these systems have been identified, the molecular mechanisms of macromolecular transport remain poorly understood. Recent findings suggest that various bacterial secretion systems make use of the translocation ratchet mechanism for transporting polymers across the cell envelope. Translocation ratchets are powered by chemical potential differences generated by concentration gradients of ions or molecules that are specific to the respective secretion systems. Bacteria employ these potential differences for biasing Brownian motion of the macromolecules within the conduits of the secretion systems. Candidates for this mechanism include DNA import by the type II secretion/type IV pilus system, DNA export by the type IV secretion system, and protein export by the type I secretion system. Here, we propose that these three secretion systems employ different molecular implementations of the translocation ratchet mechanism. © 2017 The Authors. BioEssays Published by WILEY Periodicals, Inc.
Thomas, Ranjit; Macsween, Karen F; McAulay, Karen; Clutterbuck, Daniel; Anderson, Richard; Reid, Stuart; Higgins, Craig D; Swerdlow, Anthony J; Harrison, Nadine; Williams, Hilary; Crawford, Dorothy H
2006-09-01
Epstein-Barr virus is present in the saliva of most persistently infected individuals and is generally thought to be spread by close oral contact. However, there are now several reports of EBV in genital secretions, suggesting the possibility of sexual transmission between adults. The present study was undertaken to investigate the risk of sexual transmission of EBV. PCR analysis was used to examined the degree to which a group (n = 11) of patients with infectious mononucleosis (IM) shared the same viral isolates as their sexual partners, and compare this to the extent of isolate sharing among a different group (n = 18) of IM patients and their non-sexual contacts. There was significantly more sharing of EBV isolates among the IM/sexual-contact pairs than among the IM/non-sexual-contact pairs (P = 0.0012). Female cervical (n = 84), male urethral (n = 55), and semen (n = 30) samples from asymptomatic, unselected volunteers were analyzed for the presence of EBV DNA, revealing 7%, 5%, and 3% to be EBV positive, respectively. Fractionation of cervical and urethral samples into cellular and supernatant fluid components showed EBV to be mainly cell-associated. Quantitation of EBV in these samples gave levels of below 10 EBV genomes per microg of DNA. Overall the findings support the possibility that EBV could on occasions be transmitted sexually, however, the low levels detected in genital secretions compared to saliva suggest that this is not a major transmission route. The finding of small quantities of cell-associated virus suggests a latent infection; thus EBV is probably in the B lymphocyte rather than in the epithelial cell component of the secretions.
DBSecSys 2.0: a database of Burkholderia mallei and Burkholderia pseudomallei secretion systems.
Memišević, Vesna; Kumar, Kamal; Zavaljevski, Nela; DeShazer, David; Wallqvist, Anders; Reifman, Jaques
2016-09-20
Burkholderia mallei and B. pseudomallei are the causative agents of glanders and melioidosis, respectively, diseases with high morbidity and mortality rates. B. mallei and B. pseudomallei are closely related genetically; B. mallei evolved from an ancestral strain of B. pseudomallei by genome reduction and adaptation to an obligate intracellular lifestyle. Although these two bacteria cause different diseases, they share multiple virulence factors, including bacterial secretion systems, which represent key components of bacterial pathogenicity. Despite recent progress, the secretion system proteins for B. mallei and B. pseudomallei, their pathogenic mechanisms of action, and host factors are not well characterized. We previously developed a manually curated database, DBSecSys, of bacterial secretion system proteins for B. mallei. Here, we report an expansion of the database with corresponding information about B. pseudomallei. DBSecSys 2.0 contains comprehensive literature-based and computationally derived information about B. mallei ATCC 23344 and literature-based and computationally derived information about B. pseudomallei K96243. The database contains updated information for 163 B. mallei proteins from the previous database and 61 additional B. mallei proteins, and new information for 281 B. pseudomallei proteins associated with 5 secretion systems, their 1,633 human- and murine-interacting targets, and 2,400 host-B. mallei interactions and 2,286 host-B. pseudomallei interactions. The database also includes information about 13 pathogenic mechanisms of action for B. mallei and B. pseudomallei secretion system proteins inferred from the available literature or computationally. Additionally, DBSecSys 2.0 provides details about 82 virulence attenuation experiments for 52 B. mallei secretion system proteins and 98 virulence attenuation experiments for 61 B. pseudomallei secretion system proteins. We updated the Web interface and data access layer to speed-up users' search of detailed information for orthologous proteins related to secretion systems of the two pathogens. The updates of DBSecSys 2.0 provide unique capabilities to access comprehensive information about secretion systems of B. mallei and B. pseudomallei. They enable studies and comparisons of corresponding proteins of these two closely related pathogens and their host-interacting partners. The database is available at http://dbsecsys.bhsai.org .
Secrets of Mlearning Failures: Confronting Reality
ERIC Educational Resources Information Center
Cochrane, Thomas
2012-01-01
Having implemented and evaluated over 35 mlearning projects in a variety of contexts in higher education over the past 6 years the researcher is ready to share the untold secret: not all mlearning projects succeed! This article critiques three of the researcher's mlearning projects that can be classed as "failures" and compares them to successful…
Kiel, Elizabeth J.; Hummel, Alexandra C.; Luebbe, Aaron M.
2015-01-01
Childhood sleep problems are prevalent and relate to a wide range of negative psychological outcomes. However, it remains unclear how biological processes, such as HPA activity, may predict sleep problems over time in childhood in the context of certain parenting environments. Fifty-one mothers and their 18–20 month-old toddlers participated in a short-term longitudinal study assessing how shared variance among morning levels, diurnal change, and nocturnal change in toddlers’ cortisol secretion predicted change in sleep problems in the context of maternal overprotection and critical control. A composite characterized by low variability in, and, to a lesser extent, high morning values of cortisol, predicted increasing sleep problems from age 2 to age 3 when mothers reported high critical control. Results suggest value in assessing shared variance among different indices of cortisol secretion patterns and the interaction between cortisol and the environment in predicting sleep problems in early childhood. PMID:25766262
Deterministic secure quantum communication using a single d-level system
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-01-01
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557
Jones index, secret sharing and total quantum dimension
NASA Astrophysics Data System (ADS)
Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.
2017-02-01
We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.
Ning, Xiaojun; Luckenbaugh, Laurie; Liu, Kuancheng; Bruss, Volker; Sureau, Camille; Hu, Jianming
2018-05-09
During the morphogenesis of hepatitis B virus (HBV), an enveloped virus, two types of virions are secreted: (1) a minor population of complete virions containing a mature nucleocapsid with the characteristic, partially double-stranded, relaxed circular DNA genome and (2) a major population containing an empty capsid with no DNA or RNA (empty virions). Secretion of both types of virions requires interactions between the HBV capsid or core protein (HBc) and the viral surface or envelope proteins. We have studied the requirements from both HBc and envelope proteins for empty virion secretion, in comparison with those for secretion of complete virions. Substitutions within the N-terminal domain of HBc that block secretion of DNA-containing virions reduced but did not prevent secretion of empty virions. The HBc C-terminal domain was not essential for empty virion secretion. Among the three viral envelope proteins, the smallest, S, alone was sufficient for empty virion secretion at a basal level. The largest protein, L, essential for complete virion secretion, was not required for, but could stimulate empty virion secretion. Also, substitutions in L that eliminate secretion of complete virions reduced but did not eliminate empty virion secretion. S mutations that block secretion of the hepatitis D virus (HDV), an HBV satellite, did not block secretion of either empty or complete HBV virions. Together, these results indicate that both common and distinct signals on empty capsids vs. mature nucleocapsids interact with the S and L proteins during the formation of complete vs. empty virions. IMPORTANCE Hepatitis B virus (HBV) is a major cause of severe liver diseases including cirrhosis and cancer. In addition to the complete infectious virion particle, which contains an outer envelope layer and an interior capsid that, in turn, encloses a DNA genome, HBV infected cells also secrete non-infectious, incomplete viral particles in large excess over the complete virions. In particular, the empty (or genome-free) virion share with the complete virion the outer envelope and interior capsid but contain no genome. We have carried out a comparative study on the capsid and envelope requirements for the secretion of these two types of virion particles and uncovered both shared and distinct determinants on the capsid and envelope for their secretion. These results provide new information on HBV morphogenesis, and have implications for efforts to develop empty HBV virions as a novel biomarker and a new generation of HBV vaccine. Copyright © 2018 American Society for Microbiology.
Morselli, Lisa L; Gamazon, Eric R; Tasali, Esra; Cox, Nancy J; Van Cauter, Eve; Davis, Lea K
2018-01-01
Over the past 20 years, a large body of experimental and epidemiologic evidence has linked sleep duration and quality to glucose homeostasis, although the mechanistic pathways remain unclear. The aim of the current study was to determine whether genetic variation influencing both sleep and glucose regulation could underlie their functional relationship. We hypothesized that the genetic regulation of electroencephalographic (EEG) activity during non-rapid eye movement sleep, a highly heritable trait with fingerprint reproducibility, is correlated with the genetic control of metabolic traits including insulin sensitivity and β-cell function. We tested our hypotheses through univariate and bivariate heritability analyses in a three-generation pedigree with in-depth phenotyping of both sleep EEG and metabolic traits in 48 family members. Our analyses accounted for age, sex, adiposity, and the use of psychoactive medications. In univariate analyses, we found significant heritability for measures of fasting insulin sensitivity and β-cell function, for time spent in slow-wave sleep, and for EEG spectral power in the delta, theta, and sigma ranges. Bivariate heritability analyses provided the first evidence for a shared genetic control of brain activity during deep sleep and fasting insulin secretion rate. © 2017 by the American Diabetes Association.
Seeking to Expand Middle Level Success to All Students: A Not-So-Secret Recipe
ERIC Educational Resources Information Center
White, Jesse
2014-01-01
The recipe for success of Strive Preparatory Charter School (formerly West Denver Preparatory Charter School) is not a secret. This summer program, turned four-campus, middle level phenomenon, is proving to satisfy the appetite of parents hungry for a change in their children's educational opportunities. The intent of this article is to share a…
Wittenberg-Lyles, Elaine; Washington, Karla; Oliver, Debra Parker; Shaunfield, Sara; Gage, L Ashley; Mooney, Megan; Lewis, Alexandria
2015-04-01
Although hospice agencies are required to provide informal caregivers (family or friends of the patient) with formal bereavement support when their loved one passes, most bereavement interventions lack standardization and remain untested. We employed the Dual Processing Model of Bereavement as a theoretical framework for assessing the potential of a secret Facebook group for bereaved hospice caregivers. A mixed-methods approach was utilized to analyze online communication (posts and comments) in the secret Facebook group, and self-reported outcome measures on depression and anxiety were compared pre- and post-intervention. Sixteen caregivers participated in the secret Facebook group over a period of nine months. The majority of online talk was oriented to restoration, revealing abrupt and anticipated triggers that evoked feelings of loss. Caregivers also shared loss orientation through storytelling, sharing and giving advice, and encouraging others to manage the challenges of coping. Caregiver anxiety and depression were lower after the intervention. This pilot study provides insight into the use of a secret Facebook group to facilitate bereavement support to caregivers. Findings highlight the promise of Facebook for hospice bereavement support. Providers and researchers are encouraged to explore the positive outcomes associated with bereavement support.
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Elhadad, Ahmed
2018-02-01
In the Comment made by Gao (2018 Phys. Scr. 93 027002), it has been shown that the multiparty case in our proposed scheme in Abulkasim et al (2016 Phys. Scr. 91 085101) is not secure, where Bob and Charlie can deduce Alice’s unitary operations without being detected. This reply shows a simple modification of the multiparty case to prevent the dishonest agents from performing this kind of attack.
Secrets and Misperceptions: The Creation of Self-Fulfilling Illusions
Cowan, Sarah K.
2015-01-01
This study examines who hears what secrets, comparing two similar secrets-one that is highly stigmatized and one that is less so. Using a unique survey representative of American adults and intake forms from a medical clinic, I document marked differences in who hears these secrets. People who are sympathetic to the stigmatizing secret are more likely to hear of it than those who may react negatively. This is a consequence of people not just selectively disclosing their own secrets but selectively sharing others’ as well. As a result, people in the same social network will be exposed to and influenced by different information about those they know and hence experience that network differently. When people effectively exist in networks tailored by others not to offend, then the information they hear tends to be that of which they already approve. Were they to hear secrets they disapproved of, then their attitudes might change, but they are less likely to hear those secrets. As such, the patterns of secret hearing contribute to a stasis in public opinion. PMID:26082932
Secreting and sensing the same molecule allows cells to achieve versatile social behaviors
Youk, Hyun; Lim, Wendell A.
2014-01-01
Cells that secrete and sense the same signaling molecule are ubiquitous. To uncover the functional capabilities of the core ‘secrete-and-sense’ circuit motif shared by these cells, we engineered yeast to secrete and sense the mating pheromone. Perturbing each circuit element revealed parameters that control the degree to which the cell communicated with itself versus with its neighbors. This tunable interplay of self- and neighbor-communication enables cells to span a diverse repertoire of cellular behaviors. These include a cell being asocial by responding only to itself, social through quorum sensing and an isogenic population of cells splitting into social and asocial subpopulations. A mathematical model explained these behaviors. The versatility of the secrete-and-sense circuit motif may explain its recurrence across species. PMID:24503857
Assessing the secretory capacity of pancreatic acinar cells.
Geron, Erez; Schejter, Eyal D; Shilo, Ben-Zion
2014-08-28
Pancreatic acinar cells produce and secrete digestive enzymes. These cells are organized as a cluster which forms and shares a joint lumen. This work demonstrates how the secretory capacity of these cells can be assessed by culture of isolated acini. The setup is advantageous since isolated acini, which retain many characteristics of the intact exocrine pancreas can be manipulated and monitored more readily than in the whole animal. Proper isolation of pancreatic acini is a key requirement so that the ex vivo culture will represent the in vivo nature of the acini. The protocol demonstrates how to isolate intact acini from the mouse pancreas. Subsequently, two complementary methods for evaluating pancreatic secretion are presented. The amylase secretion assay serves as a global measure, while direct imaging of pancreatic secretion allows the characterization of secretion at a sub-cellular resolution. Collectively, the techniques presented here enable a broad spectrum of experiments to study exocrine secretion.
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
NASA Astrophysics Data System (ADS)
Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi
The rapid growth of the Internet provides people with tremendous opportunities for data collection, knowledge discovery and cooperative computation. However, it also brings the problem of sensitive information leakage. Both individuals and enterprises may suffer from the massive data collection and the information retrieval by distrusted parties. In this paper, we propose a privacy-preserving protocol for the distributed kernel density estimation-based clustering. Our scheme applies random data perturbation (RDP) technique and the verifiable secret sharing to solve the security problem of distributed kernel density estimation in [4] which assumed a mediate party to help in the computation.
Sequential Quantum Secret Sharing Using a Single Qudit
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming
2018-05-01
In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611
Recent Works Share Mothers' Unique Experiences
Shilling, Teri
2005-01-01
In this column, reviewers offer perspectives and comments on The Official Lamaze Guide, a book by Judith Lothian and Charlotte De Vries; Breastfeeding, a slideshow by Roni Chastain; 100 Promises to My Baby, a book by Mallika Chopra; and The Breastfeeding Café: Mothers Share the Joys, Challenges, and Secrets of Nursing, a book by Barbara L. Berhmann.
Genetic Architecture Promotes the Evolution and Maintenance of Cooperation
Frénoy, Antoine; Taddei, François; Misevic, Dusan
2013-01-01
When cooperation has a direct cost and an indirect benefit, a selfish behavior is more likely to be selected for than an altruistic one. Kin and group selection do provide evolutionary explanations for the stability of cooperation in nature, but we still lack the full understanding of the genomic mechanisms that can prevent cheater invasion. In our study we used Aevol, an agent-based, in silico genomic platform to evolve populations of digital organisms that compete, reproduce, and cooperate by secreting a public good for tens of thousands of generations. We found that cooperating individuals may share a phenotype, defined as the amount of public good produced, but have very different abilities to resist cheater invasion. To understand the underlying genetic differences between cooperator types, we performed bio-inspired genomics analyses of our digital organisms by recording and comparing the locations of metabolic and secretion genes, as well as the relevant promoters and terminators. Association between metabolic and secretion genes (promoter sharing, overlap via frame shift or sense-antisense encoding) was characteristic for populations with robust cooperation and was more likely to evolve when secretion was costly. In mutational analysis experiments, we demonstrated the potential evolutionary consequences of the genetic association by performing a large number of mutations and measuring their phenotypic and fitness effects. The non-cooperating mutants arising from the individuals with genetic association were more likely to have metabolic deleterious mutations that eventually lead to selection eliminating such mutants from the population due to the accompanying fitness decrease. Effectively, cooperation evolved to be protected and robust to mutations through entangled genetic architecture. Our results confirm the importance of second-order selection on evolutionary outcomes, uncover an important genetic mechanism for the evolution and maintenance of cooperation, and suggest promising methods for preventing gene loss in synthetically engineered organisms. PMID:24278000
NASA Astrophysics Data System (ADS)
Wu, Chia-Hua; Lee, Suiang-Shyan; Lin, Ja-Chen
2017-06-01
This all-in-one hiding method creates two transparencies that have several decoding options: visual decoding with or without translation flipping and computer decoding. In visual decoding, two less-important (or fake) binary secret images S1 and S2 can be revealed. S1 is viewed by the direct stacking of two transparencies. S2 is viewed by flipping one transparency and translating the other to a specified coordinate before stacking. Finally, important/true secret files can be decrypted by a computer using the information extracted from transparencies. The encoding process to hide this information includes the translated-flip visual cryptography, block types, the ways to use polynomial-style sharing, and linear congruential generator. If a thief obtained both transparencies, which are stored in distinct places, he still needs to find the values of keys used in computer decoding to break through after viewing S1 and/or S2 by stacking. However, the thief might just try every other kind of stacking and finally quit finding more secrets; for computer decoding is totally different from stacking decoding. Unlike traditional image hiding that uses images as host media, our method hides fine gray-level images in binary transparencies. Thus, our host media are transparencies. Comparisons and analysis are provided.
Biliary obstruction - slideshow
... ency/presentations/100199.htm Biliary obstruction - series—Normal anatomy To use the sharing ... Overview Bile is a digestive fluid secreted by the liver and stored in the gallbladder which normally is ...
Modulation of interleukin-1 secretion by immunosuppressive drugs, alone and in combination.
Reisman, L; Lin, W G; Martinelli, G P
1995-03-01
This study evaluates the ability of the immunosuppressive drugs dexamethasone, cyclosporine, FK506 and rapamycin, alone and in combination to suppress interleukin-1 beta (IL-1 beta) secretion in vitro by THP-1 cells when stimulated by lipopolysaccharide. All four drugs, when added to cell culture medium at therapeutic concentrations, significantly decrease secretion of the monokine to well below control levels. However, only dexamethasone completely suppresses IL-1 beta secretion in a dose-dependent fashion. Cyclosporine, FK506 and rapamycin only partially suppress secretion of IL-1 beta at concentrations within their therapeutic ranges and increasing concentrations of the drugs do not result in further suppression of secretion. Likewise, the combination of any two of these three drugs does not provide any additional suppressive effect. Dexamethasone, however, when added in increasing concentrations in combination with any of the other drugs, results in further suppression of IL-1 secretion in a dose-dependent fashion. These data suggest that cyclosporine, FK506 and rapamycin all share a common effect on the production of IL-1 beta, different from that of dexamethasone.
Structure of the uncleaved ectodomain of the paramyxovirus (hPIV3) fusion protein
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yin, Hsien-Sheng; Paterson, Reay G.; Wen, Xiaolin
2010-03-08
Class I viral fusion proteins share common mechanistic and structural features but little sequence similarity. Structural insights into the protein conformational changes associated with membrane fusion are based largely on studies of the influenza virus hemagglutinin in pre- and postfusion conformations. Here, we present the crystal structure of the secreted, uncleaved ectodomain of the paramyxovirus, human parainfluenza virus 3 fusion (F) protein, a member of the class I viral fusion protein group. The secreted human parainfluenza virus 3 F forms a trimer with distinct head, neck, and stalk regions. Unexpectedly, the structure reveals a six-helix bundle associated with the postfusionmore » form of F, suggesting that the anchor-minus ectodomain adopts a conformation largely similar to the postfusion state. The transmembrane anchor domains of F may therefore profoundly influence the folding energetics that establish and maintain a metastable, prefusion state.« less
Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.
Yoon, Young; Kim, Beom Heyn
2016-01-01
Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.
Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network
Kim, Beom Heyn
2016-01-01
Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users. PMID:27367610
Research on manufacturing service behavior modeling based on block chain theory
NASA Astrophysics Data System (ADS)
Zhao, Gang; Zhang, Guangli; Liu, Ming; Yu, Shuqin; Liu, Yali; Zhang, Xu
2018-04-01
According to the attribute characteristics of processing craft, the manufacturing service behavior is divided into service attribute, basic attribute, process attribute, resource attribute. The attribute information model of manufacturing service is established. The manufacturing service behavior information is successfully divided into public and private domain. Additionally, the block chain technology is introduced, and the information model of manufacturing service based on block chain principle is established, which solves the problem of sharing and secreting information of processing behavior, and ensures that data is not tampered with. Based on the key pairing verification relationship, the selective publishing mechanism for manufacturing information is established, achieving the traceability of product data, guarantying the quality of processing quality.
Securing quantum key distribution systems using fewer states
NASA Astrophysics Data System (ADS)
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.
2018-04-01
Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Juhui; School of Computatioal Sciences, Korea Institute for Advanced Study, Seoul 130-722; Lee, Soojoon
Extending the eavesdropping strategy devised by Zhang, Li, and Guo [Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack.0.
Tripartite counterfactual quantum cryptography
NASA Astrophysics Data System (ADS)
Salih, Hatim
2014-07-01
We show how two distrustful parties, "Bob" and "Charlie," can share a secret key with the help of a mutually trusted "Alice" counterfactually; that is, with no information-carrying particles traveling between any of the three.
Quantum Cryptography for Secure Communications to Low-Earth Orbit Satellites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.
1999-06-03
This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the quantum transmissions, nor evade detection. Key material is built up using the transmission of a single-photon per bit. We have developed an experimental quantum cryptography system based on the transmissionmore » of non-orthogonal single-photon polarization states to generate shared key material over line-of-sight optical links. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on in orbit.« less
Counterfactual quantum cryptography based on weak coherent states
NASA Astrophysics Data System (ADS)
Yin, Zhen-Qiang; Li, Hong-Wei; Yao, Yao; Zhang, Chun-Mei; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2012-08-01
In the “counterfactual quantum cryptography” scheme [T.-G. Noh, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.230501 103, 230501 (2009)], two legitimate distant peers may share secret-key bits even when the information carriers do not travel in the quantum channel. The security of this protocol with an ideal single-photon source has been proved by Yin [Z.-Q. Yin, H. W. Li, W. Chen, Z. F. Han, and G. C. Guo, Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.82.042335 82, 042335 (2010)]. In this paper, we prove the security of the counterfactual-quantum-cryptography scheme based on a commonly used weak-coherent-laser source by considering a general collective attack. The basic assumption of this proof is that the efficiency and dark-counting rate of a single-photon detector are consistent for any n-photon Fock states. Then through randomizing the phases of the encoding weak coherent states, Eve's ancilla will be transformed into a classical mixture. Finally, the lower bound of the secret-key-bit rate and a performance analysis for the practical implementation are both given.
MIX and match: mobile T6SS MIX-effectors enhance bacterial fitness
Salomon, Dor
2016-01-01
ABSTRACT Protein secretion systems that mediate interbacterial competition secret a wide repertoire of antibacterial toxins. A major player in these competitions is the newly discovered bacterial type VI secretion system (T6SS). We recently found that a subset of polymorphic MIX-effectors, which are a widespread class of effectors secreted by T6SSs, are horizontally shared between marine bacteria and are used to diversify their T6SS effector repertoires, thus enhancing their environmental fitness. In this commentary, I expand on the ideas that were introduced in the previous report, and further speculate on the possible mobility of other MIX-effectors. In addition, I discuss the possible role of horizontal gene transfer in the dissemination of MIX-effectors through bacterial genomes, as well as its possible role in diversifying the T6SS effector repertoire. PMID:27066305
"In search of a tale they can live with": about loss, family secrets, and selective disclosure.
Rober, Peter; Walravens, Geertje; Versteynen, Leen
2012-07-01
Several authors have written about family secrets in the family therapy literature in interesting ways. According to these authors, the questions "who knows the secret?" and "who does not know the secret?" are central. In the present study, we have qualitatively analyzed the documentary film Familiegeheim (Family Secret) by the Dutch director Jaap van Hoewijk. The film shows van Hoewijk's investigation into the death of his father in 1974 and tells the story of a family in which the suicide of the father is kept secret from the three children. Our analysis of the film highlights the complex ways in which families deal with sensitive issues like loss, grief, and suicide. The concept of family secrets seems to poorly capture this complexity, focusing one-sidedly on the destructive effects of withholding delicate information. The concept of selective disclosure is proposed as an alternative. Selective disclosure refers to the complex processes involved in dealing with the dialectic tension between sharing information and keeping it secret. The concept is not only focused on the destructiveness of secrecy but, in addition, also makes room for an appreciation of the caution with which family members deal with sensitive family issues. © 2011 American Association for Marriage and Family Therapy.
Containing the secret of child sexual abuse.
McElvaney, Rosaleen; Greene, Sheila; Hogan, Diane
2012-04-01
This study reports a grounded theory study of the process of how children tell of their experiences of child sexual abuse from the perspectives of young people and their parents. Individual interviews were conducted with 22 young people aged 8 to 18, and 14 parents. A theoretical model was developed that conceptualises the process of disclosure as one of containing the secret of child sexual abuse. Three key dynamics were identified: the active withholding of the secret on the part of the child, the experience of a 'pressure cooker effect' reflecting a conflict between the wish to tell and the wish to keep the secret, and the confiding itself which often occurs in the context of an intimacy being shared. Children's experiences of disclosure were multidetermined and suggest the need for multifaceted and multisystemic approaches to prevention and intervention. The need for the secret to be contained, individually and interpersonally in appropriate safeguarding and therapeutic contexts needs to be respected in helping children tell.
Childhood Obesity: Common Misconceptions
... Issues Listen Español Text Size Email Print Share Childhood Obesity: Common Misconceptions Page Content Article Body Everyone, it ... for less than 1% of the cases of childhood obesity. Yes, hypothyroidism (a deficit in thyroid secretion) and ...
Rose, Ruth S.; Rangarajan, Minnie; Aduse-Opoku, Joseph; Hashim, Ahmed; Curtis, Michael A.
2012-01-01
Type I signal peptidases (SPases) cleave signal peptides from proteins during translocation across biological membranes and hence play a vital role in cellular physiology. SPase activity is also of fundamental importance to the pathogenesis of infection for many bacteria, including Pseudomonas aeruginosa, which utilizes a variety of secreted virulence factors, such as proteases and toxins. P. aeruginosa possesses two noncontiguous SPase homologues, LepB (PA0768) and PA1303, which share 43% amino acid identity. Reverse transcription (RT)-PCR showed that both proteases were expressed, while a FRET-based assay using a peptide based on the signal sequence cleavage region of the secreted LasB elastase showed that recombinant LepB and PA1303 enzymes were both active. LepB is positioned within a genetic locus that resembles the locus containing the extensively characterized SPase of E. coli and is of similar size and topology. It was also shown to be essential for viability and to have high sequence identity with SPases from other pseudomonads (≥78%). In contrast, PA1303, which is small for a Gram-negative SPase (20 kDa), was found to be dispensable. Mutation of PA1303 resulted in an altered protein secretion profile and increased N-butanoyl homoserine lactone production and influenced several quorum-sensing-controlled phenotypic traits, including swarming motility and the production of rhamnolipid and elastinolytic activity. The data indicate different cellular roles for these P. aeruginosa SPase paralogues; the role of PA1303 is integrated with the quorum-sensing cascade and includes the suppression of virulence factor secretion and virulence-associated phenotypes, while LepB is the primary SPase. PMID:22730125
Stewart, Andrew K.; Shmukler, Boris E.; Vandorpe, David H.; Reimold, Fabian; Heneghan, John F.; Nakakuki, M.; Akhavein, Arash; Ko, Shigeru; Ishiguro, Hiroshi
2011-01-01
The secretin-stimulated human pancreatic duct secretes HCO3−-rich fluid essential for normal digestion. Optimal stimulation of pancreatic HCO3− secretion likely requires coupled activities of the cystic fibrosis transmembrane regulator (CFTR) anion channel and apical SLC26 Cl−/HCO3− exchangers. However, whereas stimulated human and guinea pig pancreatic ducts secrete ∼140 mM HCO3− or more, mouse and rat ducts secrete ∼40–70 mM HCO3−. Moreover, the axial distribution and physiological roles of SLC26 anion exchangers in pancreatic duct secretory processes remain controversial and may vary among mammalian species. Thus the property of high HCO3− secretion shared by human and guinea pig pancreatic ducts prompted us to clone from guinea pig pancreatic duct cDNAs encoding Slc26a3, Slc26a6, and Slc26a11 polypeptides. We then functionally characterized these anion transporters in Xenopus oocytes and human embryonic kidney (HEK) 293 cells. In Xenopus oocytes, gpSlc26a3 mediated only Cl−/Cl− exchange and electroneutral Cl−/HCO3− exchange. gpSlc26a6 in Xenopus oocytes mediated Cl−/Cl− exchange and bidirectional exchange of Cl− for oxalate and sulfate, but Cl−/HCO3− exchange was detected only in HEK 293 cells. gpSlc26a11 in Xenopus oocytes exhibited pH-dependent Cl−, oxalate, and sulfate transport but no detectable Cl−/HCO3− exchange. The three gpSlc26 anion transporters exhibited distinct pharmacological profiles of 36Cl− influx, including partial sensitivity to CFTR inhibitors Inh-172 and GlyH101, but only Slc26a11 was inhibited by PPQ-102. This first molecular and functional assessment of recombinant SLC26 anion transporters from guinea pig pancreatic duct enhances our understanding of pancreatic HCO3− secretion in species that share a high HCO3− secretory output. PMID:21593449
Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Corndorf, Eric; Liang Chuang; Kanter, Gregory S.
2005-06-15
We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less
How Not to Let Secrets Out When Conducting Qualitative Research With Dyads.
Ummel, Deborah; Achille, Marie
2016-05-01
Confidentiality is one of the cornerstones of research involving human participants. Researchers are the frontline gatekeepers of their participants' right to confidentiality, and situations can arise that challenge this responsibility. This is the case when individuals who have shared a common experience (i.e., dyads) are interviewed separately, but interview results are disseminated within the context of dyads. Based on our experience of conducting research with dyads and given how little literature is available to serve as guide, we set out to write this article to share the knowledge we acquired and the solutions we found. We will describe both the ethical challenges and the methodological decisions involved in conducting qualitative research with dyads. The article also describes different modalities of dyadic analysis, their benefits and drawbacks. This endeavor seems especially relevant as research with dyads is emerging in several domains involving couples, families, caregivers and health. © The Author(s) 2016.
Amateur Astronomers: Secret Agents of EPO
NASA Astrophysics Data System (ADS)
Berendsen, M.; White, V.; Devore, E.; Reynolds, M.
2008-06-01
Amateur astronomers prime the public to be more interested, receptive, and excited about space science, missions, and programs. Through recent research and targeted programs, amateur astronomy outreach is being increasingly recognized by professional astronomers, educators, and other amateurs as a valued and important service. The Night Sky Network program, administered by the ASP, is the first nationwide research-based program specifically targeted to support outreach by amateur astronomers. This Network of trained and informed amateur astronomers can provide a stimulating introduction to your EPO programs as Network members share the night sky with families, students, and youth groups.
Muthukumar, P; Balasubramaniam, P; Ratnavelu, K
2017-07-26
This paper proposes a generalized robust synchronization method for different dimensional fractional order dynamical systems with mismatched fractional derivatives in the presence of function uncertainty and external disturbance by a designing sliding mode controller. Based on the proposed theory of generalized robust synchronization criterion, a novel audio cryptosystem is proposed for sending or sharing voice messages secretly via insecure channel. Numerical examples are given to verify the potency of the proposed theories. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Chatterjee, Seshadri Sekhar; Mitra, Sayantanava; Mallik, Nitu
2015-12-31
While fluoxetine (FXT) is a frequently prescribed selective serotonin reuptake inhibitor (SSRI), with few major side-effects; altered serotonergic transmissions in hypothalamic pathways might lead to a distressing, and often embarrassing, manifestation of galactorrhea by altering prolactin release in those on FXT. We report here a case of FXT-induced hyperprolactinemic galactorrhea developing late into treatment on a stable regimen, who responded well to subsequent replacement with sertraline. Based on present finding, we suggest that while SSRIs may share similar mechanisms of action, there exist individual differences in their effects on prolactin secretion pathways.
Eavesdropping on counterfactual quantum key distribution with finite resources
NASA Astrophysics Data System (ADS)
Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng
2014-08-01
A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.
On Hierarchical Threshold Access Structures
2010-11-01
One of the recent generalizations of (t, n) secret sharing for hierarchical threshold access structures is given by Tassa, where he answers the...of theoretical background. We give a conceptually simpler alternative for the understanding of the realization of hierarchical threshold access
Maclaren, Oliver J.; Sneyd, James; Crampin, Edmund J.
2012-01-01
Secretion from the salivary glands is driven by osmosis following the establishment of osmotic gradients between the lumen, the cell and the interstitium by active ion transport. We consider a dynamic model of osmotically-driven primary saliva secretion, and use singular perturbation approaches and scaling assumptions to reduce the model. Our analysis shows that isosmotic secretion is the most efficient secretion regime, and that this holds for single isolated cells and for multiple cells assembled into an acinus. For typical parameter variations, we rule out any significant synergistic effect on total water secretion of an acinar arrangement of cells about a single shared lumen. Conditions for the attainment of isosmotic secretion are considered, and we derive an expression for how the concentration gradient between the interstitium and the lumen scales with water and chloride transport parameters. Aquaporin knockout studies are interpreted in the context of our analysis and further investigated using simulations of transport efficiency with different membrane water permeabilities. We conclude that recent claims that aquaporin knockout studies can be interpreted as evidence against a simple osmotic mechanism are not supported by our work. Many of the results that we obtain are independent of specific transporter details, and our analysis can be easily extended to apply to models that use other proposed ionic mechanisms of saliva secretion. PMID:22258315
Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis.
Ates, Louis S; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R; van der Woude, Aniek D; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payán, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jiménez, Connie R; Pain, Arnab; Houben, Edith N G; Warren, Robin M; Brosch, Roland; Hernández-Pando, Rogelio; Bitter, Wilbert
2018-02-01
Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems 1,2 . The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus 3,4 . However, the role of these proteins remains largely elusive 1 . Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion 5 . Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the 'modern' Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution 6,7 .
Quantum cryptography for secure free-space communications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.
1999-03-01
The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up usingmore » the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.« less
Color extended visual cryptography using error diffusion.
Kang, InKoo; Arce, Gonzalo R; Lee, Heung-Kyu
2011-01-01
Color visual cryptography (VC) encrypts a color secret message into n color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.
Hussain, Hirra; Fisher, David I; Abbott, W Mark; Roth, Robert G; Dickson, Alan J
2017-10-01
Certain recombinant proteins are deemed "difficult to express" in mammalian expression systems requiring significant cell and/or process engineering to abrogate expression bottlenecks. With increasing demand for the production of recombinant proteins in mammalian cells, low protein yields can have significant consequences for industrial processes. To investigate the molecular mechanisms that restrict expression of recombinant proteins, naturally secreted model proteins were analyzed from the tissue inhibitors of metalloproteinase (TIMP) protein family. In particular, TIMP-2 and TIMP-3 were subjected to detailed study. TIMP proteins share significant sequence homology (∼50% identity and ∼70% similarity in amino acid sequence). However, they show marked differences in secretion in mammalian expression systems despite this extensive sequence homology. Using these two proteins as models, this study characterized the molecular mechanisms responsible for poor recombinant protein production. Our results reveal that both TIMP-2 and TIMP-3 are detectable at mRNA and protein level within the cell but only TIMP-2 is secreted effectively into the extracellular medium. Analysis of protein localization and the nature of intracellular protein suggest TIMP-3 is severely limited in its post-translational processing. To overcome this challenge, modification of the TIMP-3 sequence to include a furin protease-cleavable pro-sequence resulted in secretion of the modified TIMP-3 protein, however, incomplete processing was observed. Based on the TIMP-3 data, the protein engineering approach was optimized and successfully applied in combination with cell engineering, the overexpression of furin, to another member of the TIMP protein family (the poorly expressed TIMP-4). Use of the described protein engineering strategy resulted in successful secretion of poorly (TIMP-4) and non-secreted (TIMP-3) targets, and presents a novel strategy to enhance the production of "difficult" recombinant targets. Biotechnol. Bioeng. 2017;114: 2348-2359. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION VESSEL FINANCING ASSISTANCE OBLIGATION GUARANTEES Introduction § 298... if you are not a well established firm with strong financial qualifications and strong market shares... attachments, contains information you consider to be trade secrets or commercial or financial information and...
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Supporting reputation based trust management enhancing security layer for cloud service models
NASA Astrophysics Data System (ADS)
Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.
2017-11-01
In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.
Pituitary-hormone secretion by thyrotropinomas.
Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M; Biermasz, Nienke R; Smit, Jan W; Frolich, Marijke; Keenan, Daniel M; Veldhuis, Johannes D; Romijn, Johannes A
2009-01-01
Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore evaluated TSH, GH and PRL secretion in 6 patients with up-to-date analytical and mathematical tools by 24-h blood sampling at 10-min intervals in a clinical research laboratory. The profiles were analyzed with a new deconvolution method, approximate entropy, cross-approximate entropy, cross-correlation and cosinor regression. TSH burst frequency and basal and pulsatile secretion were increased in patients compared with controls. TSH secretion patterns in patients were more irregular, but the diurnal rhythm was preserved at a higher mean with a 2.5 h phase delay. Although only one patient had clinical acromegaly, GH secretion and IGF-I levels were increased in two other patients and all three had a significant cross-correlation between the GH and TSH. PRL secretion was increased in one patient, but all patients had a significant cross-correlation with TSH and showed decreased PRL regularity. Cross-ApEn synchrony between TSH and GH did not differ between patients and controls, but TSH and PRL synchrony was reduced in patients. We conclude that TSH secretion by thyrotropinomas shares many characteristics of other pituitary hormone-secreting adenomas. In addition, abnormalities in GH and PRL secretion exist ranging from decreased (joint) regularity to overt hypersecretion, although not always clinically obvious, suggesting tumoral transformation of thyrotrope lineage cells.
Quantum cryptography over underground optical fibers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Luther, G.G.; Morgan, G.L.
1996-05-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generated shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing to Heisenberg`s uncertainty principle. In this paper the authors describe the theory of quantum cryptography, and the most recent results from their experimental system with which they are generating key material over 14-km of underground optical fiber. These results show that optical-fiber based quantum cryptography could allow secure,more » real-time key generation over ``open`` multi-km node-to-node optical fiber communications links between secure ``islands.``« less
Enabling the MLSpOC (Multi-Level Space Operations Center) of the Future
NASA Astrophysics Data System (ADS)
Missal, D.
2012-09-01
The Intelligence Reform and Terrorism Prevention Act, passed by Congress in 2004, established the expectation that the "vast intelligence enterprise" of the United States would become more unified, coordinated, and effective. This law charged the intelligence community and government agencies to integrate foreign intelligence and domestic US intelligence components to reduce gaps in understanding threats to our national security and to improve our reaction. This intelligence strategy — designed to provide more comprehensive and accurate intelligence analysis—substantially increases requirements for secure data sharing capabilities. An information system must be Certified & Accredited (C&A) by the appropriate Accreditation Authority in accordance with each Authority's prescribed compliance requirements and governance. Cross-Domain Solutions (CDSs) can provide the ability to share data between multiple operating domains (e.g. among users on Top Secret and Secret networks). However, sharing sensitive data across security domains and networks has been impeded by both technical and cultural challenges. A viable CDS requires a tremendous investment for initial C&A and many solutions are limited with respect to the integration of an organization's applications. As a result, most of today's highly secured systems have been designed to restrict access to entire user populations rather than implement data sharing on the basis of mandatory access controls and an individual's need-to-know. Most CDSs today are based on one-way replication through data transfer guards that copy data from one network to another. This model inherently builds in additional and extensive Operations and Maintenance (O&M) costs. Oracle's National Security Group challenged its top engineers and security architects to engineer the first Cross-Domain database providing a practical and robust solution to the Cross-Domain security problem. The result is the MLSpOC, which is deployed, fielded, and accredited today at multiple sites both CONUS and OCONUS. It is designed to assist information systems developers achieve DCID 6/3 Protection Level 4 or 5 (PL4 or PL5) or DoD SABI C&A for SECRET-to-UNCLASSIFIED systems (PL3). The product is on the DoD/DNI Unified Cross-domain Management Office's (UCDMO) Baseline of accredited solutions, and is the only solution on the Baseline which the Government considers to be an "All-in-One" approach to the Cross-domain Security challenge. Our solution is also the only PL-4 Cloud in existence and that is deployed and operational in the entire world today (at DIA). The Space marketplace is a very unique cross-domain challenge, as a need exists for Unclassified SSA Data Sharing at a deeper and more fundamental level than anywhere else in the IC or DoD. For instance, certain Agencies and/or Programs have a requirement to share information with Partner Nations that are not considered to be "friendly" (e.g. China). Our Solution is the ONLY solution in the world today that's achieved C&A, and that is uniquely positioned to enable the Multi-level Space Operations Center (MLSpOC) of the Future.
Modified Multi Prime RSA Cryptosystem
NASA Astrophysics Data System (ADS)
Ghazali Kamardan, M.; Aminudin, N.; Che-Him, Norziha; Sufahani, Suliadi; Khalid, Kamil; Roslan, Rozaini
2018-04-01
RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to decryption. Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. Then, a modification is made to the Multi prime RSA where another keys is shared secretly between the receiver and the sender to increase the securerity. As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. Key Generation in which the secret and public keys are generated and published. In this phase, the secrecy is improved by adding more prime numbers and addition of secret keys. 2. Encryption of the message using the public and secret keys given. 3. Decryption of the secret message using the secret key generated. For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. Furthermore, in modified Multi prime RSA another secret key is introduced to increase the obstacle to the attacker. Therefore, it is strongly believed that this new algorithm is better and can be an alternative to the RSA.
Counterfactual attack on counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wnang, Jian; Tang, Chao Jing
2012-05-01
It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.
High-efficiency reconciliation for continuous variable quantum key distribution
NASA Astrophysics Data System (ADS)
Bai, Zengliang; Yang, Shenshen; Li, Yongmin
2017-04-01
Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.
Diverse CLE peptides from cyst nematode species
USDA-ARS?s Scientific Manuscript database
Plant CLAVATA3/ESR (CLE)-like peptides play diverse roles in plant growth and development including maintenance of the stem cell population in the root meristem. Small secreted peptides sharing similarity to plant CLE signaling peptides have been isolated from several cyst nematode species including...
ERIC Educational Resources Information Center
Good, Rebecca
2008-01-01
Instructional leadership is defined in a broader yet more intense definition today than it was 20 years ago. Originally, the role involved traditional tasks such as setting clear goals, allocating resources to instruction, managing the curriculum, monitoring lesson plans, and evaluating teachers. Today it includes much deeper involvement in the…
ERIC Educational Resources Information Center
Mathematics Teacher, 1985
1985-01-01
Discusses: (1) use of matrix techniques to write secret codes (includes ready-to-duplicate worksheets); (2) a method of multiplication and division of polynomials in one variable that is not tedius, time-consuming, or dependent on guesswork; and (3) adding and subtracting rational expressions and solving rational equations. (JN)
Role of nematode peptides and other small molecules in plant parasitism
USDA-ARS?s Scientific Manuscript database
Molecular, genetic, and biochemical studies are demonstrating an increasingly important role of peptide signaling in nematode parasitism of plants. To date, the majority of nematode-secreted peptides identified share similarity with plant CLAVATA3/ESR (CLE) peptides, but bioinformatics analyses of n...
Defense Acquisition Review Journal. Volume 15, Number 3, Issue 49, December 2008
2008-12-01
objectives (Bennis & Biederman , 1997). The Defense Acquisition University and many of its external corporate university partners share the belief that an... Biederman , P. W. (1997). Organizing genius: The secrets of creative collaboration. Reading, MA: Addison-Wesley. Beyerlein, M. (1995). Measuring
Gaussian private quantum channel with squeezed coherent states
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-01-01
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime. PMID:26364893
Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation
NASA Astrophysics Data System (ADS)
Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry
The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).
Gaussian private quantum channel with squeezed coherent states.
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-09-14
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime.
Discovering and Sharing of Secret Architectures: the Hidden Tomb of the Pharaoh of El-Khasneh Jordan
NASA Astrophysics Data System (ADS)
Malinverni, E. S.; Pierdicca, R.
2017-02-01
The documentation of the archaeological heritage through 3D models to know ancient findings, has become a common practice within the international panorama. Using minimal hardware, as well as its ease of use in almost every environmental condition, make 3D sampling solutions based on Multiple View Stereo (MVS) matching and Structure from Motion techniques ideal for on-site documentation of excavations or emergencies. Moreover, the availability of inexpensive platforms for web-based visualization represents great benefit in the field of archaeology, where generally the low budged and the limitation of more complex instruments are a must. The case study presented in these pages, experienced in Petra, Jordan, moves towards this direction. In the close proximity of the El- Khasneh façade, is situated an excavation where two entrance, well preserved, give access to the Tomb of Pharaoh. The documentation described in these pages has the twofold objective of providing the research community with a priceless dataset, acquired for one of the most important heritage of the world that is partially still unknown and to share on line these computations. This work confirms how cultural heritage documentation and dissemination of architectural rests, that are important for tourism and their interactive visualization, can strongly benefit from the creation of 3D models and their sharing on the web. This particular archaeological setting is an interesting base for investigation, given the complexity of the structure and its precarious condition.
Joint Remote State Preparation of a Single-Atom Qubit State via a GHZ Entangled State
NASA Astrophysics Data System (ADS)
Xiao, Xiao-Qi; Yao, Fengwei; Lin, Xiaochen; Gong, Lihua
2018-04-01
We proposed a physical protocol for the joint remote preparation of a single-atom qubit state via a three-atom entangled GHZ-type state previously shared by the two senders and one receiver. Only rotation operations of single-atom, which can be achieved though the resonant interaction between the two-level atom and the classical field, are required in the scheme. It shows that the splitting way of the classical information of the secret qubit not only determines the success of reconstruction of the secret qubit, but also influences the operations of the senders.
Deconstructing The Bomb: Confessions of a Nuclear Archeologist
NASA Astrophysics Data System (ADS)
Coster-Mullen, John
2017-01-01
I am the author of the groundbreaking book Atom Bombs: The Top Secret Inside Story of Little Boy and Fat Man. I will be sharing some of my quarter century of research and methodology that has allowed me to be the first researcher ever to unravel with an unprecedented level of accuracy, the most closely-guarded secrets of the first two Atomic Bombs (``Little Boy'' and ``Fat Man'') created by the Manhattan Project that were used to end WWII. I refer to this methodology as ``Nuclear Archeology'' and will demonstrate that this was done using entirely ``Open Sources'' of information.
Molecular Cloning of Secreted Luciferases from Marine Planktonic Copepods.
Takenaka, Yasuhiro; Ikeo, Kazuho; Shigeri, Yasushi
2016-01-01
Secreted luciferases isolated from copepod crustaceans are frequently used for nondisruptive reporter-gene assays, such as the continuous, automated and/or high-throughput monitoring of gene expression in living cells. All known copepod luciferases share highly conserved amino acid residues in two similar, repeated domains in the sequence. The similarity in the domains are ideal nature for designing PCR primers to amplify cDNA fragments of unidentified copepod luciferases from bioluminescent copepod crustaceans. Here, we introduce how to establish a cDNA encoding novel copepod luciferases from a copepod specimen by PCR with degenerated primers.
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-03-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-06-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
2010-06-01
child pornography, copyright infringement, or aiding and abetting in any infraction.32 26...research, but now that it is being used to share everything from porn to state secrets the trust is no longer warranted. 68 Other authors have
Book, Adam J.; Lewin, Gina R.; McDonald, Bradon R.; Takasuka, Taichi E.; Doering, Drew T.; Adams, Aaron S.; Blodgett, Joshua A. V.; Clardy, Jon; Raffa, Kenneth F.; Fox, Brian G.
2014-01-01
Actinobacteria in the genus Streptomyces are critical players in microbial communities that decompose complex carbohydrates in the soil, and these bacteria have recently been implicated in the deconstruction of plant polysaccharides for some herbivorous insects. Despite the importance of Streptomyces to carbon cycling, the extent of their plant biomass-degrading ability remains largely unknown. In this study, we compared four strains of Streptomyces isolated from insect herbivores that attack pine trees: DpondAA-B6 (SDPB6) from the mountain pine beetle, SPB74 from the southern pine beetle, and SirexAA-E (SACTE) and SirexAA-G from the woodwasp, Sirex noctilio. Biochemical analysis of secreted enzymes demonstrated that only two of these strains, SACTE and SDPB6, were efficient at degrading plant biomass. Genomic analyses indicated that SACTE and SDPB6 are closely related and that they share similar compositions of carbohydrate-active enzymes. Genome-wide proteomic and transcriptomic analyses revealed that the major exocellulases (GH6 and GH48), lytic polysaccharide monooxygenases (AA10), and mannanases (GH5) were conserved and secreted by both organisms, while the secreted endocellulases (GH5 and GH9 versus GH9 and GH12) were from diverged enzyme families. Together, these data identify two phylogenetically related insect-associated Streptomyces strains with high biomass-degrading activity and characterize key enzymatic similarities and differences used by these organisms to deconstruct plant biomass. PMID:24837391
NASA Astrophysics Data System (ADS)
Fridrich, Jessica; Goljan, Miroslav; Lisonek, Petr; Soukal, David
2005-03-01
In this paper, we show that the communication channel known as writing in memory with defective cells is a relevant information-theoretical model for a specific case of passive warden steganography when the sender embeds a secret message into a subset C of the cover object X without sharing the selection channel C with the recipient. The set C could be arbitrary, determined by the sender from the cover object using a deterministic, pseudo-random, or a truly random process. We call this steganography "writing on wet paper" and realize it using low-density random linear codes with the encoding step based on the LT process. The importance of writing on wet paper for covert communication is discussed within the context of adaptive steganography and perturbed quantization steganography. Heuristic arguments supported by tests using blind steganalysis indicate that the wet paper steganography provides improved steganographic security for embedding in JPEG images and is less vulnerable to attacks when compared to existing methods with shared selection channels.
Quantum tagging for tags containing secret classical data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian
Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less
Different Worlds: Same Secret.
ERIC Educational Resources Information Center
Springfield City Library, MA.
The "Brightwood New Authors Project" brought together a group of ten adults from many different ethnic and educational backgrounds to share in the experience of writing and publishing a book. The prose and poetry that resulted from weekly writing workshops featured guest humanities scholars and teachers. Titles include "I Remember When I Met...";…
Rigor Made Easy: Getting Started
ERIC Educational Resources Information Center
Blackburn, Barbara R.
2012-01-01
Bestselling author and noted rigor expert Barbara Blackburn shares the secrets to getting started, maintaining momentum, and reaching your goals. Learn what rigor looks like in the classroom, understand what it means for your students, and get the keys to successful implementation. Learn how to use rigor to raise expectations, provide appropriate…
He, S Y; Lindeberg, M; Chatterjee, A K; Collmer, A
1991-02-01
The out genes of the enterobacterial plant pathogen Erwinia chrysanthemi are responsible for the efficient extracellular secretion of multiple plant cell wall-degrading enzymes, including four isozymes of pectate lyase, exo-poly-alpha-D-galacturonosidase, pectin methylesterase, and cellulase. Out- mutants of Er. chrysanthemi are unable to export any of these proteins beyond the periplasm and are severely reduced in virulence. We have cloned out genes from Er. chrysanthemi in the stable, low-copy-number cosmid pCPP19 by complementing several transposon-induced mutations. The cloned out genes were clustered in a 12-kilobase chromosomal DNA region, complemented all existing out mutations in Er. chrysanthemi EC16, and enabled Escherichia coli strains to efficiently secrete the extracellular pectic enzymes produced from cloned Er. chrysanthemi genes, while retaining the periplasmic marker protein beta-lactamase. DNA sequencing of a 2.4-kilobase EcoRI fragment within the out cluster revealed four genes arranged colinearly and sharing substantial similarity with the Klebsiella pneumoniae genes pulH, pulI, pulJ, and pulK, which are necessary for pullulanase secretion. However, K. pneumoniae cells harboring the cloned Er. chrysanthemi pelE gene were unable to secrete the Erwinia pectate lyase. Furthermore, the Er. chrysanthemi Out system was unable to secrete an extracellular pectate lyase encoded by a gene from a closely related plant pathogen. Erwinia carotovora ssp. carotovora. The results suggest that these enterobacteria secrete polysaccharidases by a conserved mechanism whose protein-recognition capacities have diverged.
The Role of Incretins in Glucose Homeostasis and Diabetes Treatment
Kim, Wook; Egan, Josephine M.
2009-01-01
Incretins are gut hormones that are secreted from enteroendocrine cells into the blood within minutes after eating. One of their many physiological roles is to regulate the amount of insulin that is secreted after eating. In this manner, as well as others to be described in this review, their final common raison d’être is to aid in disposal of the products of digestion. There are two incretins, known as glucose-dependent insulinotropic peptide (GIP) and glucagon-like peptide-1 (GLP-1), that share many common actions in the pancreas but have distinct actions outside of the pancreas. Both incretins are rapidly deactivated by an enzyme called dipeptidyl peptidase 4 (DPP4). A lack of secretion of incretins or an increase in their clearance are not pathogenic factors in diabetes. However, in type 2 diabetes (T2DM), GIP no longer modulates glucose-dependent insulin secretion, even at supraphysiological (pharmacological) plasma levels, and therefore GIP incompetence is detrimental to β-cell function, especially after eating. GLP-1, on the other hand, is still insulinotropic in T2DM, and this has led to the development of compounds that activate the GLP-1 receptor with a view to improving insulin secretion. Since 2005, two new classes of drugs based on incretin action have been approved for lowering blood glucose levels in T2DM: an incretin mimetic (exenatide, which is a potent long-acting agonist of the GLP-1 receptor) and an incretin enhancer (sitagliptin, which is a DPP4 inhibitor). Exenatide is injected subcutaneously twice daily and its use leads to lower blood glucose and higher insulin levels, especially in the fed state. There is glucose-dependency to its insulin secretory capacity, making it unlikely to cause low blood sugars (hypoglycemia). DPP4 inhibitors are orally active and they increase endogenous blood levels of active incretins, thus leading to prolonged incretin action. The elevated levels of GLP-1 are thought to be the mechanism underlying their blood glucose-lowering effects. PMID:19074620
Rate-loss analysis of an efficient quantum repeater architecture
NASA Astrophysics Data System (ADS)
Guha, Saikat; Krovi, Hari; Fuchs, Christopher A.; Dutton, Zachary; Slater, Joshua A.; Simon, Christoph; Tittel, Wolfgang
2015-08-01
We analyze an entanglement-based quantum key distribution (QKD) architecture that uses a linear chain of quantum repeaters employing photon-pair sources, spectral-multiplexing, linear-optic Bell-state measurements, multimode quantum memories, and classical-only error correction. Assuming perfect sources, we find an exact expression for the secret-key rate, and an analytical description of how errors propagate through the repeater chain, as a function of various loss-and-noise parameters of the devices. We show via an explicit analytical calculation, which separately addresses the effects of the principle nonidealities, that this scheme achieves a secret-key rate that surpasses the Takeoka-Guha-Wilde bound—a recently found fundamental limit to the rate-vs-loss scaling achievable by any QKD protocol over a direct optical link—thereby providing one of the first rigorous proofs of the efficacy of a repeater protocol. We explicitly calculate the end-to-end shared noisy quantum state generated by the repeater chain, which could be useful for analyzing the performance of other non-QKD quantum protocols that require establishing long-distance entanglement. We evaluate that shared state's fidelity and the achievable entanglement-distillation rate, as a function of the number of repeater nodes, total range, and various loss-and-noise parameters of the system. We extend our theoretical analysis to encompass sources with nonzero two-pair-emission probability, using an efficient exact numerical evaluation of the quantum state propagation and measurements. We expect our results to spur formal rate-loss analysis of other repeater protocols and also to provide useful abstractions to seed analyses of quantum networks of complex topologies.
A family of tissue-specific resistin-like molecules
Steppan, Claire M.; Brown, Elizabeth J.; Wright, Christopher M.; Bhat, Savitha; Banerjee, Ronadip R.; Dai, Charlotte Y.; Enders, Gregory H.; Silberg, Debra G.; Wen, Xiaoming; Wu, Gary D.; Lazar, Mitchell A.
2001-01-01
We have identified a family of resistin-like molecules (RELMs) in rodents and humans. Resistin is a hormone produced by fat cells. RELMα is a secreted protein that has a restricted tissue distribution with highest levels in adipose tissue. Another family member, RELMβ, is a secreted protein expressed only in the gastrointestinal tract, particularly the colon, in both mouse and human. RELMβ gene expression is highest in proliferative epithelial cells and is markedly increased in tumors, suggesting a role in intestinal proliferation. Resistin and the RELMs share a cysteine composition and other signature features. Thus, the RELMs together with resistin comprise a class of tissue-specific signaling molecules. PMID:11209052
A family of tissue-specific resistin-like molecules.
Steppan, C M; Brown, E J; Wright, C M; Bhat, S; Banerjee, R R; Dai, C Y; Enders, G H; Silberg, D G; Wen, X; Wu, G D; Lazar, M A
2001-01-16
We have identified a family of resistin-like molecules (RELMs) in rodents and humans. Resistin is a hormone produced by fat cells. RELMalpha is a secreted protein that has a restricted tissue distribution with highest levels in adipose tissue. Another family member, RELMbeta, is a secreted protein expressed only in the gastrointestinal tract, particularly the colon, in both mouse and human. RELMbeta gene expression is highest in proliferative epithelial cells and is markedly increased in tumors, suggesting a role in intestinal proliferation. Resistin and the RELMs share a cysteine composition and other signature features. Thus, the RELMs together with resistin comprise a class of tissue-specific signaling molecules.
Self-Chaperoning of the Type III Secretion System needle tip proteins IpaD and BipD
Johnson, Steven; Roversi, Pietro; Espina, Marianela; Olive, Andrew; Deane, Janet E.; Birket, Susan; Field, Terry; Picking, William D.; Blocker, Ariel; Galyov, Edouard E.; Picking, Wendy L.; Lea, Susan M.
2007-01-01
Bacteria expressing type III secretion systems (T3SS) have been responsible for the deaths of millions worldwide, acting as key virulence elements in diseases ranging from plague to typhoid fever. The T3SS is composed of a basal body, which traverses both bacterial membranes, and an external needle through which effector proteins are secreted. We report multiple crystal structures of two proteins that sit at the tip of the needle and are essential for virulence; IpaD from Shigella flexneri and BipD from Burkholderia pseudomallei. The structures reveal that the N-terminal domains of the molecules are intra-molecular chaperones that prevent premature oligomerization, as well as sharing structural homology with proteins involved in eukaryotic actin rearrangement. Crystal packing has allowed us to construct a model for the tip complex that is supported by mutations designed using the structure. PMID:17077085
Self-chaperoning of the type III secretion system needle tip proteins IpaD and BipD.
Johnson, Steven; Roversi, Pietro; Espina, Marianela; Olive, Andrew; Deane, Janet E; Birket, Susan; Field, Terry; Picking, William D; Blocker, Ariel J; Galyov, Edouard E; Picking, Wendy L; Lea, Susan M
2007-02-09
Bacteria expressing type III secretion systems (T3SS) have been responsible for the deaths of millions worldwide, acting as key virulence elements in diseases ranging from plague to typhoid fever. The T3SS is composed of a basal body, which traverses both bacterial membranes, and an external needle through which effector proteins are secreted. We report multiple crystal structures of two proteins that sit at the tip of the needle and are essential for virulence: IpaD from Shigella flexneri and BipD from Burkholderia pseudomallei. The structures reveal that the N-terminal domains of the molecules are intramolecular chaperones that prevent premature oligomerization, as well as sharing structural homology with proteins involved in eukaryotic actin rearrangement. Crystal packing has allowed us to construct a model for the tip complex that is supported by mutations designed using the structure.
Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"
NASA Astrophysics Data System (ADS)
Gu, Jun; Hwang, Tzonelih
2017-10-01
Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.
ERIC Educational Resources Information Center
Steinkamp, Erin
2016-01-01
Valley Park Middle School (VPMS) in Valley Park, MO, has the unique designation of being a not-so-secret gem in St. Louis County. The middle school shares its campus with the elementary and high school, creating opportunities to collaborate and work together to build a school district that not only shines academically, but also focuses on…
Boys' Friendships during Adolescence: Intimacy, Desire, and Loss
ERIC Educational Resources Information Center
Way, Niobe
2013-01-01
Longitudinal, mixed method research on friendships, conducted over the past two decades with Black, Latino, Asian, and European American boys, reveals three themes: (1) the importance for boys of being able to share their secrets with their close friends; (2) the importance of close friendships for boys' mental health; and (3) the loss of but…
Launching a Wireless Laptop Program
ERIC Educational Resources Information Center
Grignano, Domenic
2007-01-01
In this article, the author, as a technology director for East Rock Magnet School in New Haven, Connecticut, a federal government test site for laptop learning, shares his secrets to a successful implementation of a wireless laptop program: (1) Build a wireless foundation; (2) Do not choose the cheapest model just because of budget; (3) A sturdy…
ERIC Educational Resources Information Center
Wilhelm, Jeffrey D.
2012-01-01
The secret to teaching may be as simple as asking students good questions--and then giving them the opportunity to find the answers. The author shares how he uses essential questions that set the class off on an inquiry. Rather than consuming information that he distributes and then repeating it on a test, students carry out their own…
Let Me Share a Secret with You! Teaching with Computers.
ERIC Educational Resources Information Center
de Vasconcelos, Maria
The author describes her experiences teaching a computer-enhanced Modern Poetry course. The author argues that using computers enhances the concept of the classroom as learning community. It was the author's experience that students' postings on the discussion board created an atmosphere that encouraged student involvement, as opposed to the…
13 Tips for Virtual World Teaching
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Multi-user virtual environments (MUVEs) are gaining momentum as the latest and greatest learning tool in the world of education technology. How does one get started with them? How do they work? This article shares 13 secrets from immersive education experts and educators on how to have success in implementing these new tools and technologies on…
Deadly Lessons: School Shooters Tell Why. Sun-Times Exclusive Report.
ERIC Educational Resources Information Center
Chicago Sun-Times, IL.
This document represents a compilation of newspaper articles analyzing information shared by the Secret Service concerning 37 school shootings. The findings are presented to educate parents and teachers concerning what has been learned about violent students. It was determined that there is no profile of a typical youth who kills. The shooter is…
Mathematicians in Schools: Uncovering Maths' Beautiful Secrets
ERIC Educational Resources Information Center
Welch, Bronwyn
2016-01-01
Mathematics professionals are working with teachers revealing the reality and beauty that happens in the world of math and to show that this is essentially a "human endeavour," embedded in much of what people do and the ways in which they think. In this article, the author shares vignettes of primary classes working with mathematicians…
Changes at the National Geographic Society
ERIC Educational Resources Information Center
Schwille, Kathleen
2016-01-01
For more than 125 years, National Geographic has explored the planet, unlocking its secrets and sharing them with the world. For almost thirty of those years, National Geographic has been committed to K-12 educators and geographic education through its Network of Alliances. As National Geographic begins a new chapter, they remain committed to the…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phan, Jason; Tropea, Joseph E.; Waugh, David S.
2010-11-16
Pathogenic Yersinia species use a type III secretion system to inject cytotoxic effector proteins directly into the cytosol of mammalian cells, where they neutralize the innate immune response by interfering with the signal-transduction pathways that control phagocytosis and inflammation. To be exported efficiently, some effectors must transiently associate with cognate cytoplasmic secretion chaperones. SycH is the chaperone for YopH, a potent eukaryotic-like protein tyrosine phosphatase that is essential for virulence. SycH also binds two negative regulators of type III secretion, YscM1 and YscM2, both of which share significant sequence homology with the chaperone-binding domain of YopH. Here, the structure ofmore » a complex between SycH and a stable fragment of YscM2 that was designed on the basis of limited proteolysis experiments is presented. The overall fold of SycH is very similar to the structures of other homodimeric secretion chaperones that have been determined to date. YscM2 wraps around SycH in an extended fashion, with some secondary but no tertiary structure, assuming a conformation distinct from the globular fold that it is predicted to adopt in the absence of SycH.« less
Secure data sharing in public cloud
NASA Astrophysics Data System (ADS)
Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.
2012-04-01
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
He, S Y; Lindeberg, M; Chatterjee, A K; Collmer, A
1991-01-01
The out genes of the enterobacterial plant pathogen Erwinia chrysanthemi are responsible for the efficient extracellular secretion of multiple plant cell wall-degrading enzymes, including four isozymes of pectate lyase, exo-poly-alpha-D-galacturonosidase, pectin methylesterase, and cellulase. Out- mutants of Er. chrysanthemi are unable to export any of these proteins beyond the periplasm and are severely reduced in virulence. We have cloned out genes from Er. chrysanthemi in the stable, low-copy-number cosmid pCPP19 by complementing several transposon-induced mutations. The cloned out genes were clustered in a 12-kilobase chromosomal DNA region, complemented all existing out mutations in Er. chrysanthemi EC16, and enabled Escherichia coli strains to efficiently secrete the extracellular pectic enzymes produced from cloned Er. chrysanthemi genes, while retaining the periplasmic marker protein beta-lactamase. DNA sequencing of a 2.4-kilobase EcoRI fragment within the out cluster revealed four genes arranged colinearly and sharing substantial similarity with the Klebsiella pneumoniae genes pulH, pulI, pulJ, and pulK, which are necessary for pullulanase secretion. However, K. pneumoniae cells harboring the cloned Er. chrysanthemi pelE gene were unable to secrete the Erwinia pectate lyase. Furthermore, the Er. chrysanthemi Out system was unable to secrete an extracellular pectate lyase encoded by a gene from a closely related plant pathogen. Erwinia carotovora ssp. carotovora. The results suggest that these enterobacteria secrete polysaccharidases by a conserved mechanism whose protein-recognition capacities have diverged. Images PMID:1992458
Uncoupling of Secretion From Growth in Some Hormone Secretory Tissues
2014-01-01
Context: Most syndromes with benign primary excess of a hormone show positive coupling of hormone secretion to size or proliferation in the affected hormone secretory tissue. Syndromes that lack this coupling seem rare and have not been examined for unifying features among each other. Evidence Acquisition: Selected clinical and basic features were analyzed from original reports and reviews. We examined indices of excess secretion of a hormone and indices of size of secretory tissue within the following three syndromes, each suggestive of uncoupling between these two indices: familial hypocalciuric hypercalcemia, congenital diazoxide-resistant hyperinsulinism, and congenital primary hyperaldosteronism type III (with G151E mutation of the KCNJ5 gene). Evidence Synthesis: Some unifying features among the three syndromes were different from features present among common tumors secreting the same hormone. The unifying and distinguishing features included: 1) expression of hormone excess as early as the first days of life; 2) normal size of tissue that oversecretes a hormone; 3) diffuse histologic expression in the hormonal tissue; 4) resistance to treatment by subtotal ablation of the hormone-secreting tissue; 5) causation by a germline mutation; 6) low potential of the same mutation to cause a tumor by somatic mutation; and 7) expression of the mutated molecule in a pathway between sensing of a serum metabolite and secretion of hormone regulating that metabolite. Conclusion: Some shared clinical and basic features of uncoupling of secretion from size in a hormonal tissue characterize three uncommon states of hormone excess. These features differ importantly from features of common hormonal neoplasm of that tissue. PMID:25004249
Paes, Jéssica A; Lorenzatto, Karina R; de Moraes, Sofia N; Moura, Hercules; Barr, John R; Ferreira, Henrique B
2017-02-10
Mycoplasma hyopneumoniae and Mycoplasma flocculare cohabit the porcine respiratory tract. However, M. hyopneumoniae causes the porcine enzootic pneumonia, while M. flocculare is a commensal bacterium. Comparative analyses demonstrated high similarity between these species, which includes the sharing of all predicted virulence factors. Nevertheless, studies related to soluble secretomes of mycoplasmas were little known, although they are important for bacterial-host interactions. The aim of this study was to perform a comparative analysis between the soluble secreted proteins repertoires of the pathogenic Mycoplasma hyopneumoniae and its closely related commensal Mycoplasma flocculare. For that, bacteria were cultured in medium with reduced serum concentration and secreted proteins were identified by a LC-MS/MS proteomics approach. Altogether, 62 and 26 proteins were identified as secreted by M. hyopneumoniae and M. flocculare, respectively, being just seven proteins shared between these bacteria. In M. hyopneumoniae secretome, 15 proteins described as virulence factors were found; while four putative virulence factors were identified in M. flocculare secretome. For the first time, clear differences related to virulence were found between these species, helping to elucidate the pathogenic nature of M. hyopneumoniae to swine hosts. For the first time, the secretomes of two porcine respiratory mycoplasmas, namely the pathogenic M. hyopneumoniae and the commensal M. flocculare were compared. The presented results revealed previously unknown differences between these two genetically related species, some of which are associated to the M. hyopneumoniae ability to cause porcine enzootic pneumonia. Copyright © 2016 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Ying, Yu; Meng, Dongdong; Chen, Xiaohua; Li, Fuli
2013-08-15
An anaerobic, extremely thermophilic, and cellulose- and xylan-degrading bacterium F32 was isolated from biocompost. Sequence analysis of the 16S rRNA gene of this strain showed that it was closely related to Caldicellulosiruptor saccharolyticus DSM 8903 (99.0% identity). Physiological and biochemical data also supported that identification of strain F32 as a Caldicellulosiruptor species. The proteins secreted by Caldicellulosiruptor sp. F32 grown on xylan showed a xylanase activity of 7.74U/mg, which was 2.5 times higher than that of C. saccharolyticus DSM 8903. Based on the genomic sequencing data, 2 xylanase genes, JX030400 and JX030401, were identified in Caldicellulosiruptor sp. F32. The xylanase encoded by JX030401 shared 97% identity with Csac_0696 of C. saccharolyticus DSM 8903, while that encoded by JX030400 shared 94% identity with Athe_0089 of C. bescii DSM 6725, which was not found in the genome of strain DSM 8903. Xylanse encoded by JX030400 had 9-fold higher specific activity than JX030401. Our results indicated that although the 2 strains shared high identity, the xylanase system in Caldicellulosiruptor sp. F32 was more efficient than that in C. saccharolyticus DSM 8903. Copyright © 2013 Elsevier Inc. All rights reserved.
Three-step semiquantum secure direct communication protocol
NASA Astrophysics Data System (ADS)
Zou, XiangFu; Qiu, DaoWen
2014-09-01
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.
Salivary Glands in Predatory Mollusks: Evolutionary Considerations.
Ponte, Giovanna; Modica, Maria Vittoria
2017-01-01
Many marine mollusks attain or increase their predatory efficiency using complex chemical secretions, which are often produced and delivered through specialized anatomical structures of the foregut. The secretions produced in venom glands of Conus snails and allies have been extensively studied, revealing an amazing chemical diversity of small, highly constrained neuropeptides, whose characterization led to significant pharmacological developments. Conversely, salivary glands, the other main secretory structures of molluscan foregut, have been neglected despite their shared occurrence in the two lineages including predatory members: Gastropoda and Cephalopoda. Over the last few years, the interest for the chemistry of salivary mixtures increased based on their potential biomedical applications. Recent investigation with -omics technologies are complementing the classical biochemical descriptions, that date back to the 1950s, highlighting the high level of diversification of salivary secretions in predatory mollusks, and suggesting they can be regarded as a pharmaceutical cornucopia. As with other animal venoms, some of the salivary toxins are reported to target, for example, sodium and/or potassium ion channels or receptors and transporters for neurotransmitters such as, glutamate, serotonin, neurotensin, and noradrenaline, thus manipulating the neuromuscular system of the preys. Other bioactive components possess anticoagulant, anesthetic and hypotensive activities. Here, we overview available knowledge on the salivary glands of key predatory molluscan taxa, gastropods, and cephalopods, summarizing their anatomical, physiological and biochemical complexity in order to facilitate future comparative studies on main evolutionary trends and functional convergence in the acquisition of successful predatory strategies.
Salivary Glands in Predatory Mollusks: Evolutionary Considerations
Ponte, Giovanna; Modica, Maria Vittoria
2017-01-01
Many marine mollusks attain or increase their predatory efficiency using complex chemical secretions, which are often produced and delivered through specialized anatomical structures of the foregut. The secretions produced in venom glands of Conus snails and allies have been extensively studied, revealing an amazing chemical diversity of small, highly constrained neuropeptides, whose characterization led to significant pharmacological developments. Conversely, salivary glands, the other main secretory structures of molluscan foregut, have been neglected despite their shared occurrence in the two lineages including predatory members: Gastropoda and Cephalopoda. Over the last few years, the interest for the chemistry of salivary mixtures increased based on their potential biomedical applications. Recent investigation with -omics technologies are complementing the classical biochemical descriptions, that date back to the 1950s, highlighting the high level of diversification of salivary secretions in predatory mollusks, and suggesting they can be regarded as a pharmaceutical cornucopia. As with other animal venoms, some of the salivary toxins are reported to target, for example, sodium and/or potassium ion channels or receptors and transporters for neurotransmitters such as, glutamate, serotonin, neurotensin, and noradrenaline, thus manipulating the neuromuscular system of the preys. Other bioactive components possess anticoagulant, anesthetic and hypotensive activities. Here, we overview available knowledge on the salivary glands of key predatory molluscan taxa, gastropods, and cephalopods, summarizing their anatomical, physiological and biochemical complexity in order to facilitate future comparative studies on main evolutionary trends and functional convergence in the acquisition of successful predatory strategies. PMID:28848453
Freitas, Mariella B; Queiroz, Joicy F; Dias Gomes, Carolinne I; Collares-Buzato, Carla B; Barbosa, Helena C; Boschero, Antonio C; Gonçalves, Carlos A; Pinheiro, Eliana C
2013-03-01
Susceptibility during fasting has been reported for the common vampire bat (Desmodus rotundus), to the point of untimely deaths after only 2-3 nights of fasting. To investigate the underlying physiology of this critical metabolic condition, we analyzed serum insulin levels, pancreatic islets morphometry and immunocytochemistry (ICC), static insulin secretion in pancreas fragments, and insulin signaling mechanism in male vampire bats. A glucose tolerance test (ipGTT) was also performed. Serum insulin was found to be lower in fed vampires compared to other mammals, and was significantly reduced after 24h fasting. Morphometrical analyses revealed small irregular pancreatic islets with reduced percentage of β-cell mass compared to other bats. Static insulin secretion analysis showed that glucose-stimulated insulin secretion was impaired, as insulin levels did not reach significance under high glucose concentrations, whereas the response to the amino acid leucin was preserved. Results from ipGTT showed a failure on glucose clearance, indicating glucose intolerance due to diminished pancreatic insulin secretion and/or decreased β-cell response to glucose. In conclusion, data presented here indicate lower insulinemia and impaired insulin secretion in D. rotundus, which is consistent with the limited ability to store body energy reserves, previously reported in these animals. Whether these metabolic and hormonal features are associated with their blood diet remains to be determined. The peculiar food sharing through blood regurgitation, reported to this species, might be an adaptive mechanism overcoming this metabolic susceptibility. Copyright © 2012 Elsevier Inc. All rights reserved.
Floral and vegetative cues in oil-secreting and non-oil-secreting Lysimachia species
Schäffler, I.; Balao, F.; Dötterl, S.
2012-01-01
Background and Aims Unrelated plants pollinated by the same group or guild of animals typically evolve similar floral cues due to pollinator-mediated selection. Related plant species, however, may possess similar cues either as a result of pollinator-mediated selection or as a result of sharing a common ancestor that possessed the same cues or traits. In this study, visual and olfactory floral cues in Lysimachia species exhibiting different pollination strategies were analysed and compared, and the importance of pollinators and phylogeny on the evolution of these floral cues was determined. For comparison, cues of vegetative material were examined where pollinator selection would not be expected. Methods Floral and vegetative scents and colours in floral oil- and non-floral oil-secreting Lysimachia species were studied by chemical and spectrophotometric analyses, respectively, compared between oil- and non-oil-secreting species, and analysed by phylogenetically controlled methods. Key Results Vegetative and floral scent was species specific, and variability in floral but not vegetative scent was lower in oil compared with non-oil species. Overall, oil species did not differ in their floral or vegetative scent from non-oil species. However, a correlation was found between oil secretion and six floral scent constituents specific to oil species, whereas the presence of four other floral compounds can be explained by phylogeny. Four of the five analysed oil species had bee-green flowers and the pattern of occurrence of this colour correlated with oil secretion. Non-oil species had different floral colours. The colour of leaves was similar among all species studied. Conclusions Evidence was found for correlated evolution between secretion of floral oils and floral but not vegetative visual and olfactory cues. The cues correlating with oil secretion were probably selected by Macropis bees, the specialized pollinators of oil-secreting Lysimachia species, and may have evolved in order to attract these bees. PMID:22634256
ERIC Educational Resources Information Center
Morris, Lisa
2012-01-01
Master teacher Lisa Morris invites you to share her secrets of success with writer's workshops. After years of experimenting with the workshop model, she has developed the most effective ways to apply it in the classroom, yielding higher test scores and increased student engagement. Through practical, step-by-step instruction, Morris demonstrates…
ERIC Educational Resources Information Center
Wasburn-Moses, Leah
2009-01-01
In this article, the author offers some success secrets of the stars for fitting into one's research again after the baby. The author has some experience to share, having had her first child as a high school teacher, her second as an ABD (all-but-dissertation) graduate student, and now her third as an assistant professor at a research-intensive…
The Rosenberg Trial: Uncovering the Layers of History
ERIC Educational Resources Information Center
Ragsdale, Bruce A.
2013-01-01
The trial of Julius and Ethel Rosenberg on charges of conspiring to spy for the Soviet Union remains one of the defining moments of the Cold War era. The dramatic allegations of stolen atomic secrets and networks of Communist spies riveted the public's attention. The determination of government prosecutors reflected a widely shared belief that the…
USDA-ARS?s Scientific Manuscript database
Plant class IV chitinases are composed of a carboxy-terminal chitinase domain that is attached, through a linker sequence, to a small amino-terminal domain that can be thought of as a structured peptide. While both the peptide-like domain and the chitinase domain share sequence homology throughout m...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yan, Yuhua; Zhang, Bo; Hou, Weihong
Fiber and penton base overproduced in adenovirus (Ad) infected cells can be secreted prior to progeny release and thereby regulate progeny spread. We aimed to investigate the mechanisms of fiber and penton base secretion in Ad2- or Ad5-infected A549 cells. Our flow cytometry analyses detected abundant surface fiber molecules, but little penton base molecules at 12 h post infection. Immunogold staining combined with transmission electron microscopic analyses revealed separate, non-co-localized release of fiber and penton base in the proximity of the plasma membrane. Depolymerization of microtubule and actin cytoskeletons, and inhibition of Rock kinase and myosin II activity together demonstratedmore » cytoskeletal network-dependent fiber secretion. Inhibition of intracellular calcium [Ca{sup 2+}]{sub i} signaling caused diminished fiber secretion, which was associated with diminished progeny production. Thus, fiber and penton base are actively and separately secreted during the early stages of Ad2 or Ad5 infection, their secretion may play important role in Ad life cycle. - Highlights: •Excessive production of structural proteins is common to viral infection, which may regulate the host-virus equilibrium and the spreading of viruses. •The adenovirus (Ad) structural proteins, fiber and penton base, are respectively important for Ad binding to its receptor and subsequent internalization in host cells. In Ad infected cells, these two structural proteins are excessively produced. •The mechanisms underlying the release of fiber and penton base molecules at the early phase of Ad infection is yet poorly understood. •Our studies show that in Ad5 or Ad2 infected A549 cells, fiber and penton base molecules are actively and separately secreted. •Fiber secretion is dependent on cytoskeleton-mediated protein traffic. •Inhibition of myosin II motor and Ca{sup 2+} signaling activity significantly diminishes fiber secretion. •These findings could contribute to our understanding of Ad spread in human populations.« less
Zhu, Caifang Jeremy
2009-09-01
This paper provides a historical, religious-philosophical context for the study of the Daoist text known as The Secret of the Golden Flower. An updated study is conducted into the controversy over the source of the text including the editions translated by Richard Wilhelm and Thomas Cleary. The main teachings of the text and the basics of two major denominations of Daoism are introduced to ground later critiques of Jung's commentary. The psychodynamics of analytical psychology, especially those concerned with integration of unconscious contents and the realization of the self (individuation) are compared with the psycho-spiritual dynamics of integration in Eastern spirituality based on the Golden Flower text. The paper concludes that it was amiss for Jung to have equated the Western 'unconscious' with states of higher consciousness in Eastern meditation practices, although his claim that Eastern higher consciousness is characterized by a nebulous state of non-intentionality does raise questions about the appropriateness of calling Eastern meditative states 'consciousness'. A new concept is required to characterize the special qualities of this psychic state shared generally by Eastern spiritual traditions and a more meaningful comparison may be found in Jung's concept of the self.
Type IV Pili in Gram-Positive Bacteria
Craig, Lisa
2013-01-01
SUMMARY Type IV pili (T4P) are surface-exposed fibers that mediate many functions in bacteria, including locomotion, adherence to host cells, DNA uptake (competence), and protein secretion and that can act as nanowires carrying electric current. T4P are composed of a polymerized protein, pilin, and their assembly apparatuses share protein homologs with type II secretion systems in eubacteria and the flagella of archaea. T4P are found throughout Gram-negative bacterial families and have been studied most extensively in certain model Gram-negative species. Recently, it was discovered that T4P systems are also widespread among Gram-positive species, in particular the clostridia. Since Gram-positive and Gram-negative bacteria have many differences in cell wall architecture and other features, it is remarkable how similar the T4P core proteins are between these organisms, yet there are many key and interesting differences to be found as well. In this review, we compare the two T4P systems and identify and discuss the features they have in common and where they differ to provide a very broad-based view of T4P systems across all eubacterial species. PMID:24006467
Secure distributed genome analysis for GWAS and sequence comparison computation.
Zhang, Yihua; Blanton, Marina; Almashaqbeh, Ghada
2015-01-01
The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice.
Secure distributed genome analysis for GWAS and sequence comparison computation
2015-01-01
Background The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. Methods In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. Results We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. Conclusions This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice. PMID:26733307
Takeoka, Masahiro; Seshadreesan, Kaushik P; Wilde, Mark M
2017-10-13
We consider quantum key distribution (QKD) and entanglement distribution using a single-sender multiple-receiver pure-loss bosonic broadcast channel. We determine the unconstrained capacity region for the distillation of bipartite entanglement and secret key between the sender and each receiver, whenever they are allowed arbitrary public classical communication. A practical implication of our result is that the capacity region demonstrated drastically improves upon rates achievable using a naive time-sharing strategy, which has been employed in previously demonstrated network QKD systems. We show a simple example of a broadcast QKD protocol overcoming the limit of the point-to-point strategy. Our result is thus an important step toward opening a new framework of network channel-based quantum communication technology.
Security on Cloud Revocation Authority using Identity Based Encryption
NASA Astrophysics Data System (ADS)
Rajaprabha, M. N.
2017-11-01
As due to the era of cloud computing most of the people are saving there documents, files and other things on cloud spaces. Due to this security over the cloud is also important because all the confidential things are there on the cloud. So to overcome private key infrastructure (PKI) issues some revocable Identity Based Encryption (IBE) techniques are introduced which eliminates the demand of PKI. The technique introduced is key update cloud service provider which is having two issues in it and they are computation and communication cost is high and second one is scalability issue. So to overcome this problem we come along with the system in which the Cloud Revocation Authority (CRA) is there for the security which will only hold the secret key for each user. And the secret key was send with the help of advanced encryption standard security. The key is encrypted and send to the CRA for giving the authentication to the person who wants to share the data or files or for the communication purpose. Through that key only the other user will able to access that file and if the user apply some invalid key on the particular file than the information of that user and file is send to the administrator and administrator is having rights to block that person of black list that person to use the system services.
Zhu, D; Ravindranath, M H; Terasaki, P I; Miyazaki, T; Pham, T; Jucaud, V
2014-08-01
B memory cells remain in circulation and secrete alloantibodies without antigen exposure > 20 years after alloimmunization postpartum or by transplantation. These long-lived B cells are resistant to cytostatic drugs. Therapeutically, intravenous immunoglobulin (IVIg) is administered to reduce allo-human leucocyte antigen (HLA) antibodies pre- and post-transplantation, but the mechanism of reduction remains unclear. Recently, we reported that IVIg reacts with several HLA-I alleles and the HLA reactivity of IVIg is lost after its HLA-E reactivity is adsorbed out. Therefore, we have generated an anti-HLA-E monoclonal antibody that mimics the HLA-reactivity of IVIg to investigate whether this antibody suppresses IgG secretion, as does IVIg. B cells were purified from the blood of a woman in whose blood the B memory cells remained without antigen exposure > 20 years after postpartum alloimmunization. The B cells were stimulated with cytokines using a well-defined culture system. The anti-HLA-E monoclonal antibody (mAb) significantly suppressed the allo-HLA class-II IgG produced by the B cells, and that this suppression was far superior to that by IVIg. These findings were confirmed with HLA-I antibody secreted by the immortalized B cell line, developed from the blood of another alloimmunized woman. The binding affinity of the anti-HLA-E mAb for peptide sequences shared (i.e. shared epitopes) between HLA-E and other β2-microglobulin-free HLA heavy chains (open conformers) on the cell surface of B cells may act as a ligand and signal suppression of IgG production of activated B memory cells. We propose that anti-HLA-E monoclonal antibody may also be useful to suppress allo-HLA IgG production in vivo. © 2014 British Society for Immunology.
Labra, Álvaro; Arredondo-Zelada, Oscar; Flores-Herrera, Patricio; Marshall, Sergio H; Gómez, Fernando A
2016-03-01
Piscirickettsia salmonis seriously affects the Chilean salmon industry. The bacterium is phylogenetically related to Legionella pneumophila and Coxiella burnetii, sharing a Dot/Icm secretion system with them. Although it is well documented that L. pneumophila and C. burnetii secrete different virulence effectors via this Dot/Icm system in order to attenuate host cell responses, to date there have been no reported virulence effectors secreted by the Dot/Icm system of P. salmonis. Using several annotations of P. salmonis genome, here we report an in silico analyses of 4 putative Dot/Icm effectors. Three of them contain ankyrin repeat domains and the typical conserved 3D structures of this protein family. The fourth one is highly similar to one of the Dot/Icm-dependent effectors of L. pneumophila. Additionally, all the potential P. salmonis effectors contain a classical Dot/Icm secretion signal in their C-terminus, consisting of: an E-Block, a hydrophobic residue in -3 or -4 and an electronegative charge. Finally, qPCR analysis demonstrated that these proteins are overexpressed early in infection, perhaps contributing to the generation of a replicative vacuole, a key step in the neutralizing strategy proposed for the Dot/Icm system. In summary, this report identifies four Dot/Icm-dependent effectors in P. salmonis. Copyright © 2015 Elsevier Ltd. All rights reserved.
Secrets and disclosure in donor conception.
Frith, Lucy; Blyth, Eric; Crawshaw, Marilyn; van den Akker, Olga
2018-01-01
This article considers the disclosure, sharing and exchange of information on being donor conceived within families, drawing on data from a study undertaken with donor-conceived adults registered with UK Donor Link (a voluntary DNA-linking register). This paper considers the narratives of how respondents found out they were donor-conceived and what events triggered disclosure of this information. This paper then goes on to examine the role secrecy played in their family life and uses the concept of 'display' to explore how secrecy affected their relationships with their immediate and extended family. Secrets are notoriously 'leaky' and we found complex patterns of knowing and uncertainty about whom in the family knew that the person was donor-conceived. We argue that what is kept secret and from whom provides insights into the multifaceted web of social relationships that can be created by donor-conception, and how knowledge can be managed and controlled in attempts to display and maintain family narratives of biogenetic connection. © 2017 Foundation for the Sociology of Health & Illness.
Profiling Synaptic Proteins Identifies Regulators of Insulin Secretion and Lifespan
Kaplan, Joshua M.
2008-01-01
Cells are organized into distinct compartments to perform specific tasks with spatial precision. In neurons, presynaptic specializations are biochemically complex subcellular structures dedicated to neurotransmitter secretion. Activity-dependent changes in the abundance of presynaptic proteins are thought to endow synapses with different functional states; however, relatively little is known about the rules that govern changes in the composition of presynaptic terminals. We describe a genetic strategy to systematically analyze protein localization at Caenorhabditis elegans presynaptic specializations. Nine presynaptic proteins were GFP-tagged, allowing visualization of multiple presynaptic structures. Changes in the distribution and abundance of these proteins were quantified in 25 mutants that alter different aspects of neurotransmission. Global analysis of these data identified novel relationships between particular presynaptic components and provides a new method to compare gene functions by identifying shared protein localization phenotypes. Using this strategy, we identified several genes that regulate secretion of insulin-like growth factors (IGFs) and influence lifespan in a manner dependent on insulin/IGF signaling. PMID:19043554
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
It is the “starting over” part that is so hard
Washington, Karla; Oliver, Debra Parker; Shaunfield, Sara; Gage, L. Ashley; Mooney, Megan; Lewis, Alexandria
2013-01-01
Although hospices are required to provide caregivers with formal bereavement support when their loved one passes, most bereavement interventions lack standardization and remain untested. The Dual Processing Model of Bereavement was used as a theoretical framework for assessing the potential of a Secret Facebook Group for bereaved hospice caregivers. Online communication was analyzed and reported outcome measures were compared pre and post intervention. Bereaved caregivers shared abrupt and anticipated triggers resulting in loss-orientation and shared restoration through storytelling, advising, and encouragement. Caregiver anxiety and depression were lower post intervention. This study highlights the promise of Facebook for hospice bereavement support. PMID:24559689
Teleportation-based continuous variable quantum cryptography
NASA Astrophysics Data System (ADS)
Luiz, F. S.; Rigolin, Gustavo
2017-03-01
We present a continuous variable (CV) quantum key distribution (QKD) scheme based on the CV quantum teleportation of coherent states that yields a raw secret key made up of discrete variables for both Alice and Bob. This protocol preserves the efficient detection schemes of current CV technology (no single-photon detection techniques) and, at the same time, has efficient error correction and privacy amplification schemes due to the binary modulation of the key. We show that for a certain type of incoherent attack, it is secure for almost any value of the transmittance of the optical line used by Alice to share entangled two-mode squeezed states with Bob (no 3 dB or 50% loss limitation characteristic of beam splitting attacks). The present CVQKD protocol works deterministically (no postselection needed) with efficient direct reconciliation techniques (no reverse reconciliation) in order to generate a secure key and beyond the 50% loss case at the incoherent attack level.
Practicality of quantum information processing
NASA Astrophysics Data System (ADS)
Lau, Hoi-Kwan
Quantum Information Processing (QIP) is expected to bring revolutionary enhancement to various technological areas. However, today's QIP applications are far from being practical. The problem involves both hardware issues, i.e., quantum devices are imperfect, and software issues, i.e., the functionality of some QIP applications is not fully understood. Aiming to improve the practicality of QIP, in my PhD research I have studied various topics in quantum cryptography and ion trap quantum computation. In quantum cryptography, I first studied the security of position-based quantum cryptography (PBQC). I discovered a wrong assumption in the previous literature that the cheaters are not allowed to share entangled resources. I proposed entanglement attacks that could cheat all known PBQC protocols. I also studied the practicality of continuous-variable (CV) quantum secret sharing (QSS). While the security of CV QSS was considered by the literature only in the limit of infinite squeezing, I found that finitely squeezed CV resources could also provide finite secret sharing rate. Our work relaxes the stringent resources requirement of implementing QSS. In ion trap quantum computation, I studied the phase error of quantum information induced by dc Stark effect during ion transportation. I found an optimized ion trajectory for which the phase error is the minimum. I also defined a threshold speed, above which ion transportation would induce significant error. In addition, I proposed a new application for ion trap systems as universal bosonic simulators (UBS). I introduced two architectures, and discussed their respective strength and weakness. I illustrated the implementations of bosonic state initialization, transformation, and measurement by applying radiation fields or by varying the trap potential. When comparing with conducting optical experiments, the ion trap UBS is advantageous in higher state initialization efficiency and higher measurement accuracy. Finally, I proposed a new method to re-cool ion qubits during quantum computation. The idea is to transfer the motional excitation of a qubit to another ion that is prepared in the motional ground state. I showed that my method could be ten times faster than current laser cooling techniques, and thus could improve the speed of ion trap quantum computation.
Quantum dense key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.
2004-03-01
This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.
Prestigiacomo, Jennifer
2011-11-01
Getting effective stakeholder engagement, including that of payers, and creating innovative value-added services that provide alternate revenue streams beyond basic subscription services, are just a couple of the common traits of the flourishing health information exchanges profiled in the sustainability report released in August by the National eHealth Collaborative.
A strategic plan for forest research and development in the south
Richard A. Harper; Cassandra Johnson; H. Michael Rauscher; Carol Whitlock
2007-01-01
In many ways, the southern region of the United States is our nation's best kept secret. Although each is unique, the 13 southern States from Virginia to Texas share several important attributes: long growing seasons and plentiful water, close-knit communities with strong ties to the land, terrains ranging from lush wetlands to rolling hills to sheltering...
Nonclassicality thresholds for multiqubit states: Numerical analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gruca, Jacek; Zukowski, Marek; Laskowski, Wieslaw
2010-07-15
States that strongly violate Bell's inequalities are required in many quantum-informational protocols as, for example, in cryptography, secret sharing, and the reduction of communication complexity. We investigate families of such states with a numerical method which allows us to reveal nonclassicality even without direct knowledge of Bell's inequalities for the given problem. An extensive set of numerical results is presented and discussed.
Convergence of the Insulin and Serotonin Programs in the Pancreatic β-Cell
Ohta, Yasuharu; Kosaka, Yasuhiro; Kishimoto, Nina; Wang, Juehu; Smith, Stuart B.; Honig, Gerard; Kim, Hail; Gasa, Rosa M.; Neubauer, Nicole; Liou, Angela; Tecott, Laurence H.; Deneris, Evan S.; German, Michael S.
2011-01-01
OBJECTIVE Despite their origins in different germ layers, pancreatic islet cells share many common developmental features with neurons, especially serotonin-producing neurons in the hindbrain. Therefore, we tested whether these developmental parallels have functional consequences. RESEARCH DESIGN AND METHODS We used transcriptional profiling, immunohistochemistry, DNA-binding analyses, and mouse genetic models to assess the expression and function of key serotonergic genes in the pancreas. RESULTS We found that islet cells expressed the genes encoding all of the products necessary for synthesizing, packaging, and secreting serotonin, including both isoforms of the serotonin synthetic enzyme tryptophan hydroxylase and the archetypal serotonergic transcription factor Pet1. As in serotonergic neurons, Pet1 expression in islets required homeodomain transcription factor Nkx2.2 but not Nkx6.1. In β-cells, Pet1 bound to the serotonergic genes but also to a conserved insulin gene regulatory element. Mice lacking Pet1 displayed reduced insulin production and secretion and impaired glucose tolerance. CONCLUSIONS These studies demonstrate that a common transcriptional cascade drives the differentiation of β-cells and serotonergic neurons and imparts the shared ability to produce serotonin. The interrelated biology of these two cell types has important implications for the pathology and treatment of diabetes. PMID:22013016
Convergence of the insulin and serotonin programs in the pancreatic β-cell.
Ohta, Yasuharu; Kosaka, Yasuhiro; Kishimoto, Nina; Wang, Juehu; Smith, Stuart B; Honig, Gerard; Kim, Hail; Gasa, Rosa M; Neubauer, Nicole; Liou, Angela; Tecott, Laurence H; Deneris, Evan S; German, Michael S
2011-12-01
Despite their origins in different germ layers, pancreatic islet cells share many common developmental features with neurons, especially serotonin-producing neurons in the hindbrain. Therefore, we tested whether these developmental parallels have functional consequences. We used transcriptional profiling, immunohistochemistry, DNA-binding analyses, and mouse genetic models to assess the expression and function of key serotonergic genes in the pancreas. We found that islet cells expressed the genes encoding all of the products necessary for synthesizing, packaging, and secreting serotonin, including both isoforms of the serotonin synthetic enzyme tryptophan hydroxylase and the archetypal serotonergic transcription factor Pet1. As in serotonergic neurons, Pet1 expression in islets required homeodomain transcription factor Nkx2.2 but not Nkx6.1. In β-cells, Pet1 bound to the serotonergic genes but also to a conserved insulin gene regulatory element. Mice lacking Pet1 displayed reduced insulin production and secretion and impaired glucose tolerance. These studies demonstrate that a common transcriptional cascade drives the differentiation of β-cells and serotonergic neurons and imparts the shared ability to produce serotonin. The interrelated biology of these two cell types has important implications for the pathology and treatment of diabetes.
Finite key analysis for symmetric attacks in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias
2006-10-15
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less
The Shigella flexneri OspB effector: an early immunomodulator.
Ambrosi, Cecilia; Pompili, Monica; Scribano, Daniela; Limongi, Dolores; Petrucca, Andrea; Cannavacciuolo, Sonia; Schippa, Serena; Zagaglia, Carlo; Grossi, Milena; Nicoletti, Mauro
2015-01-01
Through the action of the type three secretion system (T3SS) Shigella flexneri delivers several effectors into host cells to promote cellular invasion, multiplication and to exploit host-cell signaling pathways to modulate the host innate immune response. Although much progress has been made in the understanding of many type III effectors, the molecular and cellular mechanism of the OspB effector is still poorly characterized. In this study we present new evidence that better elucidates the role of OspB as pro-inflammatory factor at very early stages of infection. Indeed, we demonstrate that, during the first hour of infection, OspB is required for full activation of ERK1/2 and p38 MAPKs and the cytosolic phospholipase A(2) (cPLA(2)). Activation of cPLA(2) ultimately leads to the production and secretion of PMN chemoattractant metabolite(s) uncoupled with release of IL-8. Moreover, we also present evidence that OspB is required for the development of the full and promptly inflammatory reaction characteristic of S. flexneri wild-type infection in vivo. Based on OspB and OspF similarity (both effectors share similar transcription regulation, temporal secretion into host cells and nuclear localization) we hypothesized that OspB and OspF effectors may form a pair aimed at modulating the host cell response throughout the infection process, with opposite effects. A model is presented to illustrate how OspB activity would promote S. flexneri invasion and bacterial dissemination at early critical phases of infection. Copyright © 2014 Elsevier GmbH. All rights reserved.
Cystatin C takes part in melanoma-microglia cross-talk: possible implications for brain metastasis.
Moshe, Adi; Izraely, Sivan; Sagi-Assif, Orit; Prakash, Roshini; Telerman, Alona; Meshel, Tsipi; Carmichael, Thomas; Witz, Isaac P
2018-05-02
The development of melanoma brain metastasis is largely dependent on mutual interactions between the melanoma cells and cells in the brain microenvironment. Here, we report that the extracellular cysteine protease inhibitor cystatin C (CysC) is involved in these interactions. Microglia-derived factors upregulated CysC secretion by melanoma. Similarly, melanoma-derived factors upregulated CysC secretion by microglia. Whereas CysC enhanced melanoma cell migration through a layer of brain endothelial cells, it inhibited the migration of microglia cells toward melanoma cells. CysC was also found to promote the formation of melanoma three-dimensional structures in matrigel. IHC analysis revealed increased expression levels of CysC in the brain of immune-deficient mice bearing xenografted human melanoma brain metastasis compared to the brain of control mice. Based on these in vitro and in vivo experiments we hypothesize that CysC promotes melanoma brain metastasis. Increased expression levels of CysC were detected in the regenerating brain of mice after stroke. Post-stroke brain with melanoma brain metastasis showed an even stronger expression of CysC. The in vitro induction of stroke-like conditions in brain microenvironmental cells increased the levels of CysC in the secretome of microglia cells, but not in the secretome of brain endothelial cells. The similarities between melanoma brain metastasis and stroke with respect to CysC expression by and secretion from microglia cells suggest that CysC may be involved in shared pathways between brain metastasis and post-stroke regeneration. This manifests the tendency of tumor cells to highjack physiological molecular pathways in their progression.
Gomez-Valero, Laura; Rusniok, Christophe; Rolando, Monica; Neou, Mario; Dervins-Ravault, Delphine; Demirtas, Jasmin; Rouy, Zoe; Moore, Robert J; Chen, Honglei; Petty, Nicola K; Jarraud, Sophie; Etienne, Jerome; Steinert, Michael; Heuner, Klaus; Gribaldo, Simonetta; Médigue, Claudine; Glöckner, Gernot; Hartland, Elizabeth L; Buchrieser, Carmen
2014-01-01
The genus Legionella comprises over 60 species. However, L. pneumophila and L. longbeachae alone cause over 95% of Legionnaires’ disease. To identify the genetic bases underlying the different capacities to cause disease we sequenced and compared the genomes of L. micdadei, L. hackeliae and L. fallonii (LLAP10), which are all rarely isolated from humans. We show that these Legionella species possess different virulence capacities in amoeba and macrophages, correlating with their occurrence in humans. Our comparative analysis of 11 Legionella genomes belonging to five species reveals highly heterogeneous genome content with over 60% representing species-specific genes; these comprise a complete prophage in L. micdadei, the first ever identified in a Legionella genome. Mobile elements are abundant in Legionella genomes; many encode type IV secretion systems for conjugative transfer, pointing to their importance for adaptation of the genus. The Dot/Icm secretion system is conserved, although the core set of substrates is small, as only 24 out of over 300 described Dot/Icm effector genes are present in all Legionella species. We also identified new eukaryotic motifs including thaumatin, synaptobrevin or clathrin/coatomer adaptine like domains. Legionella genomes are highly dynamic due to a large mobilome mainly comprising type IV secretion systems, while a minority of core substrates is shared among the diverse species. Eukaryotic like proteins and motifs remain a hallmark of the genus Legionella. Key factors such as proteins involved in oxygen binding, iron storage, host membrane transport and certain Dot/Icm substrates are specific features of disease-related strains.
The Secret to Great Coaching: Inquiry Method Helps Teachers Take Ownership of Their Learning
ERIC Educational Resources Information Center
Foltos, Les
2014-01-01
A common question raised by new coaches is: When can I share my experience and expertise with teachers I am coaching to help them improve? It is a logical question. Many coaches know that they were chosen for the role in part because their peers respect them as a teacher. They know the instructional strategies they have used give them credibility…
A New Three Dimensional Based Key Generation Technique in AVK
NASA Astrophysics Data System (ADS)
Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak
2017-08-01
In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.
Coulette, Quentin; Lemauf, Séverine; Colinet, Dominique; Prévost, Geneviève; Anselme, Caroline; Poirié, Marylène
2017-01-01
Aspartylglucosaminidase (AGA) is a low-abundance intracellular enzyme that plays a key role in the last stage of glycoproteins degradation, and whose deficiency leads to human aspartylglucosaminuria, a lysosomal storage disease. Surprisingly, high amounts of AGA-like proteins are secreted in the venom of two phylogenetically distant hymenopteran parasitoid wasp species, Asobara tabida (Braconidae) and Leptopilina heterotoma (Cynipidae). These venom AGAs have a similar domain organization as mammalian AGAs. They share with them key residues for autocatalysis and activity, and the mature α- and β-subunits also form an (αβ)2 structure in solution. Interestingly, only one of these AGAs subunits (α for AtAGA and β for LhAGA) is glycosylated instead of the two subunits for lysosomal human AGA (hAGA), and these glycosylations are partially resistant to PGNase F treatment. The two venom AGAs are secreted as fully activated enzymes, they have a similar aspartylglucosaminidase activity and are both also efficient asparaginases. Once AGAs are injected into the larvae of the Drosophila melanogaster host, the asparaginase activity may play a role in modulating their physiology. Altogether, our data provide new elements for a better understanding of the secretion and the role of venom AGAs as virulence factors in the parasitoid wasps’ success. PMID:28742131
Immune Modulation by Human Secreted RNases at the Extracellular Space.
Lu, Lu; Li, Jiarui; Moussaoui, Mohammed; Boix, Ester
2018-01-01
The ribonuclease A superfamily is a vertebrate-specific family of proteins that encompasses eight functional members in humans. The proteins are secreted by diverse innate immune cells, from blood cells to epithelial cells and their levels in our body fluids correlate with infection and inflammation processes. Recent studies ascribe a prominent role to secretory RNases in the extracellular space. Extracellular RNases endowed with immuno-modulatory and antimicrobial properties can participate in a wide variety of host defense tasks, from performing cellular housekeeping to maintaining body fluid sterility. Their expression and secretion are induced in response to a variety of injury stimuli. The secreted proteins can target damaged cells and facilitate their removal from the focus of infection or inflammation. Following tissue damage, RNases can participate in clearing RNA from cellular debris or work as signaling molecules to regulate the host response and contribute to tissue remodeling and repair. We provide here an overall perspective on the current knowledge of human RNases' biological properties and their role in health and disease. The review also includes a brief description of other vertebrate family members and unrelated extracellular RNases that share common mechanisms of action. A better knowledge of RNase mechanism of actions and an understanding of their physiological roles should facilitate the development of novel therapeutics.
Central Interleukin-1β Suppresses the Nocturnal Secretion of Melatonin
Herman, A. P.; Bochenek, J.; Król, K.; Krawczyńska, A.; Antushevich, H.; Pawlina, B.; Herman, A.; Romanowicz, K.; Tomaszewska-Zaremba, D.
2016-01-01
In vertebrates, numerous processes occur in a rhythmic manner. The hormonal signal reliably reflecting the environmental light conditions is melatonin. Nocturnal melatonin secretion patterns could be disturbed in pathophysiological states, including inflammation, Alzheimer's disease, and depression. All of these states share common elements in their aetiology, including the overexpression of interleukin- (IL-) 1β in the central nervous system. Therefore, the present study was designed to determine the effect of the central injection of exogenous IL-1β on melatonin release and on the expression of the enzymes of the melatonin biosynthetic pathway in the pineal gland of ewe. It was found that intracerebroventricular injections of IL-1β (50 µg/animal) suppressed (P < 0.05) nocturnal melatonin secretion in sheep regardless of the photoperiod. This may have resulted from decreased (P < 0.05) synthesis of the melatonin intermediate serotonin, which may have resulted, at least partially, from a reduced expression of tryptophan hydroxylase. IL-1β also inhibited (P < 0.05) the expression of the melatonin rhythm enzyme arylalkylamine-N-acetyltransferase and hydroxyindole-O-methyltransferase. However, the ability of IL-1β to affect the expression of these enzymes was dependent upon the photoperiod. Our study may shed new light on the role of central IL-1β in the aetiology of disruptions in melatonin secretion. PMID:27212805
Akbari, Samin; Pirbodaghi, Tohid
2014-09-07
High throughput heterogeneous immunoassays that screen antigen-specific antibody secreting cells are essential to accelerate monoclonal antibody discovery for therapeutic applications. Here, we introduce a heterogeneous single cell immunoassay based on alginate microparticles as permeable cell culture chambers. Using a microfluidic device, we encapsulated single antibody secreting cells in 35-40 μm diameter alginate microbeads. We functionalized the alginate to capture the secreted antibodies inside the microparticles, enabling single cell analysis and preventing the cross-talk between the neighboring encapsulated cells. We demonstrated non-covalent functionalization of alginate microparticles by adding three secondary antibodies to the alginate solution to form high molecular weight complexes that become trapped in the porous nanostructure of alginate and capture the secreted antibodies. We screened anti-TNF-alpha antibody-secreting cells from a mixture of antibody-secreting cells.
Wu, D Z; Yuan, J Y; Shi, H L; Hu, Z B
2008-01-01
Background and purpose: The protoberberine alkaloid berberine has been reported to inhibit colonic Cl− secretion. However, it is not known if other protoberberine alkaloids share these effects. We have therefore selected another protoberberine alkaloid, palmatine, to assess its effects on active ion transport across rat colonic epithelium. Experimental approach: Rat colonic mucosa was mounted in Ussing chambers and short circuit current (I SC), apical Cl− current and basolateral K+ current were recorded. Intracellular cAMP content was determined by an enzyme immunoassay. Intracellular Ca2+ concentration was measured with Fura-2 AM. Key results: Palmatine inhibited carbachol-induced Ca2+-activated Cl− secretion and the carbachol-induced increase of intracellular Ca2+ concentration. Palmatine also inhibited cAMP-activated Cl− secretion induced by prostaglandin E2 (PGE2) or forskolin. Palmatine prevented the elevation of intracellular cAMP by forskolin. Determination of apical Cl− currents showed that palmatine suppressed the forskolin-stimulated, apical cAMP-activated Cl− current but not the carbachol-stimulated apical Ca2+-activated Cl− current. Following permeabilization of apical membranes with nystatin, we found that palmatine inhibited a carbachol-stimulated basolateral K+ current that was sensitive to charybdotoxin and resistant to chromanol 293B. However, the forskolin-stimulated basolateral K+ current inhibited by palmatine was specifically blocked by chromanol 293B and not by charybdotoxin. Conclusions and implications: Palmatine attenuated Ca2+-activated Cl− secretion through inhibiting basolateral charybdotoxin-sensitive, SK4 K+ channels, whereas it inhibited cAMP-activated Cl− secretion by inhibiting apical CFTR Cl− channels and basolateral chromanol 293B-sensitive, KvLQT1 K+ channels. PMID:18204477
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía; Skaar, Johannes; Kurtsiefer, Christian; Makarov, Vadim
2011-06-14
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.
Red junglefowl have individual body odors.
Karlsson, Anna-Carin; Jensen, Per; Elgland, Mathias; Laur, Katriann; Fyrner, Timmy; Konradsson, Peter; Laska, Matthias
2010-05-01
Olfaction may play an important role in regulating bird behavior, and has been suggested to be involved in feather-pecking. We investigated possible differences in the body odors of red junglefowl females by using an automated olfactometer which assessed the ability of trained mice to discriminate between the odors of uropygial gland secretions (the main carrier of potential individual odors in chickens) of six feather-pecked and six non-pecked birds. All mice were clearly able to discriminate between all individual red junglefowl odors, showing that each bird has an individual body odor. We analyzed whether it was more difficult to discriminate between the odors of two feather-pecked, or two non-pecked birds, than it was to discriminate between the odors of two randomly selected birds. This was not the case, suggesting that feather-pecked birds did not share a common odor signature. Analyses using gas chromatography and mass spectrometry showed that the composition of aliphatic carboxylic acids in uropygial gland secretions differed consistently between individuals. However, chemical composition did not vary according to feather-pecking status. We conclude that red junglefowl have individual body odors which appear to be largely based on differences in the relative abundance of aliphatic carboxylic acids, but there is no evidence of systematic differences between the body odors of pecked and non-pecked birds.
Lazar Adler, Natalie R; Stevens, Joanne M; Stevens, Mark P; Galyov, Edouard E
2011-01-01
Burkholderia pseudomallei and Burkholderia mallei are closely related Gram-negative bacteria responsible for the infectious diseases melioidosis and glanders, respectively. Autotransporters (ATs) comprise a large and diverse family of secreted and outer membrane proteins that includes virulence-associated invasins, adhesins, proteases, and actin-nucleating factors. The B. pseudomallei K96243 genome contains 11 predicted ATs, eight of which share homologs in the B. mallei ATCC 23344 genome. This review distils key findings from in silico, in vitro, and in vivo studies on the ATs of B. pseudomallei and B. mallei. To date, the best characterized of the predicted ATs of B. pseudomallei and B. mallei is BimA, a predicted trimeric AT mediating actin-based motility which varies in sequence and mode of action between Burkholderia species. Of the remaining eight predicted B. pseudomallei trimeric autotransporters, five of which are also present in B. mallei, two (BoaA and BoaB), have been implicated in bacterial adhesion to epithelial cells. Several predicted Burkholderia ATs are recognized by human humoral and cell-mediated immunity, indicating that they are expressed during infection and may be useful for diagnosis and vaccine-mediated protection. Further studies on the mode of secretion and functions of Burkholderia ATs will facilitate the rational design of control strategies.
Secure communications using quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.
1997-08-01
The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit ofmore » an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.« less
Prediction of Body Fluids where Proteins are Secreted into Based on Protein Interaction Network
Hu, Le-Le; Huang, Tao; Cai, Yu-Dong; Chou, Kuo-Chen
2011-01-01
Determining the body fluids where secreted proteins can be secreted into is important for protein function annotation and disease biomarker discovery. In this study, we developed a network-based method to predict which kind of body fluids human proteins can be secreted into. For a newly constructed benchmark dataset that consists of 529 human-secreted proteins, the prediction accuracy for the most possible body fluid location predicted by our method via the jackknife test was 79.02%, significantly higher than the success rate by a random guess (29.36%). The likelihood that the predicted body fluids of the first four orders contain all the true body fluids where the proteins can be secreted into is 62.94%. Our method was further demonstrated with two independent datasets: one contains 57 proteins that can be secreted into blood; while the other contains 61 proteins that can be secreted into plasma/serum and were possible biomarkers associated with various cancers. For the 57 proteins in first dataset, 55 were correctly predicted as blood-secrete proteins. For the 61 proteins in the second dataset, 58 were predicted to be most possible in plasma/serum. These encouraging results indicate that the network-based prediction method is quite promising. It is anticipated that the method will benefit the relevant areas for both basic research and drug development. PMID:21829572
Spencer, Robert L; Chun, Lauren E; Hartsock, Matthew J; Woodruff, Elizabeth R
2018-04-01
Glucocorticoid hormones are a powerful mammalian systemic hormonal signal that exerts regulatory effects on almost every cell and system of the body. Glucocorticoids act in a circadian and stress-directed manner to aid in adaptation to an ever-changing environment. Circadian glucocorticoid secretion provides for a daily waxing and waning influence on target cell function. In addition, the daily circadian peak of glucocorticoid secretion serves as a timing signal that helps entrain intrinsic molecular clock phase in tissue cells distributed throughout the body. Stress-induced glucocorticoid secretion also modulates the state of these same cells in response to both physiological and psychological stressors. We review the strong functional interrelationships between glucocorticoids and the circadian system, and discuss how these interactions optimize the appropriate cellular and systems response to stress throughout the day. We also discuss clinical implications of this dual aspect of glucocorticoid signaling, especially for conditions of circadian and HPA axis dysregulation. Copyright © 2018 Elsevier Inc. All rights reserved.
Oestrogen-related receptor α is required for transepithelial H+ secretion in zebrafish
Guh, Ying-Jey; Yang, Chao-Yew; Liu, Sian-Tai; Huang, Chang-Jen
2016-01-01
Oestrogen-related receptor α (ERRα) is an orphan nuclear receptor which is important for adaptive metabolic responses under conditions of increased energy demand, such as cold, exercise and fasting. Importantly, metabolism under these conditions is usually accompanied by elevated production of organic acids, which may threaten the body acid–base status. Although ERRα is known to help regulate ion transport by the renal epithelia, its role in the transport of acid–base equivalents remains unknown. Here, we tested the hypothesis that ERRα is involved in acid–base regulation mechanisms by using zebrafish as the model to examine the effects of ERRα on transepithelial H+ secretion. ERRα is abundantly expressed in H+-pump-rich cells (HR cells), a group of ionocytes responsible for H+ secretion in the skin of developing embryos, and its expression is stimulated by acidic (pH 4) environments. Knockdown of ERRα impairs both basal and low pH-induced H+ secretion in the yolk-sac skin, which is accompanied by decreased expression of H+-secreting-related transporters. The effect of ERRα on H+ secretion is achieved through regulating both the total number of HR cells and the function of individual HR cells. These results demonstrate, for the first time, that ERRα is required for transepithelial H+ secretion for systemic acid–base homeostasis. PMID:26911965
Duellman, Tyler; Burnett, John; Yang, Jay
2015-03-15
Traditional assays for secreted proteins include methods such as Western blot and enzyme-linked immunosorbent assay (ELISA) detection of the protein in the cell culture medium. We describe a method for the detection of a secreted protein based on fluorescent measurement of an mCherry fusion reporter. This microplate reader-based mCherry fluorescence detection method has a wide dynamic range of 4.5 orders of magnitude and a sensitivity that allows detection of 1 to 2fmol fusion protein. Comparison with the Western blot detection method indicated greater linearity, wider dynamic range, and a similar lower detection threshold for the microplate-based fluorescent detection assay of secreted fusion proteins. An mCherry fusion protein of matrix metalloproteinase-9 (MMP-9), a secreted glycoprotein, was created and expressed by transfection of human embryonic kidney (HEK) 293 cells. The cell culture medium was assayed for the presence of the fluorescent signal up to 32 h after transfection. The secreted MMP-9-mCherry fusion protein was detected 6h after transfection with a linear increase in signal intensity over time. Treatment with chloroquine, a drug known to inhibit the secretion of many proteins, abolished the MMP-9-mCherry secretion, demonstrating the utility of this method in a biological experiment. Copyright © 2014 Elsevier Inc. All rights reserved.
Information Operations: Putting the ’I’ Back Into Dime
2006-02-01
Texas Early Warning Center 9. Create New York Corporate Warning Network 10. Digital Marshall Plan using residual capability in abandoned satellites... us , and that all raw information—secret, unclassified, operational, logistic—must be brought together across distributed “pits” that are able to...is overt, using methods that do not compromise the integrity or impartiality of the UN, when the information can be shared and become widely known
Yeo, Tien Ee Dominic; Chu, Tsz Hang
2017-09-01
Social media present opportunities and challenges for sexual health communication among young people. This study is one of the first to examine the actual use of Facebook for peer communication of sexual health and intimate relations. Content analysis of 2186 anonymous posts in a "sex secrets" Facebook page unofficially affiliated with a Hong Kong University shows gender balance among posters, inclusiveness of sexual minorities, and frequent sharing of personal experiences in storytelling or advice seeking. The findings illuminate young people's health concerns regarding condom use, avoiding pain, birth control, sexually transmitted infections, and body appearance. Relational concerns found entailed sexual practices, expectations, and needs-predominantly within dating relationships and include not wanting to have sex. Supportive communication among users was prevalent. A majority of posts involved advice solicitation in the form of request for opinion or information (30.38%), request for advice (13.68%), situation comparison (5.40%), or problem disclosure (9.97%). Comments to the advice-seeking posts were mostly supportive (69.49%); nonsupportive responses (unsolicited messages and gratuitous humor) were concentrated with ambiguous advice solicitations. These findings hold implications for understanding self-disclosure of intimate concerns within social networks, and attuning sexual health intervention on social media to young people's actual needs and advice preferences.
Shuttleworth, Trevor J; Thompson, Jill; Munger, R Stephen; Wood, Chris M
2006-12-01
We compared in vivo responses of rectal gland secretion to carbonic anhydrase (CA) inhibition (10(-4) mol l(-1) acetazolamide) in volume-loaded dogfish with in vitro responses in an isolated-perfused gland stimulated with 5 x 10(-6) mol l(-1) forskolin and removed from systemic influences. We also measured respiratory gas exchange in the perfused gland, described the acid-base status of the secreted fluid, and determined the relative importance of various extracellular and intracellular acid-base parameters in controlling rectal gland secretion in vitro. In vivo, acetazolamide inhibited Cl(-) secretion and decreased pHi in the rectal gland, but interpretation was confounded by an accompanying systemic respiratory acidosis, which would also have contributed to the inhibition. In the perfused gland, M(CO(2)) and M(O(2)) increased in linear relation to increases in Cl(-) secretion rate. CA inhibition (10(-4) mol l(-1) acetazolamide) had no effect on Cl(-) secretion rate or pHi in the perfused gland, in contrast to in vivo, but caused a transitory 30% inhibition of M(CO(2)) (relative to stable M(O(2))) and elevation in secretion P(CO(2)) effects, which peaked at 2 h and attenuated by 3.5-4 h. Secretion was inhibited by acidosis and stimulated by alkalosis; the relationship between relative Cl(-) secretion rate and pHe was almost identical to that seen in vivo. Experimental manipulations of perfusate pH, P(CO(2)) and HCO(3)(-) concentration, together with measurements of pHi, demonstrated that these responses were most strongly correlated with changes in pHe, and were not related to changes in P(CO(2)), extracellular HCO(3)(-), or intracellular HCO(3)(-) levels, though changes in pHi may also have played a role. The acid-base status of the secreted fluid varied with that of the perfusate, secretion pH remaining about 0.3-0.5 units lower, and changing in concert with pHe rather than pHi; secretion HCO(3)(-) concentrations remained low, even in the face of greatly elevated perfusate HCO(3)(-) concentrations. We conclude that pH effects on rectal gland secretion rate are adaptive, that CA functions to catalyze the hydration of CO(2), thereby maintaining a gradient for diffusive efflux of CO(2) from the working cells, and that differences in response to CA inhibition likely reflect the higher perfusion-to-secretion ratio in vitro than in vivo.
Synchrony due to parametric averaging in neurons coupled by a shared signal
NASA Astrophysics Data System (ADS)
Khadra, Anmar
2009-04-01
Gonadotropin-releasing hormone (GnRH) is a decapeptide secreted by GnRH neurons located in the hypothalamus. It is responsible for the onset of puberty and the regulation of hormone release from the pituitary. There is a strong evidence suggesting that GnRH exerts an autocrine regulation on its own release via three types of G-proteins [L.Z. Krsmanovic, N. Mores, C.E. Navarro, K.K. Arora, K.J. Catt, An agonist-induced switch in G protein coupling of the gonadotropin-releasing hormone receptor regulates pulsatile neuropeptide secretion, Proc. Natl. Acad. Sci. 100 (2003) 2969-2974]. A mathematical model based on this proposed mechanism has been developed and extended to explain the synchrony observed in GnRH neurons by incorporating the idea of a common pool of GnRH [A. Khadra, Y.X. Li, A model for the pulsatile secretion of gonadotropin-releasing hormone from synchronized hypothalamic neurons, Biophys. J. 91 (2006) 74-83]. This type of coupling led to a very robust synchrony between these neurons. We aim in this paper to reduce the one cell model to a two-variable model using quasi-steady state (QSS) analysis, to further examine its dynamics analytically and geometrically. The concept of synchrony of a heterogeneous population will be clearly defined and established for certain cases, while, for the general case, two different types of phases are introduced to gain more insight on how the model behaves. Bifurcation diagrams for certain parameters in the one cell model are also shown to explain some of the phenomena observed in a coupled population. A comparison between the population model and an averaged two-variable model is also conducted.
Wood, Chris M; Munger, R Stephen; Thompson, Jill; Shuttleworth, Trevor J
2007-05-14
In order to address the possible role of blood acid-base status in controlling the rectal gland, dogfish were fitted with indwelling arterial catheters for blood sampling and rectal gland catheters for secretion collection. In intact, unanaesthetized animals, isosmotic volume loading with 500 mmol L-1 NaCl at a rate of 15 mL kg-1 h-1 produced a brisk, stable rectal gland secretion flow of about 4 mL kg-1 h-1. Secretion composition (500 mmol L-1 Na+ and Cl-; 5 mmol L-1 K+; <1 mmol L-1 Ca2+, Mg2+, SO(4)2-, or phosphate) was almost identical to that of the infusate with a pH of about 7.2, HCO3- mmol L-1<1 mmol L-1 and a PCO2 (1 Torr) close to PaCO2. Experimental treatments superimposed on the infusion caused the expected disturbances in systemic acid-base status: respiratory acidosis by exposure to high environmental PCO2, metabolic acidosis by infusion of HCl, and metabolic alkalosis by infusion of NaHCO3. Secretion flow decreased markedly with acidosis and increased with alkalosis, in a linear relationship with extracellular pH. Secretion composition did not change, apart from alterations in its acid-base status, and made negligible contribution to overall acid-base balance. An adaptive control of rectal gland secretion by systemic acid-base status is postulated-stimulation by the "alkaline tide" accompanying the volume load of feeding and inhibition by the metabolic acidosis accompanying the volume contraction of exercise.
Lindeberg, M; Collmer, A
1992-01-01
Many extracellular proteins produced by Erwinia chrysanthemi require the out gene products for transport across the outer membrane. In a previous report (S. Y. He, M. Lindeberg, A. K. Chatterjee, and A. Collmer, Proc. Natl. Acad. Sci. USA 88:1079-1083, 1991) cosmid pCPP2006, sufficient for secretion of Erwinia chrysanthemi extracellular proteins by Escherichia coli, was partially sequenced, revealing four out genes sharing high homology with pulH through pulK from Klebsiella oxytoca. The nucleotide sequence of eight additional out genes reveals homology with pulC through pulG, pulL, pulM, pulO, and other genes involved in secretion by various gram-negative bacteria. Although signal sequences and hydrophobic regions are generally conserved between Pul and Out proteins, four out genes contain unique inserts, a pulN homolog is not present, and outO appears to be transcribed separately from outC through outM. The sequenced region was subcloned, and an additional 7.6-kb region upstream was identified as being required for secretion in E. coli. out gene homologs were found on Erwinia carotovora cosmid clone pAKC651 but were not detected in E. coli. The outC-through-outM operon is weakly induced by polygalacturonic acid and strongly expressed in the early stationary phase. The out and pul genes are highly similar in sequence, hydropathic properties, and overall arrangement but differ in both transcriptional organization and the nature of their induction. Images PMID:1429461
NASA Astrophysics Data System (ADS)
Wang, Wei; Cao, Leiming; Lou, Yanbo; Du, Jinjian; Jing, Jietai
2018-01-01
We theoretically and experimentally characterize the performance of the pairwise correlations from triple quantum correlated beams based on the cascaded four-wave mixing (FWM) processes. The pairwise correlations between any two of the beams are theoretically calculated and experimentally measured. The experimental and theoretical results are in good agreement. We find that two of the three pairwise correlations can be in the quantum regime. The other pairwise correlation is always in the classical regime. In addition, we also measure the triple-beam correlation which is always in the quantum regime. Such unbalanced and controllable pairwise correlation structures may be taken as advantages in practical quantum communications, for example, hierarchical quantum secret sharing. Our results also open the way for the classification and application of quantum states generated from the cascaded FWM processes.
Yoon, Bo-Young; Song, Saemee; Lee, Kangseok; Ha, Nam-Chul
2012-01-01
The Hly translocator complex of Escherichia coli catalyzes type I secretion of the toxin hemolysin A (HlyA). In this complex, HlyB is an inner membrane ABC (ATP Binding Cassette)-type transporter, TolC is an outer membrane channel protein, and HlyD is a periplasmic adaptor anchored in the inner membrane that bridges HlyB to TolC. This tripartite organization is reminiscent of that of drug efflux systems such as AcrA-AcrB-TolC and MacA-MacB-TolC of E. coli. We have previously shown the crucial role of conserved residues located at the hairpin tip region of AcrA and MacA adaptors during assembly of their cognate systems. In this study, we investigated the role of the putative tip region of HlyD using HlyD mutants with single amino acid substitutions at the conserved positions. In vivo and in vitro data show that all mutations abolished HlyD binding to TolC and resulted in the absence of HlyA secretion. Together, our results suggest that, similarly to AcrA and MacA, HlyD interacts with TolC in a tip-to-tip manner. A general model in which these conserved interactions induce opening of TolC during drug efflux and type I secretion is discussed. PMID:22792337
Domozych, David S.; Fujimoto, Chelsea; LaRue, Therese
2013-01-01
Polar expansion is a widespread phenomenon in plants spanning all taxonomic groups from the Charophycean Green Algae to pollen tubes in Angiosperms and Gymnosperms. Current data strongly suggests that many common features are shared amongst cells displaying polar growth mechanics including changes to the structural features of localized regions of the cell wall, mobilization of targeted secretion mechanisms, employment of the actin cytoskeleton for directing secretion and in many cases, endocytosis and coordinated interaction of multiple signal transduction mechanisms prompted by external biotic and abiotic cues. The products of polar expansion perform diverse functions including delivery of male gametes to the egg, absorption, anchorage, adhesion and photo-absorption efficacy. A comparative analysis of polar expansion dynamics is provided with special emphasis on those found in early divergent plants. PMID:27137370
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
Genuine multipartite Einstein-Podolsky-Rosen steering.
He, Q Y; Reid, M D
2013-12-20
We develop the concept of genuine N-partite Einstein-Podolsky-Rosen (EPR) steering. This nonlocality is the natural multipartite extension of the original EPR paradox. Useful properties emerge that are not guaranteed for genuine multipartite entangled states. In particular, there is a close link with the task of one-sided, device-independent quantum secret sharing. We derive inequalities to demonstrate multipartite EPR steering for Greenberger-Horne-Zeilinger and Gaussian continuous variable states in loophole-free scenarios.
Genuine Multipartite Einstein-Podolsky-Rosen Steering
NASA Astrophysics Data System (ADS)
He, Q. Y.; Reid, M. D.
2013-12-01
We develop the concept of genuine N-partite Einstein-Podolsky-Rosen (EPR) steering. This nonlocality is the natural multipartite extension of the original EPR paradox. Useful properties emerge that are not guaranteed for genuine multipartite entangled states. In particular, there is a close link with the task of one-sided, device-independent quantum secret sharing. We derive inequalities to demonstrate multipartite EPR steering for Greenberger-Horne-Zeilinger and Gaussian continuous variable states in loophole-free scenarios.
Entangled state quantum cryptography: eavesdropping on the ekert protocol
Naik; Peterson; White; Berglund; Kwiat
2000-05-15
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.
The Virginia Slims identity crisis: an inside look at tobacco industry marketing to women.
Toll, B A; Ling, P M
2005-06-01
Because no prior studies have comprehensively analysed previously secret tobacco industry documents describing marketing female brands, the Virginia Slims brand was studied to explore how Philip Morris and competitors develop and adapt promotional campaigns targeting women. Analysis of previously secret tobacco industry documents. The majority of the documents used were from Philip Morris. The key to Virginia Slims advertising was creating an aspirational image which women associated with the brand. Virginia Slims co-opted women's liberation slogans to build a modern female image from 1968 through to the 1980s, and its market share grew from 0.24% to 3.16% during that time period. Ironically, the feminist image that worked very well for the brand was also the reason for its subsequent problems. Philip Morris experienced unprecedented losses in market share in the early 1990s, with a decline in market share for four consecutive years from 3.16% to 2.26%; they attributed this decline to both the fact that the brand's feminist image no longer appealed to young women aged 18-24 years, and increased competition from more contemporary and lower priced competitors. Throughout the 1990s, attempts to reacquire young women while retaining Virginia Slims loyal (now older) smokers were made using a "King Size" line extension, new slogans, and loyalty building promotions. Tobacco advertisers initially created distinct female brands with aspirational images; continued appeal to young women was critical for long term growth. The need for established brands to evolve to maintain relevance to young women creates an opportunity for tobacco counter-marketing, which should undermine tobacco brand imagery and promote aspirational smoke-free lifestyle images. Young women age 18-24 are extremely valuable to the tobacco industry and should be a focus for tobacco control programmes.
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki
2011-03-01
We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Barczak, Amy K; Avraham, Roi; Singh, Shantanu; Luo, Samantha S; Zhang, Wei Ran; Bray, Mark-Anthony; Hinman, Amelia E; Thompson, Matthew; Nietupski, Raymond M; Golas, Aaron; Montgomery, Paul; Fitzgerald, Michael; Smith, Roger S; White, Dylan W; Tischler, Anna D; Carpenter, Anne E; Hung, Deborah T
2017-05-01
A key to the pathogenic success of Mycobacterium tuberculosis (Mtb), the causative agent of tuberculosis, is the capacity to survive within host macrophages. Although several factors required for this survival have been identified, a comprehensive knowledge of such factors and how they work together to manipulate the host environment to benefit bacterial survival are not well understood. To systematically identify Mtb factors required for intracellular growth, we screened an arrayed, non-redundant Mtb transposon mutant library by high-content imaging to characterize the mutant-macrophage interaction. Based on a combination of imaging features, we identified mutants impaired for intracellular survival. We then characterized the phenotype of infection with each mutant by profiling the induced macrophage cytokine response. Taking a systems-level approach to understanding the biology of identified mutants, we performed a multiparametric analysis combining pathogen and host phenotypes to predict functional relationships between mutants based on clustering. Strikingly, mutants defective in two well-known virulence factors, the ESX-1 protein secretion system and the virulence lipid phthiocerol dimycocerosate (PDIM), clustered together. Building upon the shared phenotype of loss of the macrophage type I interferon (IFN) response to infection, we found that PDIM production and export are required for coordinated secretion of ESX-1-substrates, for phagosomal permeabilization, and for downstream induction of the type I IFN response. Multiparametric clustering also identified two novel genes that are required for PDIM production and induction of the type I IFN response. Thus, multiparametric analysis combining host and pathogen infection phenotypes can be used to identify novel functional relationships between genes that play a role in infection.
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-11-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A
2015-11-18
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Preserving privacy of online digital physiological signals using blind and reversible steganography.
Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung
2017-11-01
Physiological signals such as electrocardiograms (ECG) and electromyograms (EMG) are widely used to diagnose diseases. Presently, the Internet offers numerous cloud storage services which enable digital physiological signals to be uploaded for convenient access and use. Numerous online databases of medical signals have been built. The data in them must be processed in a manner that preserves patients' confidentiality. A reversible error-correcting-coding strategy will be adopted to transform digital physiological signals into a new bit-stream that uses a matrix in which is embedded the Hamming code to pass secret messages or private information. The shared keys are the matrix and the version of the Hamming code. An online open database, the MIT-BIH arrhythmia database, was used to test the proposed algorithms. The time-complexity, capacity and robustness are evaluated. Comparisons of several evaluations subject to related work are also proposed. This work proposes a reversible, low-payload steganographic scheme for preserving the privacy of physiological signals. An (n, m)-hamming code is used to insert (n - m) secret bits into n bits of a cover signal. The number of embedded bits per modification is higher than in comparable methods, and the computational power is efficient and the scheme is secure. Unlike other Hamming-code based schemes, the proposed scheme is both reversible and blind. Copyright © 2017 Elsevier B.V. All rights reserved.
Pinto-Santini, Delia M.; Salama, Nina R.
2009-01-01
Helicobacter pylori strains harboring the cag pathogenicity island (PAI) have been associated with more severe gastric disease in infected humans. The cag PAI encodes a type IV secretion (T4S) system required for CagA translocation into host cells as well as induction of proinflammatory cytokines, such as interleukin-8 (IL-8). cag PAI genes sharing sequence similarity with T4S components from other bacteria are essential for Cag T4S function. Other cag PAI-encoded genes are also essential for Cag T4S, but lack of sequence-based or structural similarity with genes in existing databases has precluded a functional assignment for the encoded proteins. We have studied the role of one such protein, Cag3 (HP0522), in Cag T4S and determined Cag3 subcellular localization and protein interactions. Cag3 is membrane associated and copurifies with predicted inner and outer membrane Cag T4S components that are essential for Cag T4S as well as putative accessory factors. Coimmunoprecipitation and cross-linking experiments revealed specific interactions with HpVirB7 and CagM, suggesting Cag3 is a new component of the Cag T4S outer membrane subcomplex. Finally, lack of Cag3 lowers HpVirB7 steady-state levels, further indicating Cag3 makes a subcomplex with this protein. PMID:19801411
Secret Sharing Schemes and Advanced Encryption Standard
2015-09-01
commutative . Definition 1.2.2. [3, pp. 167] The most general algebraic structure, ring < R,+, · >, is a set R together with two binary operations + and...Abstract Algebra, 7th ed. Pearson Education India , 2003. [4] A. Herschfeld, “The equation 2x− 3y = d,” Bulletin of the American Mathematical Society, vol...R.Balasubramaniam and R. Thangadurai, Eds. India : Ra- manujan Mathematical Society, pp. xxii–xlvii, 2009. [6] R. Stroeker and R. Tijdeman, “Diophantine
Enhanced diffie-hellman algorithm for reliable key exchange
NASA Astrophysics Data System (ADS)
Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj
2017-11-01
The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.
Kuenzel, Heike E; Steiger, Axel; Held, Katja; Antonijevic, Irina A; Frieboes, Ralf-Michael; Murck, Harald
2005-07-01
Sarizotan is a 5-HT(1A) agonist with high affinity to D(3) and D(4) receptors. In animal experiments, the drug shows a strong anti-cataleptic effect and suppresses effectively dyskinesias in animal models of L: -dopa-induced dyskinesia and of tardive dyskinesia. Data from an open pilot study in patients with Parkinson's disease show clear indication of a treatment effect against L: -dopa-induced dyskinesia. CNS-active drugs are known to modulate sleep electroencephalogram (EEG) and sleep-related hormone secretion. 5-HT(1A) agonists suppress rapid-eye movement (REM) sleep and enhance the secretion of ACTH, cortisol, prolactin and growth hormone (GH) at daytime. We hypothesised that sarizotan shares these effects. Furthermore, we were interested in the influence of sarizotan on leptin, which participates in the regulation of the energy balance and is enhanced after various psychoactive drugs. Ten healthy male subjects were investigated twice in a double-blind, placebo-controlled crossover design. Sleep EEG and nocturnal hormone secretion of ACTH, cortisol, prolactin, GH and leptin were examined after oral administration of either placebo or 20 mg of sarizotan at night. After administration of sarizotan, a significant reduction of REM sleep and total sleep time in conventional sleep EEG and a significant reduction of sigma- and theta-power in spectral analysis were observed. The main effect on nocturnal hormone secretion was a significant elevation of prolactin and of ACTH in the first half of the night. While REM sleep was suppressed, the endocrine effects of 20 mg sarizotan at night were weak. Its sleep-endocrine profile is comparable to the effects provoked by selective 5-HT reuptake inhibitors.
What should the management of incest pregnancies be? An ethical view presented via three cases.
Yuksel, B; Kilic, S; Akin Su, F; Tasdemir, N; Uzunlar, O; Mollamahmutoglu, L
2008-01-01
Incest is a taboo and a neglected social problem. Especially in the adolescent population, which is a very sensitive period of development, it becomes harder for the patients to share their secret with either legal or health authorities. Sometimes pregnancy becomes the only vehicle to uncover this secret. There is a contradiction whether their pregnancies should continue or not. Some authors believe abortion is the best choice for the victim to pull herself together, whereas others advocate that it is just another trauma that will not solve the problem but merely hide it. In this report, three paternal incest cases and their pregnancies will be presented. The aim is not only to discuss the different points of view regarding the management of these pregnancies but also to make the clinicians think about the different choices before making a decision.
Dynamic Regulation of Ero1α and Peroxiredoxin 4 Localization in the Secretory Pathway*
Kakihana, Taichi; Araki, Kazutaka; Vavassori, Stefano; Iemura, Shun-ichiro; Cortini, Margherita; Fagioli, Claudio; Natsume, Tohru; Sitia, Roberto; Nagata, Kazuhiro
2013-01-01
In the early secretory compartment (ESC), a network of chaperones and enzymes assists oxidative folding of nascent proteins. Ero1 flavoproteins oxidize protein disulfide isomerase (PDI), generating H2O2 as a byproduct. Peroxiredoxin 4 (Prx4) can utilize luminal H2O2 to oxidize PDI, thus favoring oxidative folding while limiting oxidative stress. Interestingly, neither ER oxidase contains known ER retention signal(s), raising the question of how cells prevent their secretion. Here we show that the two proteins share similar intracellular localization mechanisms. Their secretion is prevented by sequential interactions with PDI and ERp44, two resident proteins of the ESC-bearing KDEL-like motifs. PDI binds preferentially Ero1α, whereas ERp44 equally retains Ero1α and Prx4. The different binding properties of Ero1α and Prx4 increase the robustness of ER redox homeostasis. PMID:23979138
Zheden, Vanessa; Kovalev, Alexander; Gorb, Stanislav N; Klepal, Waltraud
2015-02-06
Dosima fascicularis is the only barnacle which can drift autonomously at the water surface with a foam-like cement float. The cement secreted by the animal contains numerous gas-filled cells of different size. When several individuals share one float, their size and not their number is crucial for the production of both volume and mass of the float. The gas content within the cells of the foam gives positive static buoyancy to the whole float. The volume of the float, the gas volume and the positive static buoyancy are positively correlated. The density of the cement float without gas is greater than that of seawater. This study shows that the secreted cement consists of more than 90% water and the gas volume is on average 18.5%. Our experiments demonstrate that the intact foam-like cement float is sealed to the surrounding water.
Zheden, Vanessa; Kovalev, Alexander; Gorb, Stanislav N.; Klepal, Waltraud
2015-01-01
Dosima fascicularis is the only barnacle which can drift autonomously at the water surface with a foam-like cement float. The cement secreted by the animal contains numerous gas-filled cells of different size. When several individuals share one float, their size and not their number is crucial for the production of both volume and mass of the float. The gas content within the cells of the foam gives positive static buoyancy to the whole float. The volume of the float, the gas volume and the positive static buoyancy are positively correlated. The density of the cement float without gas is greater than that of seawater. This study shows that the secreted cement consists of more than 90% water and the gas volume is on average 18.5%. Our experiments demonstrate that the intact foam-like cement float is sealed to the surrounding water. PMID:25657839
NASA Astrophysics Data System (ADS)
Colbeck, Roger; Kent, Adrian
2006-03-01
Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable-bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signaling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT.
Analysis of medical confidentiality from the islamic ethics perspective.
Tavaokkoli, Saeid Nazari; Nejadsarvari, Nasrin; Ebrahimi, Ali
2015-04-01
Confidentiality is one of the old rules of the medical profession. While emphasizing the necessity of confidentiality in religious teachings, disclosure of other's secrets to commit sin deserves punishment hereafter known. Today, progress in medical science and invention of new diagnostic and therapeutic procedures, as well as the extent of information and disclosure of the secrets of the patients, have provided more than ever. After explaining the concepts and principles of confidentiality in medical ethics, the Islamic-oriented Virtue Ethics, in a comparative review, share the differences in these two sets of ethical review and explain the issue of confidentiality. In professional medical ethics, only the behaviors of health staff are evaluated and moral evaluation of the features cannot be evaluated, but in Islamic ethics, the moral evaluation of the features that are sensual, confidentiality is more stable, without any external supervision will maintain its efficiency.
NASA Astrophysics Data System (ADS)
Zhao-Xu, Ji; Tian-Yu, Ye
2017-07-01
In this paper, a novel multi-party quantum private comparison protocol with a semi-honest third party (TP) is proposed based on the entanglement swapping of d-level cat states and d-level Bell states. Here, TP is allowed to misbehave on his own, but will not conspire with any party. In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equality of their private secrets within one time execution of the protocol. Our protocol can withstand both the outside attacks and the participant attacks on the condition that none of the QKD methods is adopted to generate keys for security. One party cannot obtain other parties' secrets except for the case that their secrets are identical. The semi-honest TP cannot learn any information about these parties' secrets except the end comparison result on whether all private secrets from n parties are equal.
Salmonella-secreted Virulence Factors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heffron, Fred; Niemann, George; Yoon, Hyunjin
In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellentmore » reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.« less
Bound entangled states with a private key and their classical counterpart.
Ozols, Maris; Smith, Graeme; Smolin, John A
2014-03-21
Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-12-08
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-01-01
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792
Isolation and biochemical characterization of underwater adhesives from diatoms.
Poulsen, Nicole; Kröger, Nils; Harrington, Matthew J; Brunner, Eike; Paasch, Silvia; Buhmann, Matthias T
2014-01-01
Many aquatic organisms are able to colonize surfaces through the secretion of underwater adhesives. Diatoms are unicellular algae that have the capability to colonize any natural and man-made submerged surfaces. There is great technological interest in both mimicking and preventing diatom adhesion, yet the biomolecules responsible have so far remained unidentified. A new method for the isolation of diatom adhesive material is described and its amino acid and carbohydrate composition determined. The adhesive materials from two model diatoms show differences in their amino acid and carbohydrate compositions, but also share characteristic features including a high content of uronic acids, the predominance of hydrophilic amino acid residues, and the presence of 3,4-dihydroxyproline, an extremely rare amino acid. Proteins containing dihydroxyphenylalanine, which mediate underwater adhesion of mussels, are absent. The data on the composition of diatom adhesives are consistent with an adhesion mechanism based on complex coacervation of polyelectrolyte-like biomolecules.
Three-party authenticated key agreements for optimal communication
Lee, Tian-Fu; Hwang, Tzonelih
2017-01-01
Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253
Network of proteins, enzymes and genes linked to biomass degradation shared by Trichoderma species.
Horta, Maria Augusta Crivelente; Filho, Jaire Alves Ferreira; Murad, Natália Faraj; de Oliveira Santos, Eidy; Dos Santos, Clelton Aparecido; Mendes, Juliano Sales; Brandão, Marcelo Mendes; Azzoni, Sindelia Freitas; de Souza, Anete Pereira
2018-01-22
Understanding relationships between genes responsible for enzymatic hydrolysis of cellulose and synergistic reactions is fundamental for improving biomass biodegradation technologies. To reveal synergistic reactions, the transcriptome, exoproteome, and enzymatic activities of extracts from Trichoderma harzianum, Trichoderma reesei and Trichoderma atroviride under biodegradation conditions were examined. This work revealed co-regulatory networks across carbohydrate-active enzyme (CAZy) genes and secreted proteins in extracts. A set of 80 proteins and respective genes that might correspond to a common system for biodegradation from the studied species were evaluated to elucidate new co-regulated genes. Differences such as one unique base pair between fungal genomes might influence enzyme-substrate binding sites and alter fungal gene expression responses, explaining the enzymatic activities specific to each species observed in the corresponding extracts. These differences are also responsible for the different architectures observed in the co-expression networks.
Improving Individual Acceptance of Health Clouds through Confidentiality Assurance.
Ermakova, Tatiana; Fabian, Benjamin; Zarnekow, Rüdiger
2016-10-26
Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.
Improving Individual Acceptance of Health Clouds through Confidentiality Assurance
Fabian, Benjamin; Zarnekow, Rüdiger
2016-01-01
Summary Background Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. Objectives This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals’ willingness to accept the infrastructure for inter-organizational sharing of medical data. Methods We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. Results Our results indicate the importance of confidentiality assurance in individuals’ acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals’ acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions. PMID:27781238
Wilms, Viviane; Köppl, Christine; Söffgen, Chris; Hartmann, Anna-Maria; Nothwang, Hans Gerd
2016-01-01
In the cochlea, mammals maintain a uniquely high endolymphatic potential (EP), which is not observed in other vertebrate groups. However, a high [K+] is always present in the inner ear endolymph. Here, we show that Kir4.1, which is required in the mammalian stria vascularis to generate the highly positive EP, is absent in the functionally equivalent avian tegmentum vasculosum. In contrast, the molecular repertoire required for K+ secretion, specifically NKCC1, KCNQ1, KCNE1, BSND and CLC-K, is shared between the tegmentum vasculosum, the vestibular dark cells and the marginal cells of the stria vascularis. We further show that in barn owls, the tegmentum vasculosum is enlarged and a higher EP (~+34 mV) maintained, compared to other birds. Our data suggest that both the tegmentum vasculosum and the stratified stria vascularis evolved from an ancestral vestibular epithelium that already featured the major cell types of the auditory epithelia. Genetic recruitment of Kir4.1 specifically to strial melanocytes was then a crucial step in mammalian evolution enabling an increase in the cochlear EP. An increased EP may be related to high-frequency hearing, as this is a hallmark of barn owls among birds and mammals among amniotes. PMID:27680950
[Secret remedies in France until abolition in 1926].
Warolin, Christian
2002-01-01
Secret remedies are preparations or medicines whose composition is not disclosed by the inventor in order to protect his invention or to deceive the public. Secret remedies have always existed. From time immemorial the communities of apothecaries in Paris or in the provinces were opposed to quack doctors or healers who sold inactive mixtures. The 1352 Royal Edict forbade preparations of secret remedies. However, in the 17th century secret remedies were authorized through commission letters or warrants. In the 18th century regulations were implemented to control secret trade. The famous 11 April 1803 Law called the Germinal Law banned the sale of secret remedies but its severity was softened through successive decrees based on divergent interpretations of the regulations. The final banning of secret remedies was pronounced by a decree on 13 July 1926.
Random Secretion of Growth Hormone in Humans
NASA Astrophysics Data System (ADS)
Prank, Klaus; Kloppstech, Mirko; Nowlan, Steven J.; Sejnowski, Terrence J.; Brabant, Georg
1996-08-01
In normal humans, growth hormone (GH) is secreted from a gland located adjacent to the brain (pituitary) into the blood in distinct pulses, but in patients bearing a tumor within the pituitary (acromegaly) GH is excessively secreted in an irregular manner. It has been hypothesized that GH secretion in the diseased state becomes random. This hypothesis is supported by demonstrating that GH secretion in patients with acromegaly cannot be distinguished from a variety of linear stochastic processes based on the predictability of the fluctuations of GH concentration in the bloodstream.
Calcium-dependent transferrin receptor recycling in bovine chromaffin cells.
Knight, Derek E
2002-04-01
The release of regulated secretory granules is known to be calcium dependent. To examine the Ca2+-dependence of other exocytic fusion events, transferrin recycling in bovine chromaffin cells was examined. Internalised 125I-transferrin was released constitutively from cells with a half-time of about 7 min. Secretagogues that triggered catecholamine secretion doubled the rate of 125I-transferrin release, the time courses of the two triggered secretory responses being similar. The triggered 125I-transferrin release came from recycling endosomes rather than from sorting endosomes or a triggered secretory vesicle pool. Triggered 125I-transferrin release, like catecholamine secretion from the same cells, was calcium dependent but the affinities for calcium were very different. The extracellular calcium concentrations that gave rise to half-maximal evoked secretion were 0.1 mm for 125I-transferrin and 1.0 mm for catecholamine, and the intracellular concentrations were 0.1 microm and 1 microm, respectively. There was significant 125I-transferrin recycling in the virtual absence of intracellular Ca2+, but the rate increased when Ca2+ was raised above 1 nm, and peaked at 1 microm when the rate had doubled. Botulinum toxin type D blocked both transferrin recycling and catecholamine secretion. These results indicate that a major component of the vesicular transport required for the constitutive recycling of transferrin in quiescent cells is calcium dependent and thus under physiological control, and also that some of the molecular machinery involved in transferrin recycling/fusion processes is shared with that for triggered neurosecretion.
Probing cellular heterogeneity in cytokine-secreting immune cells using droplet-based microfluidics.
Chokkalingam, Venkatachalam; Tel, Jurjen; Wimmers, Florian; Liu, Xin; Semenov, Sergey; Thiele, Julian; Figdor, Carl G; Huck, Wilhelm T S
2013-12-21
Here, we present a platform to detect cytokine (IL-2, IFN-γ, TNF-α) secretion of single, activated T-cells in droplets over time. We use a novel droplet-based microfluidic approach to encapsulate cells in monodisperse agarose droplets together with functionalized cytokine-capture beads for subsequent binding and detection of secreted cytokines from single cells. This method allows high-throughput detection of cellular heterogeneity and maps subsets within cell populations with specific functions.
Family Secrets: The Bioethics of Genetic Testing
ERIC Educational Resources Information Center
Markowitz, Dina G.; DuPre, Michael J.; Holt, Susan; Chen, Shaw-Ree; Wischnowski, Michael
2006-01-01
This article discusses "Family Secrets," a problem-based learning (PBL) curriculum module that focuses on the bioethical implications of genetic testing. In high school biology classrooms throughout New York State, students are using "Family Secrets" to learn about DNA testing; Huntington's disease (HD); and the ethical, legal,…
Jackman, Robert W; Floro, Jess; Yoshimine, Rei; Zitin, Brian; Eiampikul, Maythita; El-Jack, Kahlid; Seto, Danielle N; Kandarian, Susan C
2017-01-01
Cachexia is strongly associated with a poor prognosis in cancer patients but the biological trigger is unknown and therefore no therapeutics exist. The loss of skeletal muscle is the most deleterious aspect of cachexia and it appears to depend on secretions from tumor cells. Models for studying wasting in cell culture consist of experiments where skeletal muscle cells are incubated with medium conditioned by tumor cells. This has led to candidates for cachectic factors but some of the features of cachexia in vivo are not yet well-modeled in cell culture experiments. Mouse myotube atrophy measured by myotube diameter in response to medium conditioned by mouse colon carcinoma cells (C26) is consistently less than what is seen in muscles of mice bearing C26 tumors with moderate to severe cachexia. One possible reason for this discrepancy is that in vivo the C26 tumor and skeletal muscle share a circulatory system exposing the muscle to tumor factors in a constant and increasing way. We have applied Transwell®-adapted cell culture conditions to more closely simulate conditions found in vivo where muscle is exposed to the ongoing kinetics of constant tumor secretion of active factors. C26 cells were incubated on a microporous membrane (a Transwell® insert) that constitutes the upper compartment of wells containing plated myotubes. In this model, myotubes are exposed to a constant supply of cancer cell secretions in the medium but without direct contact with the cancer cells, analogous to a shared circulation of muscle and cancer cells in tumor-bearing animals. The results for myotube diameter support the idea that the use of Transwell® inserts serves as a more physiological model of the muscle wasting associated with cancer cachexia than the bolus addition of cancer cell conditioned medium. The Transwell® model supports the notion that the dose and kinetics of cachectic factor delivery to muscle play a significant role in the extent of pathology.
Measurement-Device-Independent Quantum Cryptography
NASA Astrophysics Data System (ADS)
Tang, Zhiyuan
Quantum key distribution (QKD) enables two legitimate parties to share a secret key even in the presence of an eavesdropper. The unconditional security of QKD is based on the fundamental laws of quantum physics. Original security proofs of QKD are based on a few assumptions, e.g., perfect single photon sources and perfect single-photon detectors. However, practical implementations of QKD systems do not fully comply with such assumptions due to technical limitations. The gap between theory and implementations leads to security loopholes in most QKD systems, and several attacks have been launched on sophisticated QKD systems. Particularly, the detectors have been found to be the most vulnerable part of QKD. Much effort has been put to build side-channel-free QKD systems. Solutions such as security patches and device-independent QKD have been proposed. However, the former are normally ad-hoc, and cannot close unidentified loopholes. The latter, while having the advantages of removing all assumptions on devices, is impractical to implement today. Measurement-device-independent QKD (MDI-QKD) turns out to be a promising solution to the security problem of QKD. In MDI-QKD, all security loopholes, including those yet-to-be discovered, have been removed from the detectors, the most critical part in QKD. In this thesis, we investigate issues related to the practical implementation and security of MDI-QKD. We first present a demonstration of polarization-encoding MDI-QKD. Taking finite key effect into account, we achieve a secret key rate of 0.005 bit per second (bps) over 10 km spooled telecom fiber, and a 1600-bit key is distributed. This work, together with other demonstrations, shows the practicality of MDI-QKD. Next we investigate a critical assumption of MDI-QKD: perfect state preparation. We apply the loss-tolerant QKD protocol and adapt it to MDI-QKD to quantify information leakage due to imperfect state preparation. We then present an experimental demonstration of MDI-QKD over 10 km and 40 km of spooled fiber, which for the first time considers the impact of inaccurate polarization state preparation on the secret key rate. This would not have been possible under previous security proofs, given the same amount of state preparation flaws.
Quantum steganography and quantum error-correction
NASA Astrophysics Data System (ADS)
Shaw, Bilal A.
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be stripped away from the operations of a quantum computer, the natural way forward was to think about importing classical coding theory into the quantum arena to give birth to quantum error-correcting codes which could help in mitigating the debilitating effects of decoherence on quantum data. We first talk about the six-qubit quantum error-correcting code and show its connections to entanglement-assisted error-correcting coding theory and then to subsystem codes. This code bridges the gap between the five-qubit (perfect) and Steane codes. We discuss two methods to encode one qubit into six physical qubits. Each of the two examples corrects an arbitrary single-qubit error. The first example is a degenerate six-qubit quantum error-correcting code. We explicitly provide the stabilizer generators, encoding circuits, codewords, logical Pauli operators, and logical CNOT operator for this code. We also show how to convert this code into a non-trivial subsystem code that saturates the subsystem Singleton bound. We then prove that a six-qubit code without entanglement assistance cannot simultaneously possess a Calderbank-Shor-Steane (CSS) stabilizer and correct an arbitrary single-qubit error. A corollary of this result is that the Steane seven-qubit code is the smallest single-error correcting CSS code. Our second example is the construction of a non-degenerate six-qubit CSS entanglement-assisted code. This code uses one bit of entanglement (an ebit) shared between the sender (Alice) and the receiver (Bob) and corrects an arbitrary single-qubit error. The code we obtain is globally equivalent to the Steane seven-qubit code and thus corrects an arbitrary error on the receiver's half of the ebit as well. We prove that this code is the smallest code with a CSS structure that uses only one ebit and corrects an arbitrary single-qubit error on the sender's side. We discuss the advantages and disadvantages for each of the two codes. In the second half of this thesis we explore the yet uncharted and relatively undiscovered area of quantum steganography. Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel. Using either a shared classical secret key or shared entanglement Alice disguises her information as errors in the channel. Bob can retrieve the hidden information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for certain protocols. We also provide an example of how Alice hides quantum information in the perfect code when the underlying channel between Bob and her is the depolarizing channel. Using this scheme Alice can hide up to four stego-qubits.
Controlled Bidirectional Quantum Secure Direct Communication
Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan
2014-01-01
We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596
Yu, Kenneth K.; Aguilar, Kiefer; Tsai, Jonathan; Galimidi, Rachel; Gnanapragasam, Priyanthi; Yang, Lili; Baltimore, David
2012-01-01
In nature, B cells produce surface immunoglobulin and secreted antibody from the same immunoglobulin gene via alternative splicing of the pre-messenger RNA. Here we present a novel system for genetically programming B cells to direct the simultaneous formation of membrane-bound and secreted immunoglobulins that we term a “Molecular Rheostat”, based on the use of mutated “self-cleaving” 2A peptides. The Molecular Rheostat is designed so that the ratio of secreted to membrane-bound immunoglobulins can be controlled by selecting appropriate mutations in the 2A peptide. Lentiviral transgenesis of Molecular Rheostat constructs into B cell lines enables the simultaneous expression of functional b12-based IgM-like BCRs that signal to the cells and mediate the secretion of b12 IgG broadly neutralizing antibodies that can bind and neutralize HIV-1 pseudovirus. We show that these b12-based Molecular Rheostat constructs promote the maturation of EU12 B cells in an in vitro model of B lymphopoiesis. The Molecular Rheostat offers a novel tool for genetically manipulating B cell specificity for B-cell based gene therapy. PMID:23209743
Droplet based microfluidics for highthroughput screening of antibody secreting cells
NASA Astrophysics Data System (ADS)
Cai, Liheng; Heyman, John; Mazutis, Linas; Ung, Lloyd; Guerra, Rodrigo; Aubrecht, Donald; Weitz, David
2014-03-01
We present a droplet based microfluidic platform that allows highthroughput screening of antibody secreting cells. We coencapsulate single cells, fluorescent probes, and detection beads into emulsion droplets with diameter of 40 micron. The beads capture antibodies secreted by cells, resulting in a pronounced fluorescent signal that activates dielectrophoresis sorting at rate about 500 droplets per second. Moreover, we demonstrate that Reverse Transcription Polymerase Chain Reaction (RT-PCR) can be successfully applied to the cell encapsulated in a single sorted droplet. Our work highlights the potential of droplet based microfluidics as a platform to generate recombinant antibodies.
Comment on "Cheating prevention in visual cryptography".
Chen, Yu-Chi; Horng, Gwoboa; Tsai, Du-Shiau
2012-07-01
Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem.
2014-09-01
the constitution is not a suicide pact, and the President has unchallenged authority to prevent an imminent threat to the United States.”242 In...long. It soon wastes, exhausts, and murders itself. There was never a democracy yet that did not commit suicide .”291 The judiciary has deferred to...Constitution Project aptly describes, “When national security decisions are said to rest on secret information not widely shared with Congress, the temptation
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Naik, D. S.; Peterson, C. G.; White, A. G.
2000-05-15
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability. (c) 2000 The American Physical Society.
AtlasT4SS: a curated database for type IV secretion systems.
Souza, Rangel C; del Rosario Quispe Saji, Guadalupe; Costa, Maiana O C; Netto, Diogo S; Lima, Nicholas C B; Klein, Cecília C; Vasconcelos, Ana Tereza R; Nicolás, Marisa F
2012-08-09
The type IV secretion system (T4SS) can be classified as a large family of macromolecule transporter systems, divided into three recognized sub-families, according to the well-known functions. The major sub-family is the conjugation system, which allows transfer of genetic material, such as a nucleoprotein, via cell contact among bacteria. Also, the conjugation system can transfer genetic material from bacteria to eukaryotic cells; such is the case with the T-DNA transfer of Agrobacterium tumefaciens to host plant cells. The system of effector protein transport constitutes the second sub-family, and the third one corresponds to the DNA uptake/release system. Genome analyses have revealed numerous T4SS in Bacteria and Archaea. The purpose of this work was to organize, classify, and integrate the T4SS data into a single database, called AtlasT4SS - the first public database devoted exclusively to this prokaryotic secretion system. The AtlasT4SS is a manual curated database that describes a large number of proteins related to the type IV secretion system reported so far in Gram-negative and Gram-positive bacteria, as well as in Archaea. The database was created using the RDBMS MySQL and the Catalyst Framework based in the Perl programming language and using the Model-View-Controller (MVC) design pattern for Web. The current version holds a comprehensive collection of 1,617 T4SS proteins from 58 Bacteria (49 Gram-negative and 9 Gram-Positive), one Archaea and 11 plasmids. By applying the bi-directional best hit (BBH) relationship in pairwise genome comparison, it was possible to obtain a core set of 134 clusters of orthologous genes encoding T4SS proteins. In our database we present one way of classifying orthologous groups of T4SSs in a hierarchical classification scheme with three levels. The first level comprises four classes that are based on the organization of genetic determinants, shared homologies, and evolutionary relationships: (i) F-T4SS, (ii) P-T4SS, (iii) I-T4SS, and (iv) GI-T4SS. The second level designates a specific well-known protein families otherwise an uncharacterized protein family. Finally, in the third level, each protein of an ortholog cluster is classified according to its involvement in a specific cellular process. AtlasT4SS database is open access and is available at http://www.t4ss.lncc.br.
LSB-Based Steganography Using Reflected Gray Code
NASA Astrophysics Data System (ADS)
Chen, Chang-Chu; Chang, Chin-Chen
Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.
Structure of nerve growth factor complexed with the shared neurotrophin receptor p75.
He, Xiao-Lin; Garcia, K Christopher
2004-05-07
Neurotrophins are secreted growth factors critical for the development and maintenance of the vertebrate nervous system. Neurotrophins activate two types of cell surface receptors, the Trk receptor tyrosine kinases and the shared p75 neurotrophin receptor. We have determined the 2.4 A crystal structure of the prototypic neurotrophin, nerve growth factor (NGF), complexed with the extracellular domain of p75. Surprisingly, the complex is composed of an NGF homodimer asymmetrically bound to a single p75. p75 binds along the homodimeric interface of NGF, which disables NGF's symmetry-related second p75 binding site through an allosteric conformational change. Thus, neurotrophin signaling through p75 may occur by disassembly of p75 dimers and assembly of asymmetric 2:1 neurotrophin/p75 complexes, which could potentially engage a Trk receptor to form a trimolecular signaling complex.
Tao, Zhi-Bin; Ren, Zong-Xin; Bernhardt, Peter; Liang, Huan; Li, Hai-Dong; Zhao, Yan-Hui; Wang, Hong; Li, De-Zhu
2018-06-01
Isolation between species, or taxa sharing a common lineage, depends primarily on the relative strengths of various reproductive barriers. Previous studies on reproductive isolation between orchids emphasized mechanical and ethological barriers in flowers of species showing food and/or sexual mimicry. In this study, we investigated and quantified a series of prepollination and postpollination barriers between pink and white forms of Spiranthes sinensis sl, a nectar-secreting complex. We generated ML trees based on trn S-G and mat K to explore phylogenetic relationships in this species complex. Spiranthes sinensis sl segregated from some other congeners, but the white form constituted a distinct clade in relation to the pink form. The white form secreted 2-Phenylethanol as it is a single-scent compound and was pollinated almost exclusively by native, large-bodied Apis cerana and Bombus species (Apidae). Apis cerana showed a high floral constancy to this form. The scentless, pink form was pollinated primarily by smaller bees in the genera Ceratina (Apidae), and members of the family Halictidae, with infrequent visits by A. cerana and Bombus species. Fruit set and the production of large embryos following interform pollination treatments were significantly lower compared to intraform pollination results for the white form. Our results suggested that pollinator isolation, based on color and scent cues, may result in greater floral constancy in white populations when both forms are sympatric as two different, guilds of pollinators forage selectively preventing or reducing prospective gene flow. Postpollination barriers appear weaker than prepollination barriers but they also play a role in interform isolation, especially in the white form. Our findings suggest that floral color forms in S. sinensis do not represent an unbalanced polymorphism. Interpretations of the evolutionary status of these forms are discussed.
NASA Astrophysics Data System (ADS)
Guo, Ying; Zhao, Wei; Li, Fei; Huang, Duan; Liao, Qin; Xie, Cai-Lang
2017-08-01
The developing tendency of continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is to cope with the practical issue of implementing scalable quantum networks. Up to now, most theoretical and experimental researches on CV-MDI QKD are focused on two-party protocols. However, we suggest a CV-MDI multipartite quantum secret sharing (QSS) protocol use the EPR states coupled with optical amplifiers. More remarkable, QSS is the real application in multipartite CV-MDI QKD, in other words, is the concrete implementation method of multipartite CV-MDI QKD. It can implement a practical quantum network scheme, under which the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Even if there is a possibility that the relay may be completely tampered, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Additionally, we illustrate that the use of optical amplifiers can compensate the partial inherent imperfections of detectors and increase the transmission distance of the CV-MDI quantum system.
Silvestre, Ramona A; Rodríguez-Gallardo, Jovita; Egido, Eva M; Marco, José
1999-01-01
Diadenosine triphosphate (AP3A) and diadenosine tetraphosphate (AP4A) are released by various cells (e.g. platelets and chromaffin cells), and may act as extracellular messengers. In pancreatic B-cells, AP3A and AP4A are inhibitors of the ATP-regulated K+ channels, and glucose increases intracellular levels of both substances.We have studied the effect of exogenous AP3A and AP4A on insulin and glucagon secretion by the perfused rat pancreas.AP3A did not significantly modify insulin or glucagon release, whereas AP4A induced a prompt, short-lived insulin response (≈4 fold higher than basal value; P<0.05) in pancreases perfused at different glucose concentrations (3.2, 5.5 or 9 mM). AP4A-induced insulin release was abolished by somatostatin and by diazoxide. These two substances share the capacity to activate ATP-dependent K+ channels, suggesting that these channels are a potential target for AP4A in the B-cell.AP4A stimulated glucagon release at both 3.2 and 5.5 mM glucose. This effect was abolished by somatostatin.The results suggest that extracellular AP4A may play a physiological role in the control of insulin and glucagon secretion. PMID:10516664
Silvestre, R A; Rodríguez-Gallardo, J; Egido, E M; Marco, J
1999-10-01
1. Diadenosine triphosphate (AP3A) and diadenosine tetraphosphate (AP4A) are released by various cells (e.g. platelets and chromaffin cells), and may act as extracellular messengers. In pancreatic B-cells, AP3A and AP4A are inhibitors of the ATP-regulated K+ channels, and glucose increases intracellular levels of both substances. 2. We have studied the effect of exogenous AP3A and AP4A on insulin and glucagon secretion by the perfused rat pancreas. 3. AP3A did not significantly modify insulin or glucagon release, whereas AP4A induced a prompt, short-lived insulin response ( approximately 4 fold higher than basal value; P<0.05) in pancreases perfused at different glucose concentrations (3.2, 5.5 or 9 mM). AP4A-induced insulin release was abolished by somatostatin and by diazoxide. These two substances share the capacity to activate ATP-dependent K+ channels, suggesting that these channels are a potential target for AP4A in the B-cell. 4. AP4A stimulated glucagon release at both 3.2 and 5.5 mM glucose. This effect was abolished by somatostatin. 5. The results suggest that extracellular AP4A may play a physiological role in the control of insulin and glucagon secretion.
Staphylococcal Immune Evasion Proteins: Structure, Function, and Host Adaptation.
Koymans, Kirsten J; Vrieling, Manouk; Gorham, Ronald D; van Strijp, Jos A G
2017-01-01
Staphylococcus aureus is a successful human and animal pathogen. Its pathogenicity is linked to its ability to secrete a large amount of virulence factors. These secreted proteins interfere with many critical components of the immune system, both innate and adaptive, and hamper proper immune functioning. In recent years, numerous studies have been conducted in order to understand the molecular mechanism underlying the interaction of evasion molecules with the host immune system. Structural studies have fundamentally contributed to our understanding of the mechanisms of action of the individual factors. Furthermore, such studies revealed one of the most striking characteristics of the secreted immune evasion molecules: their conserved structure. Despite high-sequence variability, most immune evasion molecules belong to a small number of structural categories. Another remarkable characteristic is that S. aureus carries most of these virulence factors on mobile genetic elements (MGE) or ex-MGE in its accessory genome. Coevolution of pathogen and host has resulted in immune evasion molecules with a highly host-specific function and prevalence. In this review, we explore how these shared structures and genomic locations relate to function and host specificity. This is discussed in the context of therapeutic options for these immune evasion molecules in infectious as well as in inflammatory diseases.
Kawabe, Yoshihiro; Mizobe, Kenich; Bando, Yasuhiko; Sakiyama, Koji; Taira, Fuyoko; Tomomura, Akito; Araki, Hisao; Amano, Osamu
2016-12-28
Myoepithelial cells (MECs) exist on the basal surface of acini in major exocrine glands, include myofilaments and various constructive proteins, and share characteristics with smooth muscle and epithelial cells. MECs project several ramified processes to invest acini, and possibly contract to compress acini to support the secretion by the glandular cells. However, the functional roles of MECs in salivary secretion are still unclear. We investigated morphological changes in immunostained MECs using the anti-α-smooth muscle actin (αSMA) antibody in operated or non-operated contralateral (NC) submandibular glands after partial or total resection. Furthermore, we investigated and discuss other salivary glands of rats. MECs in the parotid, sublingual and submandibular gland of adult rats exhibited different shapes and localizations. After surgery, in both operated and NC glands, the number of MECs and αSMA-immunopositive areas increased significantly. Three-dimensional analysis using a confocal laser-scanning microscope revealed that substantial and significant enhancement became evident in the number, length, and thickness of MEC-processes covering acini of the operated and NC submandibular glands. The preset findings indicate that MECs alter the morphology of their processes in operated and NC glands after surgery of the partial or total resection. It is suggested that MECs promote salivary secretion using elongated, thickened, and more ramified processes.
Regulation of Memory T Cells by Interleukin-23.
Li, Yanchun; Wang, Hongbo; Lu, Honghua; Hua, Shucheng
2016-01-01
Interleukin-23 (IL-23), a member of the IL-12 family of cytokines, is a heterodimeric cytokine. It is composed of subunits p40 (shared with IL-12) and p19 (an IL-12 p35-related subunit) and is secreted by several types of immune cells, such as natural killer cells and dendritic cells. The IL-23 receptor is composed of the subunit IL-12Rβ1 and the IL-23-specific subunit IL-23R. The binding of IL-23 to its specific cell surface receptor regulates a number of functions, including proliferation and differentiation of cells and secretion of cell factors. Memory T cells are a subset of T cells that secrete numerous important cell factors, and they function in the immune response to infection and diseases like cancer, autoimmune disease and bronchial asthma. IL-23R is expressed on the surface of memory T cells, which suggests that it can specifically regulate memory T cell function. IL-23 has been widely used as a clinical indicator in immune-related diseases and shows potential for use in disease treatment. Here we review the current progress in the study of the role of IL-23 in the regulation of memory T cells. © 2016 S. Karger AG, Basel.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-01-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473
Tsutsui, Shigeyuki; Yamaguchi, Motoki; Hirasawa, Ai; Nakamura, Osamu; Watanabe, Tasuku
2009-08-01
A lactose-specific lectin with a molecular mass of about 25 kDa was purified from the skin mucus of a cartilaginous fish-the common skate (Raja kenojei). The complementary DNA sequence of the lectin was 1540 bp long and contained a reading frame encoding 226 amino acids, which showed approximately 38% identity to pentraxins of mammals and teleosts. Gene expression was observed in the skin, gill, stomach and intestine in the healthy skate. We also identified an isotype gene from the liver whose deduced amino-acid sequence shared 69.0% identity with the skin type gene. The antiserum detected protein in the skin, where the lectin is localized in the epidermal cells, and in the blood plasma. The lectin genes are multicopied in the common skate genome. Although pentraxins are acute phase proteins, mRNAs of both the isotypes were not upregulated after the in vivo challenge with formalin-killed Escherichia coli, which suggests that they are constantly present in the skin mucus and blood plasma to protect against pathogenic invasion. This lectin is the fifth type of lectin found in the cutaneous secretions of fish, demonstrating that skin mucus lectins have evolved with marked molecular diversity in fish.
Sweeney, Connor; Lakshmanan, Venkatachalam; Bais, Harsh P
2017-01-01
When disrupted by stimuli such as herbivory, pathogenic infection, or mechanical wounding, plants secrete signals such as root exudates and volatile organic compounds (VOCs). The emission of VOCs induces a response in the neighboring plant communities and can improve plant fitness by alerting nearby plants of an impending threat and prompting them to alter their physiology for defensive purposes. In this study, we investigated the role of plant-derived signals, released as a result of mechanical wounding, that may play a role in intraspecific communication between Arabidopsis thaliana communities. Plant-derived signals released by the wounded plant resulted in more elaborate root development in the neighboring, unwounded plants. Such plant-derived signals also upregulated the Aluminum-activated malate transporter ( ALMT1 ) responsible for the secretion of malic acid (MA) and the DR5 promoter, an auxin responsive promoter concentrated in root apex of the neighboring plants. We speculate that plant-derived signal-induced upregulation of root-specific ALMT1 in the undamaged neighboring plants sharing the environment with stressed plants may associate more with the benign microbes belowground. We also observed increased association of beneficial bacterium Bacillus subtilis UD1022 on roots of the neighboring plants sharing environment with the damaged plants. Wounding-induced plant-derived signals therefore induce defense mechanisms in the undamaged, local plants, eliciting a two-pronged preemptive response of more rapid root growth and up-regulation of ALMT1 , resulting in increased association with beneficial microbiome.
Variola virus immune evasion proteins.
Dunlop, Lance R; Oehlberg, Katherine A; Reid, Jeremy J; Avci, Dilek; Rosengard, Ariella M
2003-09-01
Variola virus, the causative agent of smallpox, encodes approximately 200 proteins. Over 80 of these proteins are located in the terminal regions of the genome, where proteins associated with host immune evasion are encoded. To date, only two variola proteins have been characterized. Both are located in the terminal regions and demonstrate immunoregulatory functions. One protein, the smallpox inhibitor of complement enzymes (SPICE), is homologous to a vaccinia virus virulence factor, the vaccinia virus complement-control protein (VCP), which has been found experimentally to be expressed early in the course of vaccinia infection. Both SPICE and VCP are similar in structure and function to the family of mammalian complement regulatory proteins, which function to prevent inadvertent injury to adjacent cells and tissues during complement activation. The second variola protein is the variola virus high-affinity secreted chemokine-binding protein type II (CKBP-II, CBP-II, vCCI), which binds CC-chemokine receptors. The vaccinia homologue of CKBP-II is secreted both early and late in infection. CKBP-II proteins are highly conserved among orthopoxviruses, sharing approximately 85% homology, but are absent in eukaryotes. This characteristic sets it apart from other known virulence factors in orthopoxviruses, which share sequence homology with known mammalian immune regulatory gene products. Future studies of additional variola proteins may help illuminate factors associated with its virulence, pathogenesis and strict human tropism. In addition, these studies may also assist in the development of targeted therapies for the treatment of both smallpox and human immune-related diseases.
Soluble adenylyl cyclase is an acid-base sensor in epithelial base-secreting cells.
Roa, Jinae N; Tresguerres, Martin
2016-08-01
Blood acid-base regulation by specialized epithelia, such as gills and kidney, requires the ability to sense blood acid-base status. Here, we developed primary cultures of ray (Urolophus halleri) gill cells to study mechanisms for acid-base sensing without the interference of whole animal hormonal regulation. Ray gills have abundant base-secreting cells, identified by their noticeable expression of vacuolar-type H(+)-ATPase (VHA), and also express the evolutionarily conserved acid-base sensor soluble adenylyl cyclase (sAC). Exposure of cultured cells to extracellular alkalosis (pH 8.0, 40 mM HCO3 (-)) triggered VHA translocation to the cell membrane, similar to previous reports in live animals experiencing blood alkalosis. VHA translocation was dependent on sAC, as it was blocked by the sAC-specific inhibitor KH7. Ray gill base-secreting cells also express transmembrane adenylyl cyclases (tmACs); however, tmAC inhibition by 2',5'-dideoxyadenosine did not prevent alkalosis-dependent VHA translocation, and tmAC activation by forskolin reduced the abundance of VHA at the cell membrane. This study demonstrates that sAC is a necessary and sufficient sensor of extracellular alkalosis in ray gill base-secreting cells. In addition, this study indicates that different sources of cAMP differentially modulate cell biology. Copyright © 2016 the American Physiological Society.
Genome-Wide Analysis of Corynespora cassiicola Leaf Fall Disease Putative Effectors
Lopez, David; Ribeiro, Sébastien; Label, Philippe; Fumanal, Boris; Venisse, Jean-Stéphane; Kohler, Annegret; de Oliveira, Ricardo R.; Labutti, Kurt; Lipzen, Anna; Lail, Kathleen; Bauer, Diane; Ohm, Robin A.; Barry, Kerrie W.; Spatafora, Joseph; Grigoriev, Igor V.; Martin, Francis M.; Pujade-Renaud, Valérie
2018-01-01
Corynespora cassiicola is an Ascomycetes fungus with a broad host range and diverse life styles. Mostly known as a necrotrophic plant pathogen, it has also been associated with rare cases of human infection. In the rubber tree, this fungus causes the Corynespora leaf fall (CLF) disease, which increasingly affects natural rubber production in Asia and Africa. It has also been found as an endophyte in South American rubber plantations where no CLF outbreak has yet occurred. The C. cassiicola species is genetically highly diverse, but no clear relationship has been evidenced between phylogenetic lineage and pathogenicity. Cassiicolin, a small glycosylated secreted protein effector, is thought to be involved in the necrotrophic interaction with the rubber tree but some virulent C. cassiicola isolates do not have a cassiicolin gene. This study set out to identify other putative effectors involved in CLF. The genome of a highly virulent C. cassiicola isolate from the rubber tree (CCP) was sequenced and assembled. In silico prediction revealed 2870 putative effectors, comprising CAZymes, lipases, peptidases, secreted proteins and enzymes associated with secondary metabolism. Comparison with the genomes of 44 other fungal species, focusing on effector content, revealed a striking proximity with phylogenetically unrelated species (Colletotrichum acutatum, Colletotrichum gloesporioides, Fusarium oxysporum, nectria hematococca, and Botrosphaeria dothidea) sharing life style plasticity and broad host range. Candidate effectors involved in the compatible interaction with the rubber tree were identified by transcriptomic analysis. Differentially expressed genes included 92 putative effectors, among which cassiicolin and two other secreted singleton proteins. Finally, the genomes of 35 C. cassiicola isolates representing the genetic diversity of the species were sequenced and assembled, and putative effectors identified. At the intraspecific level, effector-based classification was found to be highly consistent with the phylogenomic trees. Identification of lineage-specific effectors is a key step toward understanding C. cassiicola virulence and host specialization mechanisms. PMID:29551995
Genome-Wide Analysis of Corynespora cassiicola Leaf Fall Disease Putative Effectors.
Lopez, David; Ribeiro, Sébastien; Label, Philippe; Fumanal, Boris; Venisse, Jean-Stéphane; Kohler, Annegret; de Oliveira, Ricardo R; Labutti, Kurt; Lipzen, Anna; Lail, Kathleen; Bauer, Diane; Ohm, Robin A; Barry, Kerrie W; Spatafora, Joseph; Grigoriev, Igor V; Martin, Francis M; Pujade-Renaud, Valérie
2018-01-01
Corynespora cassiicola is an Ascomycetes fungus with a broad host range and diverse life styles. Mostly known as a necrotrophic plant pathogen, it has also been associated with rare cases of human infection. In the rubber tree, this fungus causes the Corynespora leaf fall (CLF) disease, which increasingly affects natural rubber production in Asia and Africa. It has also been found as an endophyte in South American rubber plantations where no CLF outbreak has yet occurred. The C. cassiicola species is genetically highly diverse, but no clear relationship has been evidenced between phylogenetic lineage and pathogenicity. Cassiicolin, a small glycosylated secreted protein effector, is thought to be involved in the necrotrophic interaction with the rubber tree but some virulent C. cassiicola isolates do not have a cassiicolin gene. This study set out to identify other putative effectors involved in CLF. The genome of a highly virulent C. cassiicola isolate from the rubber tree (CCP) was sequenced and assembled. In silico prediction revealed 2870 putative effectors, comprising CAZymes, lipases, peptidases, secreted proteins and enzymes associated with secondary metabolism. Comparison with the genomes of 44 other fungal species, focusing on effector content, revealed a striking proximity with phylogenetically unrelated species ( Colletotrichum acutatum, Colletotrichum gloesporioides, Fusarium oxysporum, nectria hematococca , and Botrosphaeria dothidea ) sharing life style plasticity and broad host range. Candidate effectors involved in the compatible interaction with the rubber tree were identified by transcriptomic analysis. Differentially expressed genes included 92 putative effectors, among which cassiicolin and two other secreted singleton proteins. Finally, the genomes of 35 C. cassiicola isolates representing the genetic diversity of the species were sequenced and assembled, and putative effectors identified. At the intraspecific level, effector-based classification was found to be highly consistent with the phylogenomic trees. Identification of lineage-specific effectors is a key step toward understanding C. cassiicola virulence and host specialization mechanisms.
Okamoto, Naoki; Yamanaka, Naoki; Satake, Honoo; Saegusa, Hironao; Kataoka, Hiroshi; Mizoguchi, Akira
2009-03-01
Insulin-like growth factors (IGFs) play essential roles in fetal and postnatal growth and development of mammals. They are secreted by a wide variety of tissues, with the liver being the major source of circulating IGFs, and regulate cell growth, differentiation and survival. IGFs share some biological activities with insulin but are secreted in distinct physiological and developmental contexts, having specific functions. Although recent analyses of invertebrate genomes have revealed the presence of multiple insulin family peptide genes in each genome, little is known about functional diversification of the gene products. Here we show that a novel insulin family peptide of the silkmoth Bombyx mori, which was purified and sequenced from the hemolymph, is more like IGFs than like insulin, in contrast to bombyxins, which are previously identified insulin-like peptides in B. mori. Expression analysis reveals that this IGF-like peptide is predominantly produced by the fat body, a functional equivalent of the vertebrate liver and adipocytes, and is massively released during pupa-adult development. Studies using in vitro tissue culture systems show that secretion of the peptide is stimulated by ecdysteroid and that the secreted peptide promotes the growth of adult-specific tissues. These observations suggest that this peptide is a Bombyx counterpart of vertebrate IGFs and that functionally IGF-like peptides may be more ubiquitous in the animal kingdom than previously thought. Our results also suggest that the known effects of ecdysteroid on insect adult development may be in part mediated by IGF-like peptides.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Overlooked Short Toxin-Like Proteins: A Shortcut to Drug Design
Linial, Michal
2017-01-01
Short stable peptides have huge potential for novel therapies and biosimilars. Cysteine-rich short proteins are characterized by multiple disulfide bridges in a compact structure. Many of these metazoan proteins are processed, folded, and secreted as soluble stable folds. These properties are shared by both marine and terrestrial animal toxins. These stable short proteins are promising sources for new drug development. We developed ClanTox (classifier of animal toxins) to identify toxin-like proteins (TOLIPs) using machine learning models trained on a large-scale proteomic database. Insects proteomes provide a rich source for protein innovations. Therefore, we seek overlooked toxin-like proteins from insects (coined iTOLIPs). Out of 4180 short (<75 amino acids) secreted proteins, 379 were predicted as iTOLIPs with high confidence, with as many as 30% of the genes marked as uncharacterized. Based on bioinformatics, structure modeling, and data-mining methods, we found that the most significant group of predicted iTOLIPs carry antimicrobial activity. Among the top predicted sequences were 120 termicin genes from termites with antifungal properties. Structural variations of insect antimicrobial peptides illustrate the similarity to a short version of the defensin fold with antifungal specificity. We also identified 9 proteins that strongly resemble ion channel inhibitors from scorpion and conus toxins. Furthermore, we assigned functional fold to numerous uncharacterized iTOLIPs. We conclude that a systematic approach for finding iTOLIPs provides a rich source of peptides for drug design and innovative therapeutic discoveries. PMID:29109389
The Virginia Slims identity crisis: an inside look at tobacco industry marketing to women
Toll, B; Ling, P
2005-01-01
Objectives: Because no prior studies have comprehensively analysed previously secret tobacco industry documents describing marketing female brands, the Virginia Slims brand was studied to explore how Philip Morris and competitors develop and adapt promotional campaigns targeting women. Methods: Analysis of previously secret tobacco industry documents. The majority of the documents used were from Philip Morris. Results: The key to Virginia Slims advertising was creating an aspirational image which women associated with the brand. Virginia Slims co-opted women's liberation slogans to build a modern female image from 1968 through to the 1980s, and its market share grew from 0.24% to 3.16% during that time period. Ironically, the feminist image that worked very well for the brand was also the reason for its subsequent problems. Philip Morris experienced unprecedented losses in market share in the early 1990s, with a decline in market share for four consecutive years from 3.16% to 2.26%; they attributed this decline to both the fact that the brand's feminist image no longer appealed to young women aged 18–24 years, and increased competition from more contemporary and lower priced competitors. Throughout the 1990s, attempts to reacquire young women while retaining Virginia Slims loyal (now older) smokers were made using a "King Size" line extension, new slogans, and loyalty building promotions. Conclusions: Tobacco advertisers initially created distinct female brands with aspirational images; continued appeal to young women was critical for long term growth. The need for established brands to evolve to maintain relevance to young women creates an opportunity for tobacco counter-marketing, which should undermine tobacco brand imagery and promote aspirational smoke-free lifestyle images. Young women age 18–24 are extremely valuable to the tobacco industry and should be a focus for tobacco control programmes. PMID:15923467
LeBoeuf, Brigitte; Garcia, L. Rene
2016-01-01
Sexual dimorphism can be achieved using a variety of mechanisms, including sex-specific circuits and sex-specific function of shared circuits, though how these work together to produce sexually dimorphic behaviors requires further investigation. Here, we explore how components of the sex-shared defecation circuitry are incorporated into the sex-specific male mating circuitry in Caenorhabditis elegans to produce successful copulation. Using behavioral studies, calcium imaging, and genetic manipulation, we show that aspects of the defecation system are coopted by the male copulatory circuitry to facilitate intromission and ejaculation. Similar to hermaphrodites, male defecation is initiated by an intestinal calcium wave, but circuit activity is coordinated differently during mating. In hermaphrodites, the tail neuron DVB promotes expulsion of gut contents through the release of the neurotransmitter GABA onto the anal depressor muscle. However, in the male, both neuron and muscle take on modified functions to promote successful copulation. Males require calcium-dependent activator protein for secretion (CAPS)/unc-31, a dense core vesicle exocytosis activator protein, in the DVB to regulate copulatory spicule insertion, while the anal depressor is remodeled to promote release of sperm into the hermaphrodite. This work shows how sex-shared circuitry is modified in multiple ways to contribute to sex-specific mating. PMID:28031243
K-Anonymous Multi-party Secret Handshakes
NASA Astrophysics Data System (ADS)
Xu, Shouhuai; Yung, Moti
Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, authentication methods are also crucial for such interactions. Secret handshake is a relatively recent mechanism that facilitates privacy-preserving mutual authentication between communicating peers. In recent years, researchers have proposed a set of secret handshake schemes based on different assumptions about the credentials used: from one-time credentials to the more general PKI-like credentials. In this paper, we concentrate on k-anonymous secret handshake schemes based on PKI-like infrastructures. More specifically, we deal with the k-anonymous m-party (m > 2) secret handshake problem, which is significantly more involved than its two-party counterpart due to the following: When an honest user hand-shakes with m - 1 parties, it must be assured that these parties are distinct; otherwise, under the mask of anonymity a dishonest participant may clone itself in a single handshake session (i.e., assuming multiple personalities).
Tejeda-Dominguez, Farid; Huerta-Cantillo, Jazmin; Chavez-Dueñas, Lucia; Navarro-Garcia, Fernando
2017-03-28
The type 3 secretion system (T3SS) is essential for bacterial virulence through delivering effector proteins directly into the host cytosol. Here, we identified an alternative delivery mechanism of virulence factors mediated by the T3SS, which consists of the association of extracellularly secreted proteins from bacteria with the T3SS to gain access to the host cytosol. Both EspC, a protein secreted as an enteropathogenic Escherichia coli (EPEC) autotransporter, and YopH, a protein detected on the surface of Yersinia , require a functional T3SS for host cell internalization; here we provide biophysical and molecular evidence to support the concept of the EspC translocation mechanism, which requires (i) an interaction between EspA and an EspC middle segment, (ii) an EspC translocation motif (21 residues that are shared with the YopH translocation motif), (iii) increases in the association and dissociation rates of EspC mediated by EspA interacting with EspD, and (iv) an interaction of EspC with the EspD/EspB translocon pore. Interestingly, this novel mechanism does not exclude the injection model (i.e., EspF) operating through the T3SS conduit; therefore, T3SS can be functioning as an internal conduit or as an external railway, which can be used to reach the translocator pore, and this mechanism appears to be conserved among different T3SS-dependent pathogens. IMPORTANCE The type 3 secretion system is essential for injection of virulence factors, which are delivered directly into the cytosol of the host cells for usurping and subverting host processes. Recent studies have shown that these effectors proteins indeed travel inside an "injectisome" conduit through a single step of translocation by connecting the bacterium and host cell cytoplasms. However, all findings are not compatible with this model. For example, both YopH, a protein detected on the surface of Yersinia , and EspC, an autotransporter protein secreted by enteropathogenic E. coli , require a functional T3SS for host cell translocation. Both proteins have an intermediate extracellular step before their T3SS-dependent translocation. Here, we show an alternative delivery mechanism for these extracellularly secreted virulence factors that are then incorporated into the T3SS to enter the cells; this novel mechanism coexists with but diverges from the canonical injection model that involves the passage of the protein inside the injectisome. Copyright © 2017 Tejeda-Dominguez et al.
NASA Technical Reports Server (NTRS)
Morgan, William F.
2003-01-01
A number of nontargeted and delayed effects associated with radiation exposure have now been described. These include radiation-induced genomic instability, death-inducing and bystander effects, clastogenic factors and transgenerational effects. It is unlikely that these nontargeted effects are directly induced by cellular irradiation. Instead, it is proposed that some as yet to be identified secreted factor can be produced by irradiated cells that can stimulate effects in nonirradiated cells (death-inducing and bystander effects, clastogenic factors) and perpetuate genomic instability in the clonally expanded progeny of an irradiated cell. The proposed factor must be soluble and capable of being transported between cells by cell-to-cell gap junction communication channels. Furthermore, it must have the potential to stimulate cellular cytokines and/or reactive oxygen species. While it is difficult to imagine a role for such a secreted factor in contributing to transgenerational effects, the other nontargeted effects of radiation may all share a common mechanism.
Protected by fumigants: beetle perfumes in antimicrobial defense.
Gross, Jürgen; Schumacher, Kerstin; Schmidtberg, Henrike; Vilcinskas, Andreas
2008-02-01
Beetles share with other eukaryotes an innate immune system that mediates endogenous defense against pathogens. In addition, larvae of some taxa produce fluid exocrine secretions that contain antimicrobial compounds. In this paper, we provide evidence that larvae of the brassy willow leaf beetle Phratora vitellinae constitutively release volatile glandular secretions that combat pathogens in their microenvironment. We identified salicylaldehyde as the major component of their enveloping perfume cloud, which is emitted by furrow-shaped openings of larval glandular reservoirs and which inhibits in vitro the growth of the bacterial entomopathogen Bacillus thuringiensis. The suggested role of salicylaldehyde as a fumigant in exogenous antimicrobial defense was confirmed in vivo by its removal from glandular reservoirs. This resulted in an enhanced susceptibility of the larvae to infection with the fungal entomopathogens Beauveria bassiana and Metarhizium anisopliae. Consequently, we established the hypothesis that antimicrobial defense in beetles can be expanded beyond innate immunity to include external disinfection of their microenvironment, and we report for the first time the contribution of fumigants to antimicrobial defense in animals.
NASA Astrophysics Data System (ADS)
2004-03-01
Italy’s Physics Olympiad creates greater interest and motivation House of Experiments: 'humour helps in the teaching of science' Science takes stage in Germany PPARC news: guide and awards Schools newspaper competition focuses on Venus Website offers practical advice SHAP workshop will sharpen up teachers' skills Students will soon use Faulkes Telescope North to see the stars Talk takes a tour of the universe ASE 2004 Welsh physicists share secrets Switch students on to physics Teachers Awards 2004 recognize quality of teaching AAPT spends winter in Miami sun Schools Physics Group meeting will take place at Rugby School
NASA Astrophysics Data System (ADS)
Zhang, Zhan-Jun
2006-03-01
I present a scheme which allows an arbitrary 2-qubit quantum state teleportation between two remote parties with control of many agents in a network. Comparisons between the present scheme and the existing scheme proposed recently [F.G. Deng, et al., Phys. Rev. A 72 (2005) 022338] are made. It seems that the present scheme is much simpler and more economic. Then I generalize the scheme to teleport an arbitrary n-qubit quantum state between two remote parties with control of agents in a network.
Counterfactual quantum cryptography network with untrusted relay
NASA Astrophysics Data System (ADS)
Chen, Yuanyuan; Gu, Xuemei; Jiang, Dong; Xie, Ling; Chen, Lijun
2015-07-01
Counterfactual quantum cryptography allows two remote parties to share a secret key even though a physical particle is not in fact transmitted through the quantum channel. In order to extend the scope of counterfactual quantum cryptography, we use an untrusted relay to construct a multi-user network. The implementation issues are discussed to show that the scheme can be realized with current technologies. We also prove the practical security advantages of the scheme by eliminating the probability that an eavesdropper can directly access the signal or an untrusted relay can perform false operations.
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks
NASA Astrophysics Data System (ADS)
Li, Celia; Wang, Zhuang; Yang, Cungang
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.
NASA Astrophysics Data System (ADS)
Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun
2018-07-01
In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.
Nyman, Tuula A; Lorey, Martina B; Cypryk, Wojciech; Matikainen, Sampsa
2017-05-01
The immune system is our defense system against microbial infections and tissue injury, and understanding how it works in detail is essential for developing drugs for different diseases. Mass spectrometry-based proteomics can provide in-depth information on the molecular mechanisms involved in immune responses. Areas covered: Summarized are the key immunology findings obtained with MS-based proteomics in the past five years, with a focus on inflammasome activation, global protein secretion, mucosal immunology, immunopeptidome and T cells. Special focus is on extracellular vesicle-mediated protein secretion and its role in immune responses. Expert commentary: Proteomics is an essential part of modern omics-scale immunology research. To date, MS-based proteomics has been used in immunology to study protein expression levels, their subcellular localization, secretion, post-translational modifications, and interactions in immune cells upon activation by different stimuli. These studies have made major contributions to understanding the molecular mechanisms involved in innate and adaptive immune responses. New developments in proteomics offer constantly novel possibilities for exploring the immune system. Examples of these techniques include mass cytometry and different MS-based imaging approaches which can be widely used in immunology.
Chahal, Sabreen; Wei, Peter; Moua, Pachai; Park, Sung Pil James; Kwon, Janet; Patel, Arth; Vu, Anthony T; Catolico, Jason A; Tsai, Yu Fang Tina; Shaheen, Nadia; Chu, Tiffany T; Tam, Vivian; Khan, Zill-E-Huma; Joo, Hyun Henry; Xue, Liang; Lin-Cereghino, Joan; Tsai, Jerry W; Lin-Cereghino, Geoff P
2017-01-20
The methylotrophic yeast Pichia pastoris has been used extensively for expressing recombinant proteins because it combines the ease of genetic manipulation, the ability to provide complex posttranslational modifications and the capacity for efficient protein secretion. The most successful and commonly used secretion signal leader in Pichia pastoris has been the alpha mating factor (MATα) prepro secretion signal. However, limitations exist as some proteins cannot be secreted efficiently, leading to strategies to enhance secretion efficiency by modifying the secretion signal leader. Based on a Jpred secondary structure prediction and knob-socket modeling of tertiary structure, numerous deletions and duplications of the MATα prepro leader were engineered to evaluate the correlation between predicted secondary structure and the secretion level of the reporters horseradish peroxidase (HRP) and Candida antarctica lipase B. In addition, circular dichroism analyses were completed for the wild type and several mutant pro-peptides to evaluate actual differences in secondary structure. The results lead to a new model of MATα pro-peptide signal leader, which suggests that the N and C-termini of MATα pro-peptide need to be presented in a specific orientation for proper interaction with the cellular secretion machinery and for efficient protein secretion. Copyright © 2016 Elsevier B.V. All rights reserved.
Optical properties of the uropygial gland secretion: no evidence for UV cosmetics in birds
NASA Astrophysics Data System (ADS)
Delhey, Kaspar; Peters, Anne; Biedermann, Peter H. W.; Kempenaers, Bart
2008-10-01
Ultraviolet (UV) reflectance of the plumage is common in birds and plays an important role in sexual signalling. Recently, it has been proposed that birds are able to modify plumage UV reflectance by the application of uropygial gland secretion. Based on a survey of the optical properties of this secretion from 51 species belonging to 12 avian orders, we show that two main types of uropygial secretions exist, one predominantly found in passerines and one in non-passerines, both reducing relative UV reflectance of a white background (Teflon™ tape). We quantified how each type of secretion (exemplified by blue tit and mallard) affected feather UV reflectance. Both secretions reduced overall brightness and relative UV reflectance of white mallard feathers but hardly affected the reflectance of UV/blue blue tit crown feathers. According to models of avian colour vision, changes in reflectance due to application of the secretion were at or below the discrimination threshold of most birds. We conclude that the uropygial secretion is unlikely to play a major role in modifying plumage UV reflectance. However, the optical properties of the uropygial secretion may have been selected to interfere as little as possible with visual signaling through plumage reflectance.
Liposome-mediated amplified detection of cell-secreted matrix metalloproteinase-9†
Banerjee, Jayati; Hanson, Andrea J.; Nyren-Erickson, Erin K.; Ganguli, Bratati; Wagh, Anil; Muhonen, Wallace W.; Law, Benedict; Shabb, John B.; Srivastava, D. K.; Mallik, Sanku
2018-01-01
A liposome-based amplified detection system is presented for the cancer cell secreted pathogenic enzyme matrix metalloproteinase-9 which does not require the use of biological antibodies. PMID:20424776
Freedman, S D; Scheele, G A
1994-03-23
The role of acid-base interactions during coordinated acinar and duct cell secretion in the exocrine pancreas is described. The sequence of acid-base events may be summarized as follows: (1) Sorting of secretory proteins and membrane components into the regulated secretory pathway of pancreatic acinar cells is triggered by acid- and calcium-induced aggregation and association mechanisms located in the trans-Golgi network. (2) Cholecystokinin-stimulated exocytosis in acinar cells releases the acidic contents of secretory granules into the acinar lumen. (3) Secretin-stimulated bicarbonate secretion from duct and duct-like cells neutralizes the acidic pH of exocytic contents, which leads to dissociation of protein aggregates and solubilization of (pro)enzymes within the acinar lumen. (4) Stimulated fluid secretion transports solubilized enzymes through the ductal system. (5) Further alkalinization of acinar lumen pH accelerates the enzymatic cleavage of the glycosyl phosphatidyl-inositol anchor associated with GP2 and thus releases the GP2/proteoglycan matrix from lumenal membranes, a process that appears to be required for vesicular retrieval of granule membranes from the apical plasma membrane and their reuse in the secretory process. We conclude that the central function of bicarbonate secretion by centroacinar and duct cells in the pancreas is to neutralize and then alkalinize the pH of the acinar lumen, sequential process that are required for (a) solubilization of secreted proteins and (b) cellular retrieval of granule membranes, respectively.
Chakraborty, Smarajit; Mizusaki, Hideaki; Kenney, Linda J.
2015-01-01
In bacteria, one paradigm for signal transduction is the two-component regulatory system, consisting of a sensor kinase (usually a membrane protein) and a response regulator (usually a DNA binding protein). The EnvZ/OmpR two-component system responds to osmotic stress and regulates expression of outer membrane proteins. In Salmonella, EnvZ/OmpR also controls expression of another two-component system SsrA/B, which is located on Salmonella Pathogenicity Island (SPI) 2. SPI-2 encodes a type III secretion system, which functions as a nanomachine to inject bacterial effector proteins into eukaryotic cells. During the intracellular phase of infection, Salmonella switches from assembling type III secretion system structural components to secreting effectors into the macrophage cytoplasm, enabling Salmonella to replicate in the phagocytic vacuole. Major questions remain regarding how bacteria survive the acidified vacuole and how acidification affects bacterial secretion. We previously reported that EnvZ sensed cytoplasmic signals rather than extracellular ones, as intracellular osmolytes altered the dynamics of a 17-amino-acid region flanking the phosphorylated histidine. We reasoned that the Salmonella cytoplasm might acidify in the macrophage vacuole to activate OmpR-dependent transcription of SPI-2 genes. To address these questions, we employed a DNA-based FRET biosensor (“I-switch”) to measure bacterial cytoplasmic pH and immunofluorescence to monitor effector secretion during infection. Surprisingly, we observed a rapid drop in bacterial cytoplasmic pH upon phagocytosis that was not predicted by current models. Cytoplasmic acidification was completely dependent on the OmpR response regulator, but did not require known OmpR-regulated genes such as ompC, ompF, or ssaC (SPI-2). Microarray analysis highlighted the cadC/BA operon, and additional experiments confirmed that it was repressed by OmpR. Acidification was blocked in the ompR null background in a Cad-dependent manner. Acid-dependent activation of OmpR stimulated type III secretion; blocking acidification resulted in a neutralized cytoplasm that was defective for SPI-2 secretion. Based upon these findings, we propose that Salmonella infection involves an acid-dependent secretion process in which the translocon SseB moves away from the bacterial cell surface as it associates with the vacuolar membrane, driving the secretion of SPI-2 effectors such as SseJ. New steps in the SPI-2 secretion process are proposed. PMID:25875623
Diarrhoeal disease through enterocyte secretion: a doctrine untroubled by proof.
Lucas, Michael L
2010-04-01
For almost 40 years, one of the principal causes of diarrhoeal disease has been thought to be fluid secretion emanating from the epithelial cells of the small and large intestine. Given the extremely large fluid losses seen in cholera, where secretion can be up to several litres per day, this seems a plausible hypothesis. The enterocyte (epithelial cell) secretion hypothesis rapidly displaced all other alternatives, such as vasodilatation coupled with enhanced paracellular permeability. An essential mechanism underlying enterocyte secretion has always been assumed to be electrogenic chloride secretion, leading to a localized osmotic imbalance at the mucosal surface of the enterocytes that causes fluid entry into the lumen by osmosis. The chloride secretion basis for enterotoxin-deranged secretion is assumed to be measurable by changes in electrical currents and by altered transport of chloride ion. These can be detected after the small intestine is exposed to a heat-stable enterotoxin (STa) produced by Escherichia coli. However, in vivo, when the recovered volume technique is used, STa is found not to be secretory. The heat-stable enterotoxin is therefore a test case toxin, because the complex techniques used to demonstrate enterocyte secretion after STa exposure show apparent secretion, while the simplest technique based on fluid recovery and genuinely measuring the mass transport of fluid does not. This review scrutinizes the nature of the evidence put forward for enterocyte secretion and reaches the conclusion that there is no evidence for it. Debilitating secretion undoubtedly does take place in severe diarrhoeal disease, but secretion from enterocytes is unlikely to be the cause.
Refractory relapsing polychondritis: challenges and solutions
Lekpa, Fernando Kemta; Chevalier, Xavier
2018-01-01
Relapsing polychondritis is a severe systemic immune-mediated disease characterized by an episodic and progressive inflammatory condition with progressive destruction of cartilaginous structures. This disease has for nearly a century kept secrets not yet explained. The real incidence and prevalence of this rare disease are unknown. The multiple clinical presentations and episodic nature of relapsing polychondritis cause a significant diagnosis delay. No guidelines for the management of patients with relapsing polychondritis have been validated to date. The challenges remain, both in the understanding of its pathophysiology and diagnosis, evaluation of its activity and prognosis, and its treatment. Possible solutions involve the sharing of data for relapsing polychondritis from worldwide reference centers. Thus, we would be able to evolve toward a better knowledge of its pathophysiology, the publication of new diagnosis criteria, which will include biological markers and imaging findings, the prediction of life-threatening or organ-threatening situations, and the publication of therapeutic evidence-based guidelines after performing at randomized controlled trials. PMID:29391837
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berka, Randy M.; Grigoriev, Igor V.; Otillar, Robert
2011-10-02
Thermostable enzymes and thermophilic cell factories may afford economic advantages in the production of many chemicals and biomass-based fuels. Here we describe and compare the genomes of two thermophilic fungi, Myceliophthora thermophila and Thielavia terrestris. To our knowledge, these genomes are the first described for thermophilic eukaryotes and the first complete telomere-to-telomere genomes for filamentous fungi. Genome analyses and experimental data suggest that both thermophiles are capable of hydrolyzing all major polysaccharides found in biomass. Examination of transcriptome data and secreted proteins suggests that the two fungi use shared approaches in the hydrolysis of cellulose and xylan but distinct mechanismsmore » in pectin degradation. Characterization of the biomass-hydrolyzing activity of recombinant enzymes suggests that these organisms are highly efficient in biomass decomposition at both moderate and high temperatures. Furthermore, we present evidence suggesting that aside from representing a potential reservoir of thermostable enzymes, thermophilic fungi are amenable to manipulation using classical and molecular genetics.« less
Memory attacks on device-independent quantum cryptography.
Barrett, Jonathan; Colbeck, Roger; Kent, Adrian
2013-01-04
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).
Fourier-based automatic alignment for improved Visual Cryptography schemes.
Machizaud, Jacques; Chavel, Pierre; Fournel, Thierry
2011-11-07
In Visual Cryptography, several images, called "shadow images", that separately contain no information, are overlapped to reveal a shared secret message. We develop a method to digitally register one printed shadow image acquired by a camera with a purely digital shadow image, stored in memory. Using Fourier techniques derived from Fourier Optics concepts, the idea is to enhance and exploit the quasi periodicity of the shadow images, composed by a random distribution of black and white patterns on a periodic sampling grid. The advantage is to speed up the security control or the access time to the message, in particular in the cases of a small pixel size or of large numbers of pixels. Furthermore, the interest of visual cryptography can be increased by embedding the initial message in two shadow images that do not have identical mathematical supports, making manual registration impractical. Experimental results demonstrate the successful operation of the method, including the possibility to directly project the result onto the printed shadow image.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berka, Randy M.; Grigoriev, Igor V.; Otillar, Robert
2011-05-16
Thermostable enzymes and thermophilic cell factories may afford economic advantages in the production of many chemicals and biomass-based fuels. Here we describe and compare the genomes of two thermophilic fungi, Myceliophthora thermophila and Thielavia terrestris. To our knowledge, these genomes are the first described for thermophilic eukaryotes and the first complete telomere-to-telomere genomes for filamentous fungi. Genome analyses and experimental data suggest that both thermophiles are capable of hydrolyzing all major polysaccharides found in biomass. Examination of transcriptome data and secreted proteins suggests that the two fungi use shared approaches in the hydrolysis of cellulose and xylan but distinct mechanismsmore » in pectin degradation. Characterization of the biomass-hydrolyzing activity of recombinant enzymes suggests that these organisms are highly efficient in biomass decomposition at both moderate and high temperatures. Furthermore, we present evidence suggesting that aside from representing a potential reservoir of thermostable enzymes, thermophilic fungi are amenable to manipulation using classical and molecular genetics.« less
A feedback-based secure path approach for wireless sensor network data collection.
Mao, Yuxin; Wei, Guiyi
2010-01-01
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.
NASA Astrophysics Data System (ADS)
Anitha Devi, M. D.; ShivaKumar, K. B.
2017-08-01
Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters
Lecocq, Thomas; Gérard, Maxence; Maebe, Kevin; Brasero, Nicolas; Dehon, Lauren; Smagghe, Guy; Valterová, Irena; De Meulemeester, Thibaut; Rasmont, Pierre; Michez, Denis
2017-08-01
The current bumblebee decline leads to inbreeding in populations that fosters a loss of allelic diversity and diploid male production. As diploid males are viable and their offspring are sterile, bumblebee populations can quickly fall in a vortex of extinction. In this article, we investigate for the first time a potential premating mechanism through a major chemical reproductive trait (male cephalic labial gland secretions) that could prevent monandrous virgin queens from mating with diploid males. We focus our study on the cephalic labial gland secretions of diploid and haploid males of Bombus terrestris (L.). Contrary to initial expectations, our results do not show any significant differentiation of cephalic labial gland secretions between diploid and haploid specimens. Queens seem therefore to be unable to avoid mating with diploid males based on their compositions of cephalic labial gland secretions. This suggests that the vortex of extinction of diploid males could not be stopped through premating avoidance based on the cephalic labial gland secretions but other mechanisms could avoid mating between diploid males and queens. © 2016 Institute of Zoology, Chinese Academy of Sciences.
Esteller, Alejandro
2008-10-07
The formation of bile depends on the structural and functional integrity of the bile-secretory apparatus and its impairment, in different situations, results in the syndrome of cholestasis. The structural bases that permit bile secretion as well as various aspects related with its composition and flow rate in physiological conditions will first be reviewed. Canalicular bile is produced by polarized hepatocytes that hold transporters in their basolateral (sinusoidal) and apical (canalicular) plasma membrane. This review summarizes recent data on the molecular determinants of this primary bile formation. The major function of the biliary tree is modification of canalicular bile by secretory and reabsorptive processes in bile-duct epithelial cells (cholangiocytes) as bile passes through bile ducts. The mechanisms of fluid and solute transport in cholangiocytes will also be discussed. In contrast to hepatocytes where secretion is constant and poorly controlled, cholangiocyte secretion is regulated by hormones and nerves. A short section dedicated to these regulatory mechanisms of bile secretion has been included. The aim of this revision was to set the bases for other reviews in this series that will be devoted to specific issues related with biliary physiology and pathology.
In situ monitoring of PTHLH secretion in neuroblastoma cells cultured onto nanoporous membranes.
de la Escosura-Muñiz, Alfredo; Espinoza-Castañeda, Marisol; Chamorro-García, Alejandro; Rodríguez-Hernández, Carlos J; de Torres, Carmen; Merkoçi, Arben
2018-06-01
In this work, we propose for the first time the use of anodic aluminum oxide (AAO) nanoporous membranes for in situ monitoring of parathyroid hormone-like hormone (PTHLH) secretion in cultured human cells. The biosensing system is based on the nanochannels blockage upon immunocomplex formation, which is electrically monitored through the voltammetric oxidation of Prussian blue nanoparticles (PBNPs). Models evaluated include a neuroblastoma cell line (SK-N-AS) and immortalized keratinocytes (HaCaT) as a control of high PTHLH production. The effect of total number of seeded cells and incubation time on the secreted PTHLH levels is assessed, finding that secreted PTHLH levels range from approximately 60 to 400 ng/mL. Moreover, our methodology is also applied to analyse PTHLH production following PTHLH gene knockdown upon transient cell transfection with a specific silencing RNA (siRNA). Given that inhibition of PTHLH secretion reduces cell proliferation, survival and invasiveness in a number of tumors, our system provides a powerful tool for the preclinical evaluation of therapies that regulate PTHLH production. This nanoporous membrane - based sensing technology might be useful to monitor the active secretion of other proteins as well, thus contributing to characterize their regulation and function. Copyright © 2018 Elsevier B.V. All rights reserved.
Hoyt, Laura R.; Ather, Jennifer L.; Randall, Matthew J.; DePuccio, Daniel P.; Landry, Christopher C.; Wewers, Mark D.; Gavrilin, Mikhail A.; Poynter, Matthew E.
2016-01-01
Immunosuppression is a major complication of alcoholism that contributes to increased rates of opportunistic infections and sepsis in alcoholics. The NLRP3 inflammasome, a multi-protein intracellular pattern recognition receptor complex that facilitates the cleavage and secretion of the pro-inflammatory cytokines IL-1β and IL-18, can be inhibited by ethanol and we sought to better understand the mechanism through which this occurs and whether chemically similar molecules exert comparable effects. We show that ethanol can specifically inhibit activation of the NLRP3 inflammasome, resulting in attenuated IL-1β and caspase-1 cleavage and secretion, as well as diminished ASC speck formation, without affecting potassium efflux, in a mouse macrophage cell line (J774), mouse bone marrow derived dendritic cells, mouse neutrophils, and human PBMCs. The inhibitory effects on the Nlrp3 inflammasome were independent of GABAA receptor activation or NMDA receptor inhibition, but was associated with decreased oxidant production. Ethanol treatment markedly decreased cellular tyrosine phosphorylation, while administration of the tyrosine phosphatase inhibitor sodium orthovanadate prior to ethanol restored tyrosine phosphorylation and IL-1β secretion subsequent to ATP stimulation. Furthermore, sodium orthovanadate-induced phosphorylation of ASC Y144, necessary and sufficient for Nlrp3 inflammasome activation, and secretion of phosphorylated ASC, were inhibited by ethanol. Finally, multiple alcohol-containing organic compounds exerted inhibitory effects on the Nlrp3 inflammasome, whereas 2-methylbutane (isopentane), the analogous alkane of the potent inhibitor isoamyl alcohol (isopentanol), did not. Our results demonstrate that ethanol antagonizes the NLRP3 inflammasome at an apical event in its activation through the stimulation of protein tyrosine phosphatases, an effect shared by other short-chain alcohols. PMID:27421477
Hoyt, Laura R; Ather, Jennifer L; Randall, Matthew J; DePuccio, Daniel P; Landry, Christopher C; Wewers, Mark D; Gavrilin, Mikhail A; Poynter, Matthew E
2016-08-15
Immunosuppression is a major complication of alcoholism that contributes to increased rates of opportunistic infections and sepsis in alcoholics. The NLRP3 inflammasome, a multiprotein intracellular pattern recognition receptor complex that facilitates the cleavage and secretion of the proinflammatory cytokines IL-1β and IL-18, can be inhibited by ethanol, and we sought to better understand the mechanism through which this occurs and whether chemically similar molecules exert comparable effects. We show that ethanol can specifically inhibit activation of the NLRP3 inflammasome, resulting in attenuated IL-1β and caspase-1 cleavage and secretion, as well as diminished apoptosis-associated speck-like protein containing a CARD (ASC) speck formation, without affecting potassium efflux, in a mouse macrophage cell line (J774), mouse bone marrow-derived dendritic cells, mouse neutrophils, and human PBMCs. The inhibitory effects on the Nlrp3 inflammasome were independent of γ-aminobutyric acid A receptor activation or N-methyl-d-asparate receptor inhibition but were associated with decreased oxidant production. Ethanol treatment markedly decreased cellular tyrosine phosphorylation, whereas administration of the tyrosine phosphatase inhibitor sodium orthovanadate prior to ethanol restored tyrosine phosphorylation and IL-1β secretion subsequent to ATP stimulation. Furthermore, sodium orthovanadate-induced phosphorylation of ASC Y144, necessary and sufficient for Nlrp3 inflammasome activation, and secretion of phosphorylated ASC were inhibited by ethanol. Finally, multiple alcohol-containing organic compounds exerted inhibitory effects on the Nlrp3 inflammasome, whereas 2-methylbutane (isopentane), the analogous alkane of the potent inhibitor isoamyl alcohol (isopentanol), did not. Our results demonstrate that ethanol antagonizes the NLRP3 inflammasome at an apical event in its activation through the stimulation of protein tyrosine phosphatases, an effect shared by other short-chain alcohols. Copyright © 2016 by The American Association of Immunologists, Inc.
Nectar and pollination drops: how different are they?
Nepi, Massimo; von Aderkas, Patrick; Wagner, Rebecca; Mugnaini, Serena; Coulter, Andrea; Pacini, Ettore
2009-08-01
Pollination drops and nectars (floral nectars) are secretions related to plant reproduction. The pollination drop is the landing site for the majority of gymnosperm pollen, whereas nectar of angiosperm flowers represents a common nutritional resource for a large variety of pollinators. Extrafloral nectars also are known from all vascular plants, although among the gymnosperms they are restricted to the Gnetales. Extrafloral nectars are not generally involved in reproduction but serve as 'reward' for ants defending plants against herbivores (indirect defence). Although very different in their task, nectars and pollination drops share some features, e.g. basic chemical composition and eventual consumption by animals. This has led some authors to call these secretions collectively nectar. Modern techniques that permit chemical analysis and protein characterization have very recently added important information about these sugary secretions that appear to be much more than a 'reward' for pollinating (floral nectar) and defending animals (extrafloral nectar) or a landing site for pollen (pollination drop). Nectar and pollination drops contain sugars as the main components, but the total concentration and the relative proportions are different. They also contain amino acids, of which proline is frequently the most abundant. Proteomic studies have revealed the presence of common functional classes of proteins such as invertases and defence-related proteins in nectar (floral and extrafloral) and pollination drops. Invertases allow for dynamic rearrangement of sugar composition following secretion. Defence-related proteins provide protection from invasion by fungi and bacteria. Currently, only few species have been studied in any depth. The chemical composition of the pollination drop must be investigated in a larger number of species if eventual phylogenetic relationships are to be revealed. Much more information can be provided from further proteomic studies of both nectar and pollination drop that will contribute to the study of plant reproduction and evolution.
Barta, Michael L.; Dickenson, Nicholas E.; Patil, Mrinalini; Keightley, Andrew; Wyckoff, Gerald J.; Picking, William D.; Picking, Wendy L.; Geisbrecht, Brian V.
2012-01-01
Many pathogenic Gram-negative bacteria utilize type III secretion systems (T3SS) to alter the normal functions of target cells. Shigella flexneri uses its T3SS to invade human intestinal cells to cause bacillary dysentery (shigellosis) which is responsible for over one million deaths per year. The Shigella type III secretion apparatus (T3SA) is comprised of a basal body spanning both bacterial membranes and an exposed oligomeric needle. Host altering effectors are secreted through this energized unidirectional conduit to promote bacterial invasion. The active needle tip complex of S. flexneri is composed of a tip protein, IpaD, and two pore-forming translocators, IpaB and IpaC. While the atomic structure of IpaD has been elucidated and studied, structural data on the hydrophobic translocators from the T3SS family remain elusive. We present here the crystal structures of a protease-stable fragment identified within the N-terminal regions of IpaB from S. flexneri and SipB from Salmonella enterica serovar Typhimurium determined at 2.1 Å and 2.8 Å limiting resolution, respectively. These newly identified domains are comprised of extended length (114 Å in IpaB and 71 Å in SipB) coiled-coil motifs that display a high degree of structural homology to one another despite the fact that they share only 21% sequence identity. Further structural comparisons also reveal substantial similarity to the coiled-coil regions of pore-forming proteins from other Gram-negative pathogens, notably colicin Ia. This suggests that these mechanistically-separate and functionally-distinct membrane-targeting proteins may have diverged from a common ancestor during the course of pathogen-specific evolutionary events. PMID:22321794
Espina, Marianela; Ausar, S. Fernando; Middaugh, C. Russell; Baxter, M. Aaron; Picking, William D.; Picking, Wendy L.
2007-01-01
Diverse Gram-negative bacteria use type III secretion systems (T3SS) to translocate effector proteins into the cytoplasm of eukaryotic cells. The type III secretion apparatus (T3SA) consists of a basal body spanning both bacterial membranes and an external needle. A sensor protein lies at the needle tip to detect environmental signals that trigger type III secretion. The Shigella flexneri T3SA needle tip protein, invasion plasmid antigen D (IpaD), possesses two independently folding domains in vitro. In this study, the solution behavior and thermal unfolding properties of IpaD's functional homologs SipD (Salmonella spp.), BipD (Burkholderia pseudomallei), LcrV (Yersinia spp.), and PcrV (Pseudomonas aeruginosa) were examined to identify common features within this protein family. CD and FTIR data indicate that all members within this group are α-helical with properties consistent with an intramolecular coiled-coil. SipD showed the most complex unfolding profile consisting of two thermal transitions, suggesting the presence of two independently folding domains. No evidence of multiple folding domains was seen, however, for BipD, LcrV, or PcrV. Thermal studies, including DSC, revealed significant destabilization of LcrV, PcrV, and BipD after N-terminal deletions. This contrasted with SipD and IpaD, which behaved like two-domain proteins. The results suggest that needle tip proteins share significant core structural similarity and thermal stability that may be the basis for their common function. Moreover, IpaD and SipD possess properties that distinguish them from the other tip proteins. PMID:17327391
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barta, Michael L.; Dickenson, Nicholas E.; Patil, Mrinalini
2012-03-26
Many pathogenic Gram-negative bacteria utilize type III secretion systems (T3SSs) to alter the normal functions of target cells. Shigella flexneri uses its T3SS to invade human intestinal cells to cause bacillary dysentery (shigellosis) that is responsible for over one million deaths per year. The Shigella type III secretion apparatus is composed of a basal body spanning both bacterial membranes and an exposed oligomeric needle. Host altering effectors are secreted through this energized unidirectional conduit to promote bacterial invasion. The active needle tip complex of S. flexneri is composed of a tip protein, IpaD, and two pore-forming translocators, IpaB and IpaC.more » While the atomic structure of IpaD has been elucidated and studied, structural data on the hydrophobic translocators from the T3SS family remain elusive. We present here the crystal structures of a protease-stable fragment identified within the N-terminal regions of IpaB from S. flexneri and SipB from Salmonella enterica serovar Typhimurium determined at 2.1 {angstrom} and 2.8 {angstrom} limiting resolution, respectively. These newly identified domains are composed of extended-length (114 {angstrom} in IpaB and 71 {angstrom} in SipB) coiled-coil motifs that display a high degree of structural homology to one another despite the fact that they share only 21% sequence identity. Further structural comparisons also reveal substantial similarity to the coiled-coil regions of pore-forming proteins from other Gram-negative pathogens, notably, colicin Ia. This suggests that these mechanistically separate and functionally distinct membrane-targeting proteins may have diverged from a common ancestor during the course of pathogen-specific evolutionary events.« less
Miller, L A; Cochrane, D E; Feldberg, R S; Carraway, R E
1998-06-01
Neurotensin (NT), a peptide found in brain and several peripheral tissues, is a potent stimulus for mast cell secretion and its actions are blocked by the specific NT receptor antagonist, SR 48692. Subsequent to stimulation, NT is rapidly degraded by mast cell carboxypeptidase A (CPA). In the experiments described here, we tested for the involvement of CPA activity in the activation of mast cell secretion by the peptide, NT. Mast cells were isolated from the peritoneal and pleural cavities of rats, purified over metrizamide gradients and incubated at 37 degrees C in Locke solution or Locke containing the appropriate inhibitors. For some experiments, media derived from mast cells stimulated by compound 48/80 were used as a source of mast cell CPA activity. Treatment of mast cells with the highly specific peptide inhibitor of CPA derived from potato (PCI) inhibited histamine release in response to NT and NT8-13 (the biologically active region of NT). This inhibition required some 20 min to develop and was only partially reversed by a 20-min wash period. PCI (10 microM) did not inhibit histamine release in response to NT1-12, bradykinin, compound 48/80, the calcium ionophore, A23187, or anti-IgE serum. PCI also inhibited mast cell CPA activity. SR 48692, a highly selective antagonist of the brain NT receptor and of NT-stimulated mast cell secretion, also inhibited mast cell CPA activity as well as bovine pancreatic CPA activity in a concentration-dependent manner. It is suggested that the mast cell binding site for NT and the active site for CPA may share similar characteristics. The results are discussed in terms of NT mechanism of action on the mast cell.
Poimenidi, Evangelia; Theodoropoulou, Christina; Koutsioumpa, Marina; Skondra, Lamprini; Droggiti, Eirini; van den Broek, Marloes; Koolwijk, Pieter; Papadimitriou, Evangelia
2016-05-01
Vascular endothelial growth factor A (VEGF-A) is a key molecule in angiogenesis acting through VEGF receptors (VEGFRs), ανβ3 integrin, receptor protein tyrosine phosphatase beta/zeta (RPTPβ/ζ) and cell surface nucleolin (NCL). Pleiotrophin (PTN) stimulates endothelial cell migration and limits the angiogenic effects of VEGF-A165 to the levels of its own effect, possibly acting as a VEGF-A165 modifier. Since PTN and VEGF-A165 share receptors and actions on endothelial cells, in the present work we studied whether and how VEGF-A165 affects PTN expression or secretion. VEGF-A165 decreased PTN mRNA and protein levels acting at the transcriptional level. Bevacizumab, a selective VEGFR2 tyrosine kinase inhibitor and down-regulation of VEGFR2 expression by siRNA did not affect this decrease, suggesting that it is VEGFR-independent. VEGF-A121 also decreased PTN mRNA and protein levels, suggesting that heparin binding of VEGF-A165 is not involved. Blockage of cell surface NCL, lack of expression or mutation of β3 integrin and down-regulation of RPTPβ/ζ abolished the inhibitory effect of VEGF-A165 on PTN expression and secretion. Down-regulation of endogenous PTN in endothelial cells enhanced VEGF-A165-induced increase in migration and tube formation on matrigel. Collectively, these data suggest that VEGF-A down-regulates PTN expression and secretion through the RPTPβ/ζ-ανβ3-NCL axis to enhance its own effect on cell migration and further highlight the role of RPTPβ/ζ in VEGF-A actions. Copyright © 2016 Elsevier Inc. All rights reserved.
Regulation of bone morphogenetic proteins in early embryonic development
NASA Astrophysics Data System (ADS)
Yamamoto, Yukiyo; Oelgeschläger, Michael
2004-11-01
Bone morphogenetic proteins (BMPs), a large subgroup of the TGF-β family of secreted growth factors, control fundamental events in early embryonic development, organogenesis and adult tissue homeostasis. The plethora of dose-dependent cellular processes regulated by BMP signalling demand a tight regulation of BMP activity. Over the last decade, a number of proteins have been identified that bind BMPs in the extracellular space and regulate the interaction of BMPs with their cognate receptors, including the secreted BMP antagonist Chordin. In the early vertebrate embryo, the localized secretion of BMP antagonists from the dorsal blastopore lip establishes a functional BMP signalling gradient that is required for the determination of the dorsoventral or back to belly body axis. In particular, inhibition of BMP activity is essential for the formation of neural tissue in the development of vertebrate and invertebrate embryos. Here we review recent studies that have provided new insight into the regulation of BMP signalling in the extracellular space. In particular, we discuss the recently identified Twisted gastrulation protein that modulates, in concert with metalloproteinases of the Tolloid family, the interaction of Chordin with BMP and a family of proteins that share structural similarities with Chordin in the respective BMP binding domains. In addition, genetic and functional studies in zebrafish and frog provide compelling evidence that the secreted protein Sizzled functionally interacts with the Chd BMP pathway, despite being expressed ventrally in the early gastrula-stage embryo. These intriguing discoveries may have important implications, not only for our current concept of early embryonic patterning, but also for the regulation of BMP activity at later developmental stages and tissue homeostasis in the adult.
Green, Janet; Darbyshire, Philip; Adams, Anne; Jackson, Debra
2015-12-01
Improved life-sustaining technology in the neonatal intensive care has resulted in an increased probability of survival for extremely premature babies. In the neonatal intensive care, the condition of a baby can deteriorate rapidly. Nurses and parents are together for long periods at the bedside and so form close and trusting relationships. Neonatal nurses as the constant caregivers may be presented with contradictory demands in attempting to meet the baby's needs and being a patient and family advocate. This article aims to explore the issues arising for neonatal nurses when holding information about changes to a condition of a baby that they are unable to share with parents. Data were collected via interviews with 24 neonatal nurses in New South Wales, Australia. A qualitative approach was used to analyse the data. The theme 'keeping secrets' was identified and comprised of three sub-themes 'coping with potentially catastrophic news', 'fear of inadvertent disclosure' and 'a burden that could damage trust'. Keeping secrets and withholding information creates internal conflict in the nurses as they balance the principle of confidentiality with the parent's right to know information. The neonatal nurses experienced guilt and shame when they were felt forced by circumstances to keep secrets or withhold information from the parents of extremely premature babies. © The Author(s) 2014.
Secret key distillation from shielded two-qubit states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bae, Joonwoo
The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key canmore » be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.« less
Enhanced secretion of natto phytase by Bacillus subtilis.
Tsuji, Shogo; Tanaka, Kosei; Takenaka, Shinji; Yoshida, Ken-ichi
2015-01-01
Phytases comprise a group of phosphatases that trim inorganic phosphates from phytic acid (IP6). In this study, we aimed to achieve the efficient secretion of phytase by Bacillus subtilis. B. subtilis laboratory standard strain 168 and its derivatives exhibit no phytase activity, whereas a natto starter secretes phytase actively. The natto phytase gene was cloned into strain RIK1285, a protease-defective derivative of 168, to construct a random library of its N-terminal fusions with 173 different signal peptides (SPs) identified in the 168 genome. The library was screened to assess the efficiency of phytase secretion based on clear zones around colonies on plates, which appeared when IP6 was hydrolyzed. The pbp SP enhanced the secretion of the natto phytase most efficiently, i.e. twice that of the original SP. Thus, the secreted natto phytase was purified and found to remove up to 3 phosphates from IP6.
According to the CPLL proteome sheriffs, not all aperitifs are created equal!
Lerma-García, María Jesús; D'Amato, Alfonsina; Fasoli, Elisa; Simó-Alfonso, Ernesto Francisco; Righetti, Pier Giorgio
2014-09-01
Combinatorial peptide ligand libraries (CPLLs) have been adopted for investigating the proteome of a popular aperitif in Northern Italy, called "Amaro Branzi", stated to be an infusion of a secret herbal mixture, of which some ingredients are declared on the label, namely Angelica officinalis, Gentiana lutea and orange peel, sweetened by a final addition of honey. In order to assess the genuineness of this commercial liqueur, we have prepared extracts of the three vegetable ingredients, assessed their proteomes, and compared them to the one found in the aperitif. The amaro's proteome was identified via prior capture with CPLLs at two different pH values (2.2 and 4.8). Via mass spectrometry analysis of the recovered fractions, after elution of the captured populations in 4% boiling SDS, we could confirm the presence of the following: six proteins originating from honey, 11 from orange peels, 29 from G. lutea and 46 from A. officinalis (including shared species), plus 33 species which could not be attributed to the other secret ingredients, due to paucity of genomic data on plant proteins, for a total of 93 unique gene products (merging shared proteins). This fully confirmed the genuineness of the product. Considering that most of these species could be present in trace amounts, undetectable by conventional techniques, the CPLL methodology, due to its ability to enhance the signal of trace components up to 3 to 4 orders of magnitude, could represent a powerful tool for investigating the genuineness and natural origin of commercial beverages in order to protect consumers from adulterated products. Copyright © 2014 Elsevier B.V. All rights reserved.
Xu, Jun; Saunders, Charles W; Hu, Ping; Grant, Raymond A; Boekhout, Teun; Kuramae, Eiko E; Kronstad, James W; Deangelis, Yvonne M; Reeder, Nancy L; Johnstone, Kevin R; Leland, Meredith; Fieno, Angela M; Begley, William M; Sun, Yiping; Lacey, Martin P; Chaudhary, Tanuja; Keough, Thomas; Chu, Lien; Sears, Russell; Yuan, Bo; Dawson, Thomas L
2007-11-20
Fungi in the genus Malassezia are ubiquitous skin residents of humans and other warm-blooded animals. Malassezia are involved in disorders including dandruff and seborrheic dermatitis, which together affect >50% of humans. Despite the importance of Malassezia in common skin diseases, remarkably little is known at the molecular level. We describe the genome, secretory proteome, and expression of selected genes of Malassezia globosa. Further, we report a comparative survey of the genome and secretory proteome of Malassezia restricta, a close relative implicated in similar skin disorders. Adaptation to the skin environment and associated pathogenicity may be due to unique metabolic limitations and capabilities. For example, the lipid dependence of M. globosa can be explained by the apparent absence of a fatty acid synthase gene. The inability to synthesize fatty acids may be complemented by the presence of multiple secreted lipases to aid in harvesting host lipids. In addition, an abundance of genes encoding secreted hydrolases (e.g., lipases, phospholipases, aspartyl proteases, and acid sphingomyelinases) was found in the M. globosa genome. In contrast, the phylogenetically closely related plant pathogen Ustilago maydis encodes a different arsenal of extracellular hydrolases with more copies of glycosyl hydrolase genes. M. globosa shares a similar arsenal of extracellular hydrolases with the phylogenetically distant human pathogen, Candida albicans, which occupies a similar niche, indicating the importance of host-specific adaptation. The M. globosa genome sequence also revealed the presence of mating-type genes, providing an indication that Malassezia may be capable of sex.
Xu, Jun; Saunders, Charles W.; Hu, Ping; Grant, Raymond A.; Boekhout, Teun; Kuramae, Eiko E.; Kronstad, James W.; DeAngelis, Yvonne M.; Reeder, Nancy L.; Johnstone, Kevin R.; Leland, Meredith; Fieno, Angela M.; Begley, William M.; Sun, Yiping; Lacey, Martin P.; Chaudhary, Tanuja; Keough, Thomas; Chu, Lien; Sears, Russell; Yuan, Bo; Dawson, Thomas L.
2007-01-01
Fungi in the genus Malassezia are ubiquitous skin residents of humans and other warm-blooded animals. Malassezia are involved in disorders including dandruff and seborrheic dermatitis, which together affect >50% of humans. Despite the importance of Malassezia in common skin diseases, remarkably little is known at the molecular level. We describe the genome, secretory proteome, and expression of selected genes of Malassezia globosa. Further, we report a comparative survey of the genome and secretory proteome of Malassezia restricta, a close relative implicated in similar skin disorders. Adaptation to the skin environment and associated pathogenicity may be due to unique metabolic limitations and capabilities. For example, the lipid dependence of M. globosa can be explained by the apparent absence of a fatty acid synthase gene. The inability to synthesize fatty acids may be complemented by the presence of multiple secreted lipases to aid in harvesting host lipids. In addition, an abundance of genes encoding secreted hydrolases (e.g., lipases, phospholipases, aspartyl proteases, and acid sphingomyelinases) was found in the M. globosa genome. In contrast, the phylogenetically closely related plant pathogen Ustilago maydis encodes a different arsenal of extracellular hydrolases with more copies of glycosyl hydrolase genes. M. globosa shares a similar arsenal of extracellular hydrolases with the phylogenetically distant human pathogen, Candida albicans, which occupies a similar niche, indicating the importance of host-specific adaptation. The M. globosa genome sequence also revealed the presence of mating-type genes, providing an indication that Malassezia may be capable of sex. PMID:18000048
A gatekeeper chaperone complex directs translocator secretion during Type Three Secretion
Archuleta, Tara L.; Spiller, Benjamin W.; Kubori, Tomoko
2014-11-06
Many Gram-negative bacteria use Type Three Secretion Systems (T3SS) to deliver effector proteins into host cells. These protein delivery machines are composed of cytosolic components that recognize substrates and generate the force needed for translocation, the secretion conduit, formed by a needle complex and associated membrane spanning basal body, and translocators that form the pore in the target cell. A defined order of secretion in which needle component proteins are secreted first, followed by translocators, and finally effectors, is necessary for this system to be effective. While the secreted effectors vary significantly between organisms, the ~20 individual protein components thatmore » form the T3SS are conserved in many pathogenic bacteria. One such conserved protein, referred to as either a plug or gatekeeper, is necessary to prevent unregulated effector release and to allow efficient translocator secretion. The mechanism by which translocator secretion is promoted while effector release is inhibited by gatekeepers is unknown. We present the structure of the Chlamydial gatekeeper, CopN, bound to a translocator-specific chaperone. The structure identifies a previously unknown interface between gatekeepers and translocator chaperones and reveals that in the gatekeeper-chaperone complex the canonical translocator-binding groove is free to bind translocators. Thus, structure-based mutagenesis of the homologous complex in Shigella reveals that the gatekeeper-chaperone-translocator complex is essential for translocator secretion and for the ordered secretion of translocators prior to effectors.« less
Engineering Signal Peptides for Enhanced Protein Secretion from Lactococcus lactis
Ng, Daphne T. W.
2013-01-01
Lactococcus lactis is an attractive vehicle for biotechnological production of proteins and clinical delivery of therapeutics. In many such applications using this host, it is desirable to maximize secretion of recombinant proteins into the extracellular space, which is typically achieved by using the native signal peptide from a major secreted lactococcal protein, Usp45. In order to further increase protein secretion from L. lactis, inherent limitations of the Usp45 signal peptide (Usp45sp) must be elucidated. Here, we performed extensive mutagenesis on Usp45sp to probe the effects of both the mRNA sequence (silent mutations) and the peptide sequence (amino acid substitutions) on secretion. We screened signal peptides based on their resulting secretion levels of Staphylococcus aureus nuclease and further evaluated them for secretion of Bacillus subtilis α-amylase. Silent mutations alone gave an increase of up to 16% in the secretion of α-amylase through a mechanism consistent with relaxed mRNA folding around the ribosome binding site and enhanced translation. Targeted amino acid mutagenesis in Usp45sp, combined with additional silent mutations from the best clone in the initial screen, yielded an increase of up to 51% in maximum secretion of α-amylase while maintaining secretion at lower induction levels. The best sequence from our screen preserves the tripartite structure of the native signal peptide but increases the positive charge of the n-region. Our study presents the first example of an engineered L. lactis signal peptide with a higher secretion yield than Usp45sp and, more generally, provides strategies for further enhancing protein secretion in bacterial hosts. PMID:23124224
Engineering signal peptides for enhanced protein secretion from Lactococcus lactis.
Ng, Daphne T W; Sarkar, Casim A
2013-01-01
Lactococcus lactis is an attractive vehicle for biotechnological production of proteins and clinical delivery of therapeutics. In many such applications using this host, it is desirable to maximize secretion of recombinant proteins into the extracellular space, which is typically achieved by using the native signal peptide from a major secreted lactococcal protein, Usp45. In order to further increase protein secretion from L. lactis, inherent limitations of the Usp45 signal peptide (Usp45sp) must be elucidated. Here, we performed extensive mutagenesis on Usp45sp to probe the effects of both the mRNA sequence (silent mutations) and the peptide sequence (amino acid substitutions) on secretion. We screened signal peptides based on their resulting secretion levels of Staphylococcus aureus nuclease and further evaluated them for secretion of Bacillus subtilis α-amylase. Silent mutations alone gave an increase of up to 16% in the secretion of α-amylase through a mechanism consistent with relaxed mRNA folding around the ribosome binding site and enhanced translation. Targeted amino acid mutagenesis in Usp45sp, combined with additional silent mutations from the best clone in the initial screen, yielded an increase of up to 51% in maximum secretion of α-amylase while maintaining secretion at lower induction levels. The best sequence from our screen preserves the tripartite structure of the native signal peptide but increases the positive charge of the n-region. Our study presents the first example of an engineered L. lactis signal peptide with a higher secretion yield than Usp45sp and, more generally, provides strategies for further enhancing protein secretion in bacterial hosts.
Topics in quantum cryptography, quantum error correction, and channel simulation
NASA Astrophysics Data System (ADS)
Luo, Zhicheng
In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.
Actions of cholera toxin and the prevention and treatment of cholera
NASA Astrophysics Data System (ADS)
Holmgren, Jan
1981-07-01
The drastic intestinal secretion of fluid and electrolytes that is characteristic of cholera is the result of reasonably well understood cellular and biochemical actions of the toxin secreted by Vibrio cholerae. Based on this understanding it is possible to devise new techniques for the treatment and prophylaxis of cholera to complement those based on fluid replacement therapy and sanitation.
Gregori, Josep; Méndez, Olga; Katsila, Theodora; Pujals, Mireia; Salvans, Cándida; Villarreal, Laura; Arribas, Joaquin; Tabernero, Josep; Sánchez, Alex; Villanueva, Josep
2014-07-15
Secretome profiling has become a methodology of choice for the identification of tumor biomarkers. We hypothesized that due to the dynamic nature of secretomes cellular perturbations could affect their composition but also change the global amount of protein secreted per cell. We confirmed our hypothesis by measuring the levels of secreted proteins taking into account the amount of proteome produced per cell. Then, we established a correlation between cell proliferation and protein secretion that explained the observed changes in global protein secretion. Next, we implemented a normalization correcting the statistical results of secretome studies by the global protein secretion of cells into a generalized linear model (GLM). The application of the normalization to two biological perturbations on tumor cells resulted in drastic changes in the list of statistically significant proteins. Furthermore, we found that known epithelial-to-mesenchymal transition (EMT) effectors were only statistically significant when the normalization was applied. Therefore, the normalization proposed here increases the sensitivity of statistical tests by increasing the number of true-positives. From an oncology perspective, the correlation between protein secretion and cellular proliferation suggests that slow-growing tumors could have high-protein secretion rates and consequently contribute strongly to tumor paracrine signaling.
Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
Savijoki, K; Kahala, M; Palva, A
1997-02-28
A secretion cassette, based on the expression and secretion signals of a S-layer protein (SlpA) from Lactobacillus brevis, was constructed. E. coli beta-lactamase (Bla) was used as the reporter protein to determine the functionality of the S-layer signals for heterologous expression and secretion in Lactococcus lactis, Lactobacillus brevis, Lactobacillus plantarum, Lactobacillus gasseri and Lactobacillus casei using a low-copy-number plasmid derived from pGK12. In all hosts tested, the bla gene was expressed under the slpA signals and all Bla activity was secreted to the culture medium. The Lb. brevis S-layer promoters were very efficiently recognized in L. lactis, Lb. brevis and Lb. plantarum, whereas in Lb. gasseri the slpA promoter region appeared to be recognized at a lower level and in Lb. casei the level of transcripts was below the detection limit. The production of Bla was mainly restricted to the exponential phase of growth. The highest yield of Bla was obtained with L. lactis and Lb. brevis. Without pH control, substantial degradation of Bla occurred during prolonged cultivations with all lactic acid bacteria (LAB) tested. When growing L. lactis and Lb. brevis under pH control, the Bla activity could be stabilized also at the stationary phase. L. lactis produced up to 80 mg/l of Bla which to our knowledge represents the highest amount of a heterologous protein secreted by LAB so far. The short production phase implied a very high rate of secretion with a calculated value of 5 x 10(5) Bla molecules/cell per h. Such a high rate was also observed with Lb. plantarum, whereas in Lb. brevis the competition between the wild type slpA gene and the secretion construct probably lowered the rate of Bla production. The results obtained indicate wide applicability of the Lb. brevis slpA signals for efficient protein production and secretion in LAB.
Predicting the impact of diet and enzymopathies on human small intestinal epithelial cells
Sahoo, Swagatika; Thiele, Ines
2013-01-01
Small intestinal epithelial cells (sIECs) have a significant share in whole body metabolism as they perform enzymatic digestion and absorption of nutrients. Furthermore, the diet plays a key role in a number of complex diseases including obesity and diabetes. The impact of diet and altered genetic backgrounds on human metabolism may be studied by using computational modeling. A metabolic reconstruction of human sIECs was manually assembled using the literature. The resulting sIEC model was subjected to two different diets to obtain condition-specific metabolic models. Fifty defined metabolic tasks evaluated the functionalities of these models, along with the respective secretion profiles, which distinguished between impacts of different dietary regimes. Under the average American diet, the sIEC model resulted in higher secretion flux for metabolites implicated in metabolic syndrome. In addition, enzymopathies were analyzed in the context of the sIEC metabolism. Computed results were compared with reported gastrointestinal (GI) pathologies and biochemical defects as well as with biomarker patterns used in their diagnosis. Based on our simulations, we propose that (i) sIEC metabolism is perturbed by numerous enzymopathies, which can be used to study cellular adaptive mechanisms specific for such disorders, and in the identification of novel co-morbidities, (ii) porphyrias are associated with both heme synthesis and degradation and (iii) disturbed intestinal gamma-aminobutyric acid synthesis may be linked to neurological manifestations of various enzymopathies. Taken together, the sIEC model represents a comprehensive, biochemically accurate platform for studying the function of sIEC and their role in whole body metabolism. PMID:23492669
Secreted production of Renilla luciferase in Bacillus subtilis.
Chiang, Chung-Jen; Chen, Po Ting; Chao, Yun-Peng
2010-01-01
Luciferase (Rluc) from the soft coral Renilla reniformis has been widely used as a bioluminescent reporter, and its secreted production has been solely performed in mammalian cells thus far. To make the production more efficient, a series of approaches was attempted to overproduce Rluc extracellularly in Bacillus subtilis. First, Cys124 in the Rluc gene was substituted with Ala. The mutant gene was subsequently incorporated into a pUB110/R6K-based plasmid, consequently, fusing with the P43 promoter and the sacB signal peptide. With the nitrogen-rich medium, B. subtilis strain bearing the plasmid became able to secret a detectable amount of Rluc. Moreover, the secretion signal for the Rluc gene was replaced by the aprN leader peptide with or without the propeptide. The result led to a more than twofold increase in the secreted Rluc. Finally, by enhancing the transcription of the Rluc gene implementing the P43 and spac tandem promoter, it resulted in the secreted Rluc with a yield of 100 mg/L. Overall, this study illustrates a potential strategy for improving the secretion efficiency of heterologous proteins in B. subtilis.
Cross-talk between adipose and gastric leptins for the control of food intake and energy metabolism.
Cammisotto, Philippe G; Levy, Emile; Bukowiecki, Ludwik J; Bendayan, Moise
2010-09-01
The understanding of the regulation of food intake has become increasingly complex. More than 20 hormones, both orexigenic and anorexigenic, have been identified. After crossing the blood-brain barrier, they reach their main site of action located in several hypothalamic areas and interact to balance satiety and hunger. One of the most significant advances in this matter has been the discovery of leptin. This hormone plays fundamental roles in the control of appetite and in regulating energy expenditure. In accordance with the lipostatic theory stated by Kennedy in 1953, leptin was originally discovered in white adipose tissue. Its expression by other tissues was later established. Among them, the gastric mucosa has been shown to secrete large amounts of leptin. Both the adipose and the gastric tissues share similar characteristics in the synthesis and storage of leptin in granules, in the formation of a complex with the soluble receptor and a secretion modulated by hormones and energy substrates. However while adipose tissue secretes leptin in a slow constitutive endocrine way, the gastric mucosa releases leptin in a rapid regulated exocrine fashion into the gastric juice. Exocrine-secreted leptin survives the extreme hydrolytic conditions of the gastric juice and reach the duodenal lumen in an intact active form. Scrutiny into transport mechanisms revealed that a significant amount of the exocrine leptin crosses the intestinal wall by active transcytosis. Leptin receptors, expressed on the luminal and basal membrane of intestinal epithelial cells, are involved in the control of nutrient absorption by enterocytes, mucus secretion by goblet cells and motility, among other processes, and this control is indeed different depending upon luminal or basal stimulus. Gastric leptin after transcytosis reaches the central nervous system, to control food intake. Studies using the Caco-2, the human intestinal cell line, in vitro allowed analysis of the mechanisms of leptin actions on the intestinal mucosa, identification of the mechanisms of leptin transcytosis and understanding the modulation of leptin receptors by nutrients and hormones. Exocrine-secreted gastric leptin thus participates in a physiological axis independent in terms of time and regulation from that of adipose tissue to rapidly control food intake and nutrient absorption. Adipocytes and gastric epithelial cells are two cell types the metabolism of which is closely linked to food intake and energy storage. The coordinated secretion of adipose and gastric leptins ensures proper management of food processing and energy storage. Copyright (c) 2010 Elsevier GmbH. All rights reserved.
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
Goryczka, Slawomir; Xiong, Li
2016-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir’s secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy. PMID:28919841
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy.
Goryczka, Slawomir; Xiong, Li
2017-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir's secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2015-08-01
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
Di Giuseppe, Graziano; Erra, Fabrizio; Dini, Fernando; Alimenti, Claudio; Vallesi, Adriana; Pedrini, Bill; Wüthrich, Kurt; Luporini, Pierangelo
2011-01-01
Wild-type strains of the protozoan ciliate Euplotes collected from different locations on the coasts of Antarctica, Tierra del Fuego and the Arctic were taxonomically identified as the morpho-species Euplotes nobilii, based on morphometric and phylogenetic analyses. Subsequent studies of their sexual interactions revealed that mating combinations of Antarctic and Arctic strains form stable pairs of conjugant cells. These conjugant pairs were isolated and shown to complete mutual gene exchange and cross-fertilization. The biological significance of this finding was further substantiated by demonstrating that close homology exists among the three-dimensional structures determined by NMR of the water-borne signaling pheromones that are constitutively secreted into the extracellular space by these interbreeding strains, in which these molecules trigger the switch between the growth stage and the sexual stage of the life cycle. The fact that Antarctic and Arctic E. nobilii populations share the same gene pool and belong to the same biological species provides new support to the biogeographic model of global distribution of eukaryotic microorganisms, which had so far been based exclusively on studies of morphological and phylogenetic taxonomy. PMID:21300903
R2NA: Received Signal Strength (RSS) Ratio-Based Node Authentication for Body Area Network
Wu, Yang; Wang, Kai; Sun, Yongmei; Ji, Yuefeng
2013-01-01
The body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB) channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU) in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS) measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.
Cryptanalysis of Controlled Mutual Quantum Entity Authentication Using Entanglement Swapping
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue
2017-01-01
By using GHZ-like states and entanglement swapping, Kang et al. [Chin. Phys. B 24 (2015) 090306] proposed a controlled mutual quantum entity authentication protocol. We find that the proposed protocol is not secure, that is, the center, Charlie can eavesdrop the secret keys shared between Alice and Bob without being detected. Supported by the 2014-year Program for Excellent Youth Talents in University of Anhui Province and the Talent Scientific Research Fundation of Tongling University under Grant No. 2015tlxyrc01 and the Program for Academic Leader Reserve Candidates in Tongling University under Grant No. 2014tlxyxs30
High-chroma visual cryptography using interference color of high-order retarder films
NASA Astrophysics Data System (ADS)
Sugawara, Shiori; Harada, Kenji; Sakai, Daisuke
2015-08-01
Visual cryptography can be used as a method of sharing a secret image through several encrypted images. Conventional visual cryptography can display only monochrome images. We have developed a high-chroma color visual encryption technique using the interference color of high-order retarder films. The encrypted films are composed of a polarizing film and retarder films. The retarder films exhibit interference color when they are sandwiched between two polarizing films. We propose a stacking technique for displaying high-chroma interference color images. A prototype visual cryptography device using high-chroma interference color is developed.
Improving security of the ping-pong protocol
NASA Astrophysics Data System (ADS)
Zawadzki, Piotr
2013-01-01
A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper. The operation of the improvement exploits inevitable errors introduced by the eavesdropping in the control and message modes. Its role is similar to the privacy amplification algorithms known from the quantum key distribution schemes. Messages are processed in blocks which guarantees that an eavesdropper is faced with a computationally infeasible problem as long as the system parameters are within reasonable limits. The introduced additional information preprocessing does not require quantum memory registers and confidential communication is possible without prior key agreement or some shared secret.
A Phytase-Based Reporter System for Identification of Functional Secretion Signals in Bifidobacteria
Osswald, Annika; Westermann, Christina; Sun, Zhongke; Riedel, Christian U.
2015-01-01
Health-promoting effects have been attributed to a number of Bifidobacterium sp. strains. These effects as well as the ability to colonise the host depend on secreted proteins. Moreover, rational design of protein secretion systems bears the potential for the generation of novel probiotic bifidobacteria with improved health-promoting or therapeutic properties. To date, there is only very limited data on secretion signals of bifidobacteria available. Using in silico analysis, we demonstrate that all bifidobacteria encode the major components of Sec-dependent secretion machineries but only B. longum strains harbour Tat protein translocation systems. A reporter plasmid for secretion signals in bifidobacteria was established by fusing the coding sequence of the signal peptide of a sialidase of Bifidobacterium bifidum S17 to the phytase gene appA of E. coli. The recombinant strain showed increased phytase activity in spent culture supernatants and reduced phytase levels in crude extracts compared to the control indicating efficient phytase secretion. The reporter plasmid was used to screen seven predicted signal peptides in B. bifidum S17 and B. longum E18. The tested signal peptides differed substantially in their efficacy to mediate protein secretion in different host strains. An efficient signal peptide was used for expression and secretion of a therapeutically relevant protein in B. bifidum S17. Expression of a secreted cytosine deaminase led to a 100-fold reduced sensitivity of B. bifidum S17 to 5-fluorocytosine compared to the non-secreted cytosine deaminase suggesting efficient conversion of 5-fluorocytosine to the cytotoxic cancer drug 5-fluorouracil by cytosine deaminase occurred outside the bacterial cell. Selection of appropriate signal peptides for defined protein secretion might improve therapeutic efficacy as well as probiotic properties of bifidobacteria. PMID:26086721
Regulation of intracellular trafficking and secretion of adiponectin by myosin II.
Bedi, Deepa; Dennis, John C; Morrison, Edward E; Braden, Tim D; Judd, Robert L
2017-08-19
Adiponectin is a protein secreted by white adipocytes that plays an important role in insulin action, energy homeostasis and the development of atherosclerosis. The intracellular localization and trafficking of GLUT4 and leptin in adipocytes has been well studied, but little is known regarding the intracellular trafficking of adiponectin. Recent studies have demonstrated that constitutive adiponectin secretion is dependent on PIP2 levels and the integrity of cortical F-actin. Non-muscle myosin II is an actin-based motor that is associated with membrane vesicles and participates in vesicular trafficking in mammalian cells. Therefore, we investigated the role of myosin II in the trafficking and secretion of adiponectin in 3T3-L1 adipocytes. Confocal microscopy revealed that myosin IIA and IIB were dispersed throughout the cytoplasm of the adipocyte. Both myosin isoforms were localized in the Golgi/TGN region as evidenced by colocalization with the cis-Golgi marker, p115 and the trans-Golgi marker, γ-adaptin. Inhibition of myosin II activity by blebbistatin or actin depolymerization by latrunculin B dispersed myosin IIA and IIB towards the periphery while significantly inhibiting adiponectin secretion. Therefore, the constitutive trafficking and secretion of adiponectin in 3T3-L1 adipocytes occurs by an actin-dependent mechanism that involves the actin-based motors, myosin IIA and IIB. Copyright © 2017 Elsevier Inc. All rights reserved.
Han, Qing; Bradshaw, Elizabeth M; Nilsson, Björn; Hafler, David A; Love, J Christopher
2010-06-07
The large diversity of cells that comprise the human immune system requires methods that can resolve the individual contributions of specific subsets to an immunological response. Microengraving is process that uses a dense, elastomeric array of microwells to generate microarrays of proteins secreted from large numbers of individual live cells (approximately 10(4)-10(5) cells/assay). In this paper, we describe an approach based on this technology to quantify the rates of secretion from single immune cells. Numerical simulations of the microengraving process indicated an operating regime between 30 min-4 h that permits quantitative analysis of the rates of secretion. Through experimental validation, we demonstrate that microengraving can provide quantitative measurements of both the frequencies and the distribution in rates of secretion for up to four cytokines simultaneously released from individual viable primary immune cells. The experimental limits of detection ranged from 0.5 to 4 molecules/s for IL-6, IL-17, IFNgamma, IL-2, and TNFalpha. These multidimensional measures resolve the number and intensities of responses by cells exposed to stimuli with greater sensitivity than single-parameter assays for cytokine release. We show that cells from different donors exhibit distinct responses based on both the frequency and magnitude of cytokine secretion when stimulated under different activating conditions. Primary T cells with specific profiles of secretion can also be recovered after microengraving for subsequent expansion in vitro. These examples demonstrate the utility of quantitative, multidimensional profiles of single cells for analyzing the diversity and dynamics of immune responses in vitro and for identifying rare cells from clinical samples.
Single-cell analysis and sorting using droplet-based microfluidics.
Mazutis, Linas; Gilbert, John; Ung, W Lloyd; Weitz, David A; Griffiths, Andrew D; Heyman, John A
2013-05-01
We present a droplet-based microfluidics protocol for high-throughput analysis and sorting of single cells. Compartmentalization of single cells in droplets enables the analysis of proteins released from or secreted by cells, thereby overcoming one of the major limitations of traditional flow cytometry and fluorescence-activated cell sorting. As an example of this approach, we detail a binding assay for detecting antibodies secreted from single mouse hybridoma cells. Secreted antibodies are detected after only 15 min by co-compartmentalizing single mouse hybridoma cells, a fluorescent probe and single beads coated with anti-mouse IgG antibodies in 50-pl droplets. The beads capture the secreted antibodies and, when the captured antibodies bind to the probe, the fluorescence becomes localized on the beads, generating a clearly distinguishable fluorescence signal that enables droplet sorting at ∼200 Hz as well as cell enrichment. The microfluidic system described is easily adapted for screening other intracellular, cell-surface or secreted proteins and for quantifying catalytic or regulatory activities. In order to screen ∼1 million cells, the microfluidic operations require 2-6 h; the entire process, including preparation of microfluidic devices and mammalian cells, requires 5-7 d.
Single-cell analysis and sorting using droplet-based microfluidics
Mazutis, Linas; Gilbert, John; Ung, W Lloyd; Weitz, David A; Griffiths, Andrew D; Heyman, John A
2014-01-01
We present a droplet-based microfluidics protocol for high-throughput analysis and sorting of single cells. compartmentalization of single cells in droplets enables the analysis of proteins released from or secreted by cells, thereby overcoming one of the major limitations of traditional flow cytometry and fluorescence-activated cell sorting. as an example of this approach, we detail a binding assay for detecting antibodies secreted from single mouse hybridoma cells. secreted antibodies are detected after only 15 min by co-compartmentalizing single mouse hybridoma cells, a fluorescent probe and single beads coated with anti-mouse IgG antibodies in 50-pl droplets. the beads capture the secreted antibodies and, when the captured antibodies bind to the probe, the fluorescence becomes localized on the beads, generating a clearly distinguishable fluorescence signal that enables droplet sorting at ~200 Hz as well as cell enrichment. the microfluidic system described is easily adapted for screening other intracellular, cell-surface or secreted proteins and for quantifying catalytic or regulatory activities. In order to screen ~1 million cells, the microfluidic operations require 2–6 h; the entire process, including preparation of microfluidic devices and mammalian cells, requires 5–7 d. PMID:23558786
Computational prediction of type III and IV secreted effectors in Gram-negative bacteria
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDermott, Jason E.; Corrigan, Abigail L.; Peterson, Elena S.
2011-01-01
In this review, we provide an overview of the methods employed by four recent papers that described novel methods for computational prediction of secreted effectors from type III and IV secretion systems in Gram-negative bacteria. The results of the studies in terms of performance at accurately predicting secreted effectors and similarities found between secretion signals that may reflect biologically relevant features for recognition. We discuss the web-based tools for secreted effector prediction described in these studies and announce the availability of our tool, the SIEVEserver (http://www.biopilot.org). Finally, we assess the accuracy of the three type III effector prediction methods onmore » a small set of proteins not known prior to the development of these tools that we have recently discovered and validated using both experimental and computational approaches. Our comparison shows that all methods use similar approaches and, in general arrive at similar conclusions. We discuss the possibility of an order-dependent motif in the secretion signal, which was a point of disagreement in the studies. Our results show that there may be classes of effectors in which the signal has a loosely defined motif, and others in which secretion is dependent only on compositional biases. Computational prediction of secreted effectors from protein sequences represents an important step toward better understanding the interaction between pathogens and hosts.« less
Nicholls, James A; Melika, George; Stone, Graham N
2017-01-01
Many herbivores employ reward-based mutualisms with ants to gain protection from natural enemies. We examine the evolutionary dynamics of a tetra-trophic interaction in which gall wasp herbivores induce their host oaks to produce nectar-secreting galls, which attract ants that provide protection from parasitoids. We show that, consistent with other gall defensive traits, nectar secretion has evolved repeatedly across the oak gall wasp tribe and also within a single genus (Disholcaspis) that includes many nectar-inducing species. Once evolved, nectar secretion is never lost in Disholcaspis, consistent with high defensive value of this trait. We also show that evolution of nectar secretion is correlated with a transition from solitary to aggregated oviposition, resulting in clustered nectar-secreting galls, which produce a resource that ants can more easily monopolize. Such clustering is commonly seen in ant guard mutualisms. We suggest that correlated evolution between maternal oviposition and larval nectar induction traits has enhanced the effectiveness of this gall defense strategy.
The New Kid on the Block: A Specialized Secretion System during Bacterial Sporulation.
Morlot, Cécile; Rodrigues, Christopher D A
2018-02-02
The transport of proteins across the bacterial cell envelope is mediated by protein complexes called specialized secretion systems. These nanomachines exist in both Gram-positive and Gram-negative bacteria and have been categorized into different types based on their structural components and function. Interestingly, multiple studies suggest the existence of a protein complex in endospore-forming bacteria that appears to be a new type of specialized secretion system. This protein complex is called the SpoIIIA-SpoIIQ complex and is an exception to the categorical norm since it appears to be a hybrid composed of different parts from well-defined specialized secretion systems. Here we summarize and discuss the current understanding of this complex and its potential role as a specialized secretion system. Copyright © 2018 Elsevier Ltd. All rights reserved.
Zhou, Ming; Chang, Shoude; Grover, Chander
2004-06-28
Further to the optical coding based on fluorescent semiconductor quantum dots (QDs), a concept of using mixtures of multiple single-color QDs for creating highly secret cryptograms based on their absorption/emission properties was demonstrated. The key to readout of the optical codes is a group of excitation lights with the predetermined wavelengths programmed in a secret manner. The cryptograms can be printed on the surfaces of different objects such as valuable documents for security purposes.
Panus, Joanne Fanelli; Smith, Craig A.; Ray, Caroline A.; Smith, Terri Davis; Patel, Dhavalkumar D.; Pickup, David J.
2002-01-01
Cowpox virus (Brighton Red strain) possesses one of the largest genomes in the Orthopoxvirus genus. Sequence analysis of a region of the genome that is type-specific for cowpox virus identified a gene, vCD30, encoding a soluble, secreted protein that is the fifth member of the tumor necrosis factor receptor family known to be encoded by cowpox virus. The vCD30 protein contains 110 aa, including a 21-residue signal peptide, a potential O-linked glycosylation site, and a 58-aa sequence sharing 51–59% identity with highly conserved extracellular segments of both mouse and human CD30. A vCD30Fc fusion protein binds CD153 (CD30 ligand) specifically, and it completely inhibits CD153/CD30 interactions. Although the functions of CD30 are not well understood, the existence of vCD30 suggests that the cellular receptor plays a significant role in normal immune responses. Viral inhibition of CD30 also lends support to the potential therapeutic value of targeting CD30 in human inflammatory and autoimmune diseases. PMID:12034885
Fighting malaria with engineered symbiotic bacteria from vector mosquitoes.
Wang, Sibao; Ghosh, Anil K; Bongio, Nicholas; Stebbings, Kevin A; Lampe, David J; Jacobs-Lorena, Marcelo
2012-07-31
The most vulnerable stages of Plasmodium development occur in the lumen of the mosquito midgut, a compartment shared with symbiotic bacteria. Here, we describe a strategy that uses symbiotic bacteria to deliver antimalaria effector molecules to the midgut lumen, thus rendering host mosquitoes refractory to malaria infection. The Escherichia coli hemolysin A secretion system was used to promote the secretion of a variety of anti-Plasmodium effector proteins by Pantoea agglomerans, a common mosquito symbiotic bacterium. These engineered P. agglomerans strains inhibited development of the human malaria parasite Plasmodium falciparum and rodent malaria parasite Plasmodium berghei by up to 98%. Significantly, the proportion of mosquitoes carrying parasites (prevalence) decreased by up to 84% for two of the effector molecules, scorpine, a potent antiplasmodial peptide and (EPIP)(4), four copies of Plasmodium enolase-plasminogen interaction peptide that prevents plasminogen binding to the ookinete surface. We demonstrate the use of an engineered symbiotic bacterium to interfere with the development of P. falciparum in the mosquito. These findings provide the foundation for the use of genetically modified symbiotic bacteria as a powerful tool to combat malaria.
Yan, Wei; Wu, Xiwei; Zhou, Weiying; Fong, Miranda Y; Cao, Minghui; Liu, Juan; Liu, Xiaojing; Chen, Chih-Hong; Fadare, Oluwole; Pizzo, Donald P; Wu, Jiawen; Liu, Liang; Liu, Xuxiang; Chin, Andrew R; Ren, Xiubao; Chen, Yuan; Locasale, Jason W; Wang, Shizhen Emily
2018-05-01
Cancer and other cells residing in the same niche engage various modes of interactions to synchronize and buffer the negative effects of environmental changes. Extracellular microRNAs (miRNAs) have recently been implicated in the intercellular crosstalk. Here we show a mechanistic model involving breast-cancer-secreted, extracellular-vesicle-encapsulated miR-105, which is induced by the oncoprotein MYC in cancer cells and, in turn, activates MYC signalling in cancer-associated fibroblasts (CAFs) to induce a metabolic program. This results in the capacity of CAFs to display different metabolic features in response to changes in the metabolic environment. When nutrients are sufficient, miR-105-reprogrammed CAFs enhance glucose and glutamine metabolism to fuel adjacent cancer cells. When nutrient levels are low and metabolic by-products accumulate, these CAFs detoxify metabolic wastes, including lactic acid and ammonium, by converting them into energy-rich metabolites. Thus, the miR-105-mediated metabolic reprogramming of stromal cells contributes to sustained tumour growth by conditioning the shared metabolic environment.
Shared elements of host-targeting pathways among apicomplexan parasites of differing lifestyles.
Pellé, Karell G; Jiang, Rays H Y; Mantel, Pierre-Yves; Xiao, Yu-Ping; Hjelmqvist, Daisy; Gallego-Lopez, Gina M; O T Lau, Audrey; Kang, Byung-Ho; Allred, David R; Marti, Matthias
2015-11-01
Apicomplexans are a diverse group of obligate parasites occupying different intracellular niches that require modification to meet the needs of the parasite. To efficiently manipulate their environment, apicomplexans translocate numerous parasite proteins into the host cell. Whereas some parasites remain contained within a parasitophorous vacuole membrane (PVM) throughout their developmental cycle, others do not, a difference that affects the machinery needed for protein export. A signal-mediated pathway for protein export into the host cell has been characterized in Plasmodium parasites, which maintain the PVM. Here, we functionally demonstrate an analogous host-targeting pathway involving organellar staging prior to secretion in the related bovine parasite, Babesia bovis, a parasite that destroys the PVM shortly after invasion. Taking into account recent identification of a similar signal-mediated pathway in the coccidian parasite Toxoplasma gondii, we suggest a model in which this conserved pathway has evolved in multiple steps from signal-mediated trafficking to specific secretory organelles for controlled secretion to a complex protein translocation process across the PVM. © 2015 John Wiley & Sons Ltd.
Begley, Lesa; Monteleon, Christine; Shah, Rajal B; Macdonald, James W; Macoska, Jill A
2005-12-01
The direct relationship between the aging process and the incidence and prevalence of both benign prostatic hyperplasia (BPH) and prostate cancer (PCa) implies that certain risk factors associated with the development of both diseases increase with the aging process. In particular, both diseases share an overly proliferative phenotype, suggesting that mechanisms that normally act to suppress cellular proliferation are disrupted or rendered dysfunctional as a consequence of the aging process. We propose that one such mechanism involves changes in the prostate microenvironment, which 'evolves' during the aging process and disrupts paracrine interactions between epithelial and associated stromal fibroblasts. We show that stromal fibroblasts isolated from the prostates of men 63-81 years of age at the time of surgery express and secrete higher levels of the CXCL12 chemokine compared with those isolated from younger men, and stimulate CXCR4-mediated signaling pathways that induce cellular proliferation. These studies represent an important first step towards a mechanistic elucidation of the role of aging in the etiology of benign and malignant prostatic diseases.
Kishino, Mitsuhiro; Yoshimoto, Takanobu; Nakadate, Masashi; Katada, Yoshiaki; Kanda, Eiichiro; Nakaminato, Shuichiro; Saida, Yukihisa; Ogawa, Yoshihiro; Tateishi, Ukihide
2017-03-31
We evaluated the influence of catheter sampling position and size on left adrenal venous sampling (AVS) in patients with primary aldosteronism (PA) and analyzed their relationship to cortisol secretion. This retrospective study included 111 patients with a diagnosis of primary aldosteronism who underwent tetracosactide-stimulated AVS. Left AVS was obtained from two catheter positions - the central adrenal vein (CAV) and the common trunk. For common trunk sampling, 5-French catheters were used in 51 patients, and microcatheters were used in 60 patients. Autonomous cortisol secretion was evaluated with a low-dose dexamethasone suppression test in 87 patients. The adrenal/inferior vena cava cortisol concentration ratio [selectivity index (SI)] was significantly lower in samples from the left common trunk than those of the left CAV and right adrenal veins, but this difference was reduced when a microcatheter was used for common trunk sampling. Sample dilution in the common trunk of the left adrenal vein can be decreased by limiting sampling speed with the use of a microcatheter. Meanwhile, there was no significant difference in SI between the left CAV and right adrenal veins. Laterality, determined according to aldosterone/cortisol ratio (A/C ratio) based criteria, showed good reproducibility regardless of sampling position, unlike the absolute aldosterone value based criteria. However, in 11 cases with autonomous cortisol co-secretion, the cortisol hypersecreting side tended to be underestimated when using A/C ratio based criteria. Left CAV sampling enables symmetrical sampling, and may be essential when using absolute aldosterone value based criteria in cases where symmetrical cortisol secretion is uncertain.
Cystic fibrosis airway secretions exhibit mucin hyperconcentration and increased osmotic pressure
Henderson, Ashley G.; Ehre, Camille; Button, Brian; Abdullah, Lubna H.; Cai, Li-Heng; Leigh, Margaret W.; DeMaria, Genevieve C.; Matsui, Hiro; Donaldson, Scott H.; Davis, C. William; Sheehan, John K.; Boucher, Richard C.; Kesimer, Mehmet
2014-01-01
The pathogenesis of mucoinfective lung disease in cystic fibrosis (CF) patients likely involves poor mucus clearance. A recent model of mucus clearance predicts that mucus flow depends on the relative mucin concentration of the mucus layer compared with that of the periciliary layer; however, mucin concentrations have been difficult to measure in CF secretions. Here, we have shown that the concentration of mucin in CF sputum is low when measured by immunologically based techniques, and mass spectrometric analyses of CF mucins revealed mucin cleavage at antibody recognition sites. Using physical size exclusion chromatography/differential refractometry (SEC/dRI) techniques, we determined that mucin concentrations in CF secretions were higher than those in normal secretions. Measurements of partial osmotic pressures revealed that the partial osmotic pressure of CF sputum and the retained mucus in excised CF lungs were substantially greater than the partial osmotic pressure of normal secretions. Our data reveal that mucin concentration cannot be accurately measured immunologically in proteolytically active CF secretions; mucins are hyperconcentrated in CF secretions; and CF secretion osmotic pressures predict mucus layer–dependent osmotic compression of the periciliary liquid layer in CF lungs. Consequently, mucin hypersecretion likely produces mucus stasis, which contributes to key infectious and inflammatory components of CF lung disease. PMID:24892808
Secret Key Crypto Implementations
NASA Astrophysics Data System (ADS)
Bertoni, Guido Marco; Melzani, Filippo
This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.
Direct and reverse secret-key capacities of a quantum channel.
Pirandola, Stefano; García-Patrón, Raul; Braunstein, Samuel L; Lloyd, Seth
2009-02-06
We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication (direct reconciliation) or a single feedback classical communication (reverse reconciliation). In particular, the reverse secret-key capacity can be positive for antidegradable channels, where no forward strategy is known to be secure. This property is explicitly shown in the continuous variable framework by considering arbitrary one-mode Gaussian channels.
The Cuban Missile Crisis. Lesson Plan.
ERIC Educational Resources Information Center
Miller, Linda K.; McAuliffe, Mary
1994-01-01
Presents a secondary lesson plan based on primary sources recently released by the Central Intelligence Agency on the Cuban Missile Crisis. Provides a background essay on the event. Includes five maps and three documents, all of which have been declassified from top secret or secret status. (CFR)
Yang, Nan; Li, Lei; Wu, Di; Gao, Yitian; Xi, Xinping; Zhou, Mei; Wang, Lei; Chen, Tianbao; Shaw, Chris
2016-01-01
Phylloseptin (PS) peptides, derived from South American hylid frogs (subfamily Phyllomedusinae), have been found to have broad-spectrum antimicrobial activities and relatively low haemolytic activities. Although PS peptides have been identified from several well-known and widely-distributed species of the Phyllomedusinae, there remains merit in their study in additional, more obscure and specialised members of this taxon. Here, we report the discovery of two novel PS peptides, named PS-Du and PS-Co, which were respectively identified for the first time and isolated from the skin secretions of Phyllomedusa duellmani and Phyllomedusa coelestis. Their encoding cDNAs were cloned, from which it was possible to deduce the entire primary structures of their biosynthetic precursors. Reversed-phase high-performance liquid chromatography (RP-HPLC) and tandem mass spectrometry (MS/MS) analyses were employed to isolate and structurally-characterise respective encoded PS peptides from skin secretions. The peptides had molecular masses of 2049.7 Da (PS-Du) and 1972.8 Da (PS-Co). They shared typical N-terminal sequences and C-terminal amidation with other known phylloseptins. The two peptides exhibited growth inhibitory activity against E. coli (NCTC 10418), as a standard Gram-negative bacterium, S. aureus (NCTC 10788), as a standard Gram-positive bacterium and C. albicans (NCPF 1467), as a standard pathogenic yeast, all as planktonic cultures. Moreover, both peptides demonstrated the capability of eliminating S. aureus biofilm. PMID:27589802
Findling, James W; Raff, Hershel
2017-05-01
Endogenous hypercortisolism (Cushing's syndrome) usually implies the presence of a pathologic condition caused by either an ACTH-secreting neoplasm or autonomous cortisol secretion from a benign or malignant adrenal neoplasm. However, sustained or intermittent hypercortisolism may also accompany many medical disorders that stimulate physiologic/non-neoplastic activation of the HPA axis (formerly known as pseudo-Cushing's syndrome); these two entities may share indistinguishable clinical and biochemical features. A thorough history and physical examination is often the best (and sometimes only) way to exclude pathologic/neoplastic hypercortisolism. The presence of alcoholism, renal failure, poorly controlled diabetes and severe neuropsychiatric disorders should always raise suspicion that the presence of hypercortisolism may be related to physiologic/non-neoplastic Cushing's syndrome. As late-night salivary cortisol and low-dose dexamethasone suppression have good sensitivity and negative predictive value, normal studies exclude Cushing's syndrome of any form. However, these tests have imperfect specificity and additional testing over time with clinical follow-up is often needed. When there is persistent diagnostic uncertainty, secondary tests such as the DDAVP stimulation test and the dexamethasone-CRH test may provide evidence for the presence or absence of an ACTH-secreting tumor. This review will define and characterize the numerous causes of physiologic/non-neoplastic hypercortisolism and provide a rational clinical and biochemical approach to distinguish it from pathologic/neoplastic hypercortisolism (true Cushing's syndrome). © 2017 European Society of Endocrinology.
Identification, expression and tissue distribution of a renalase homologue from mouse.
Wang, Jian; Qi, Shaoling; Cheng, Wei; Li, Li; Wang, Fu; Li, Ying-Zi; Zhang, Shu-Ping
2008-12-01
FAD (flavin adenine dinucleotide)-dependent monoamine oxidases play very important roles in many biological processes. A novel monoamine oxidase, named renalase, has been identified in human kidney recently and is found to be markedly reduced in patients with end-stage renal disease (ESRD). Here, we reported the identification of a renalase homologue from mouse, termed mMAO-C (mouse monoamine oxidase-C) after the monoamine oxidase-A and -B (MAO-A and -B). This gene locates on the mouse chromosome 19C1 and its coding region spans 7 exons. The deuced amino acid sequences were predicted to contain a typical secretive signal peptide and a conserved amine oxidase domain. Phylogenetic analysis and multiple sequences alignment indicated that mMAO-C-like sequences exist in all examined species and share significant similarities. This gene has been submitted to the NCBI GenBank database (Accession number: DQ788834). With expression vectors generated from the cloned mMAO-C gene, exogenous protein was effectively expressed in both prokaryotic and eukaryotic cells. Recombinant mMAO-C protein was secreted out of human cell lines, indicating the biological function of its signal peptide. Moreover, tissue expression pattern analysis revealed that mMAO-C gene is predominantly expressed in the mouse kidney and testicle, which implies that kidney and testicle are the main sources of renalase secretion. Shortly, this study provides an insight into understanding the physiological and biological functions of mMAO-C and its homologues in endocrine.
Making Plants Break a Sweat: the Structure, Function, and Evolution of Plant Salt Glands
Dassanayake, Maheshi; Larkin, John C.
2017-01-01
Salt stress is a complex trait that poses a grand challenge in developing new crops better adapted to saline environments. Some plants, called recretohalophytes, that have naturally evolved to secrete excess salts through salt glands, offer an underexplored genetic resource for examining how plant development, anatomy, and physiology integrate to prevent excess salt from building up to toxic levels in plant tissue. In this review we examine the structure and evolution of salt glands, salt gland-specific gene expression, and the possibility that all salt glands have originated via evolutionary modifications of trichomes. Salt secretion via salt glands is found in more than 50 species in 14 angiosperm families distributed in caryophyllales, asterids, rosids, and grasses. The salt glands of these distantly related clades can be grouped into four structural classes. Although salt glands appear to have originated independently at least 12 times, they share convergently evolved features that facilitate salt compartmentalization and excretion. We review the structural diversity and evolution of salt glands, major transporters and proteins associated with salt transport and secretion in halophytes, salt gland relevant gene expression regulation, and the prospect for using new genomic and transcriptomic tools in combination with information from model organisms to better understand how salt glands contribute to salt tolerance. Finally, we consider the prospects for using this knowledge to engineer salt glands to increase salt tolerance in model species, and ultimately in crops. PMID:28400779
Hemrajani, Cordula; Marches, Olivier; Wiles, Siouxsie; Girard, Francis; Dennis, Alison; Dziva, Francis; Best, Angus; Phillips, Alan D; Berger, Cedric N; Mousnier, Aurelie; Crepin, Valerie F; Kruidenier, Laurens; Woodward, Martin J; Stevens, Mark P; La Ragione, Roberto M; MacDonald, Thomas T; Frankel, Gad
2008-11-01
The human pathogen enterohemorrhagic Escherichia coli (EHEC) O157:H7 colonizes human and animal gut via formation of attaching and effacing lesions. EHEC strains use a type III secretion system to translocate a battery of effector proteins into the mammalian host cell, which subvert diverse signal transduction pathways implicated in actin dynamics, phagocytosis, and innate immunity. The genomes of sequenced EHEC O157:H7 strains contain two copies of the effector protein gene nleH, which share 49% sequence similarity with the gene for the Shigella effector OspG, recently implicated in inhibition of migration of the transcriptional regulator NF-kappaB to the nucleus. In this study we investigated the role of NleH during EHEC O157:H7 infection of calves and lambs. We found that while EHEC DeltanleH colonized the bovine gut more efficiently than the wild-type strain, in lambs the wild-type strain exhibited a competitive advantage over the mutant during mixed infection. Using the mouse pathogen Citrobacter rodentium, which shares many virulence factors with EHEC O157:H7, including NleH, we observed that the wild-type strain exhibited a competitive advantage over the mutant during mixed infection. We found no measurable differences in T-cell infiltration or hyperplasia in colons of mice inoculated with the wild-type or the nleH mutant strain. Using NF-kappaB reporter mice carrying a transgene containing a luciferase reporter driven by three NF-kappaB response elements, we found that NleH causes an increase in NF-kappaB activity in the colonic mucosa. Consistent with this, we found that the nleH mutant triggered a significantly lower tumor necrosis factor alpha response than the wild-type strain.
Skin pathology and medical prognosis in medieval Europe: the secrets of Hippocrates.
Ackerman Smoller, L
2000-12-01
This article analyzes a medieval text known as The Secrets of Hippocrates. Neither secret (because of its wide circulation in manuscript and print) nor by Hippocrates, the work offered readers a means of offering a prognosis of impending death based on observable signs on the skin. Although the aphorisms that make up the text make little sense in a modern medical understanding, the Secrets of Hippocrates fits well within three medieval traditions: the tradition of secrets literature, the medieval medical tradition, and the tradition of medieval Christian views about the body. First, like other books of secrets, a genre to whose conventions the text closely adheres, the Secrets of Hippocrates offered a shortcut to socially useful knowledge: the ability to offer an accurate medical prognosis. Second, the treatise corresponded to the medieval physician's concern for the so-called nonnaturals, such as diet and exercise. Third, it fit with a medieval Christian notion that sickness and sin were related, as were sin and ugliness. Just as a leper's deformities were a window to his sinful soul, so skin pathologies could clue a medieval physician to the lethal disease hidden inside the body.
Kubo, A; Isumi, Y; Ishizaka, Y; Tomoda, Y; Kangawa, K; Dohi, K; Matsuo, H; Minamino, N
2001-05-01
C-type natriuretic peptide (CNP) is the third member of the natriuretic peptide family. Cultured endothelial cells secrete CNP, and its secretion rate from the endothelial cells is augmented by lipopolysaccharide, interleukin-1beta, and tumor necrosis factor-alpha, which participate in the pathophysiology of inflammation. In this study, we investigated the regulation of CNP secretion from monocytes and macrophages to estimate its contribution to the progression of inflammation. CNP secretion rates from two human leukemia cell lines (THP-1 and HL-60), human peripheral blood lymphocytes, granulocytes, monocytes, monocyte-derived macrophages, and mouse peritoneal macrophages were measured under conditions with or without stimulation. Immunoreactive CNP levels in the culture media of these cells were measured by a specific radioimmunoassay. The secretion rates of CNP from THP-1 and HL-60 cells were augmented according to the degree of their differentiation into macrophage-like cells under the stimulation with phorbol ester. Peripheral blood monocytes also increased the CNP secretion rate after their differentiation into macrophages. Retinoic acid elicited synergistic effects on the CNP secretion rate from HL-60 cells when administered with lipopolysaccharide, interferon-gamma, interleukin-1beta, tumor necrosis factor-alpha, or phorbol ester. In contrast, the phorbol ester-stimulated CNP secretion rate from THP-1 cells was suppressed with dexamethasone, which inhibits monocyte differentiation into macrophage. The secretion rate of CNP from monocytes was shown to be regulated based on the degree of their differentiation. This study provides evidence that the monocyte/macrophage system is one of the sources of CNP, especially under inflammatory conditions.
Optical multiple-image hiding based on interference and grating modulation
NASA Astrophysics Data System (ADS)
He, Wenqi; Peng, Xiang; Meng, Xiangfeng
2012-07-01
We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach.
Stamou, M. I.; Cox, K. H.
2015-01-01
The neuroendocrine regulation of reproduction is an intricate process requiring the exquisite coordination of an assortment of cellular networks, all converging on the GnRH neurons. These neurons have a complex life history, migrating mainly from the olfactory placode into the hypothalamus, where GnRH is secreted and acts as the master regulator of the hypothalamic-pituitary-gonadal axis. Much of what we know about the biology of the GnRH neurons has been aided by discoveries made using the human disease model of isolated GnRH deficiency (IGD), a family of rare Mendelian disorders that share a common failure of secretion and/or action of GnRH causing hypogonadotropic hypogonadism. Over the last 30 years, research groups around the world have been investigating the genetic basis of IGD using different strategies based on complex cases that harbor structural abnormalities or single pleiotropic genes, endogamous pedigrees, candidate gene approaches as well as pathway gene analyses. Although such traditional approaches, based on well-validated tools, have been critical to establish the field, new strategies, such as next-generation sequencing, are now providing speed and robustness, but also revealing a surprising number of variants in known IGD genes in both patients and healthy controls. Thus, before the field moves forward with new genetic tools and continues discovery efforts, we must reassess what we know about IGD genetics and prepare to hold our work to a different standard. The purpose of this review is to: 1) look back at the strategies used to discover the “known” genes implicated in the rare forms of IGD; 2) examine the strengths and weaknesses of the methodologies used to validate genetic variation; 3) substantiate the role of known genes in the pathophysiology of the disease; and 4) project forward as we embark upon a widening use of these new and powerful technologies for gene discovery. PMID:26394276
Stamou, M I; Cox, K H; Crowley, William F
2015-12-01
The neuroendocrine regulation of reproduction is an intricate process requiring the exquisite coordination of an assortment of cellular networks, all converging on the GnRH neurons. These neurons have a complex life history, migrating mainly from the olfactory placode into the hypothalamus, where GnRH is secreted and acts as the master regulator of the hypothalamic-pituitary-gonadal axis. Much of what we know about the biology of the GnRH neurons has been aided by discoveries made using the human disease model of isolated GnRH deficiency (IGD), a family of rare Mendelian disorders that share a common failure of secretion and/or action of GnRH causing hypogonadotropic hypogonadism. Over the last 30 years, research groups around the world have been investigating the genetic basis of IGD using different strategies based on complex cases that harbor structural abnormalities or single pleiotropic genes, endogamous pedigrees, candidate gene approaches as well as pathway gene analyses. Although such traditional approaches, based on well-validated tools, have been critical to establish the field, new strategies, such as next-generation sequencing, are now providing speed and robustness, but also revealing a surprising number of variants in known IGD genes in both patients and healthy controls. Thus, before the field moves forward with new genetic tools and continues discovery efforts, we must reassess what we know about IGD genetics and prepare to hold our work to a different standard. The purpose of this review is to: 1) look back at the strategies used to discover the "known" genes implicated in the rare forms of IGD; 2) examine the strengths and weaknesses of the methodologies used to validate genetic variation; 3) substantiate the role of known genes in the pathophysiology of the disease; and 4) project forward as we embark upon a widening use of these new and powerful technologies for gene discovery.
Quantum secret information equal exchange protocol based on dense coding
NASA Astrophysics Data System (ADS)
Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping
2018-04-01
In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.
CCL11 elicits secretion of RNases from mouse eosinophils and their cell-free granules
Shamri, Revital; Melo, Rossana C. N.; Young, Kristen M.; Bivas-Benita, Maytal; Xenakis, Jason J.; Spencer, Lisa A.; Weller, Peter F.
2012-01-01
Rapid secretion of eosinophil-associated RNases (EARs), such as the human eosinophilic cationic protein (ECP), from intracellular granules is central to the role of eosinophils in allergic diseases and host immunity. Our knowledge regarding allergic inflammation has advanced based on mouse experimental models. However, unlike human eosinophils, capacities of mouse eosinophils to secrete granule proteins have been controversial. To study mechanisms of mouse eosinophil secretion and EAR release, we combined an RNase assay of mouse EARs with ultrastructural studies. In vitro, mouse eosinophils stimulated with the chemokine eotaxin-1 (CCL11) secreted enzymatically active EARs (EC50 5 nM) by piecemeal degranulation. In vivo, in a mouse model of allergic airway inflammation, increased airway eosinophil infiltration (24-fold) correlated with secretion of active RNases (3-fold). Moreover, we found that eosinophilic inflammation in mice can involve eosinophil cytolysis and release of cell-free granules. Cell-free mouse eosinophil granules expressed functional CCR3 receptors and secreted their granule proteins, including EAR and eosinophil peroxidase in response to CCL11. Collectively, these data demonstrate chemokine-dependent secretion of EARs from both intact mouse eosinophils and their cell-free granules, findings pertinent to understanding the pathogenesis of eosinophil-associated diseases, in which EARs are key factors.—Shamri, R., Melo, R. C. N., Young, K. M., B.-B, M., Xenakis, J. J., Spencer, L. A., Weller, P. F. CCL11 elicits secretion of RNases from mouse eosinophils and their cell-free granules. PMID:22294786
Image communication scheme based on dynamic visual cryptography and computer generated holography
NASA Astrophysics Data System (ADS)
Palevicius, Paulius; Ragulskis, Minvydas
2015-01-01
Computer generated holograms are often exploited to implement optical encryption schemes. This paper proposes the integration of dynamic visual cryptography (an optical technique based on the interplay of visual cryptography and time-averaging geometric moiré) with Gerchberg-Saxton algorithm. A stochastic moiré grating is used to embed the secret into a single cover image. The secret can be visually decoded by a naked eye if only the amplitude of harmonic oscillations corresponds to an accurately preselected value. The proposed visual image encryption scheme is based on computer generated holography, optical time-averaging moiré and principles of dynamic visual cryptography. Dynamic visual cryptography is used both for the initial encryption of the secret image and for the final decryption. Phase data of the encrypted image are computed by using Gerchberg-Saxton algorithm. The optical image is decrypted using the computationally reconstructed field of amplitudes.
Artificial MicroRNAs as Novel Secreted Reporters for Cell Monitoring in Living Subjects.
Ronald, John A; D'Souza, Aloma L; Chuang, Hui-Yen; Gambhir, Sanjiv Sam
2016-01-01
Reporter genes are powerful technologies that can be used to directly inform on the fate of transplanted cells in living subjects. Imaging reporter genes are often employed to quantify cell number, location(s), and viability with various imaging modalities. To complement this, reporters that are secreted from cells can provide a low-cost, in vitro diagnostic test to monitor overall cell viability at relatively high frequency without knowing the locations of all cells. Whereas protein-based secretable reporters have been developed, an RNA-based reporter detectable with amplification inherent PCR-based assays has not been previously described. MicroRNAs (miRNAs) are short non-coding RNAs (18-22 nt) that regulate mRNA translation and are being explored as relatively stable blood-based disease biomarkers. We developed an artificial miRNA-based secreted reporter, called Sec-miR, utilizing a coding sequence that is not expressed endogenously and does not have any known vertebrate target. Sec-miR was detectable in both the cells and culture media of transiently transfected cells. Cells stably expressing Sec-miR also reliably secreted it into the culture media. Mice implanted with parental HeLa cells or HeLa cells expressing both Sec-miR and the bioluminescence imaging (BLI) reporter gene Firefly luciferase (FLuc) were monitored over time for tumor volume, FLuc signal via BLI, and blood levels of Sec-miR. Significantly (p<0.05) higher Sec-miR was found in the blood of mice bearing Sec-miR-expressing tumors compared to parental cell tumors at 21 and 28 days after implantation. Importantly, blood Sec-miR reporter levels after day 21 showed a trend towards correlation with tumor volume (R2 = 0.6090; p = 0.0671) and significantly correlated with FLuc signal (R2 = 0.7067; p<0.05). Finally, we could significantly (p<0.01) amplify Sec-miR secretion into the cell media by chaining together multiple Sec-miR copies (4 instead of 1 or 2) within an expression cassette. Overall, we show that a novel complement of BLI together with a unique Sec-miR reporter adds an in vitro RNA-based diagnostic to enhance the monitoring of transplanted cells. While Sec-miR was not as sensitive as BLI for monitoring cell number, it may be more sensitive than clinically-relevant positron emission tomography (PET) reporter assays. Future work will focus on improving cell detectability via improved secretion of Sec-miR reporters from cells and more sensitive detection platforms, as well as, exploring other miRNA sequences to allow multiplexed monitoring of more than one cell population at a time. Continued development may lead to more refined and precise monitoring of cell-based therapies.
Silberstein, Lev; Goncalves, Kevin A; Kharchenko, Peter V; Turcotte, Raphael; Kfoury, Youmna; Mercier, Francois; Baryawno, Ninib; Severe, Nicolas; Bachand, Jacqueline; Spencer, Joel A; Papazian, Ani; Lee, Dongjun; Chitteti, Brahmananda Reddy; Srour, Edward F; Hoggatt, Jonathan; Tate, Tiffany; Lo Celso, Cristina; Ono, Noriaki; Nutt, Stephen; Heino, Jyrki; Sipilä, Kalle; Shioda, Toshihiro; Osawa, Masatake; Lin, Charles P; Hu, Guo-Fu; Scadden, David T
2016-10-06
Physiological stem cell function is regulated by secreted factors produced by niche cells. In this study, we describe an unbiased approach based on the differential single-cell gene expression analysis of mesenchymal osteolineage cells close to, and further removed from, hematopoietic stem/progenitor cells (HSPCs) to identify candidate niche factors. Mesenchymal cells displayed distinct molecular profiles based on their relative location. We functionally examined, among the genes that were preferentially expressed in proximal cells, three secreted or cell-surface molecules not previously connected to HSPC biology-the secreted RNase angiogenin, the cytokine IL18, and the adhesion molecule Embigin-and discovered that all of these factors are HSPC quiescence regulators. Therefore, our proximity-based differential single-cell approach reveals molecular heterogeneity within niche cells and can be used to identify novel extrinsic stem/progenitor cell regulators. Similar approaches could also be applied to other stem cell/niche pairs to advance the understanding of microenvironmental regulation of stem cell function. Copyright © 2016 Elsevier Inc. All rights reserved.
Biomathematical modeling of pulsatile hormone secretion: a historical perspective.
Evans, William S; Farhy, Leon S; Johnson, Michael L
2009-01-01
Shortly after the recognition of the profound physiological significance of the pulsatile nature of hormone secretion, computer-based modeling techniques were introduced for the identification and characterization of such pulses. Whereas these earlier approaches defined perturbations in hormone concentration-time series, deconvolution procedures were subsequently employed to separate such pulses into their secretion event and clearance components. Stochastic differential equation modeling was also used to define basal and pulsatile hormone secretion. To assess the regulation of individual components within a hormone network, a method that quantitated approximate entropy within hormone concentration-times series was described. To define relationships within coupled hormone systems, methods including cross-correlation and cross-approximate entropy were utilized. To address some of the inherent limitations of these methods, modeling techniques with which to appraise the strength of feedback signaling between and among hormone-secreting components of a network have been developed. Techniques such as dynamic modeling have been utilized to reconstruct dose-response interactions between hormones within coupled systems. A logical extension of these advances will require the development of mathematical methods with which to approximate endocrine networks exhibiting multiple feedback interactions and subsequently reconstruct their parameters based on experimental data for the purpose of testing regulatory hypotheses and estimating alterations in hormone release control mechanisms.
Quantifying time-varying cellular secretions with local linear models.
Byers, Jeff M; Christodoulides, Joseph A; Delehanty, James B; Raghu, Deepa; Raphael, Marc P
2017-07-01
Extracellular protein concentrations and gradients initiate a wide range of cellular responses, such as cell motility, growth, proliferation and death. Understanding inter-cellular communication requires spatio-temporal knowledge of these secreted factors and their causal relationship with cell phenotype. Techniques which can detect cellular secretions in real time are becoming more common but generalizable data analysis methodologies which can quantify concentration from these measurements are still lacking. Here we introduce a probabilistic approach in which local-linear models and the law of mass action are applied to obtain time-varying secreted concentrations from affinity-based biosensor data. We first highlight the general features of this approach using simulated data which contains both static and time-varying concentration profiles. Next we apply the technique to determine concentration of secreted antibodies from 9E10 hybridoma cells as detected using nanoplasmonic biosensors. A broad range of time-dependent concentrations was observed: from steady-state secretions of 230 pM near the cell surface to large transients which reached as high as 56 nM over several minutes and then dissipated.
Label-Free Optofluidic Nanobiosensor Enables Real-Time Analysis of Single-Cell Cytokine Secretion.
Li, Xiaokang; Soler, Maria; Szydzik, Crispin; Khoshmanesh, Khashayar; Schmidt, Julien; Coukos, George; Mitchell, Arnan; Altug, Hatice
2018-06-01
Single-cell analysis of cytokine secretion is essential to understand the heterogeneity of cellular functionalities and develop novel therapies for multiple diseases. Unraveling the dynamic secretion process at single-cell resolution reveals the real-time functional status of individual cells. Fluorescent and colorimetric-based methodologies require tedious molecular labeling that brings inevitable interferences with cell integrity and compromises the temporal resolution. An innovative label-free optofluidic nanoplasmonic biosensor is introduced for single-cell analysis in real time. The nanobiosensor incorporates a novel design of a multifunctional microfluidic system with small volume microchamber and regulation channels for reliable monitoring of cytokine secretion from individual cells for hours. Different interleukin-2 secretion profiles are detected and distinguished from single lymphoma cells. The sensor configuration combined with optical spectroscopic imaging further allows us to determine the spatial single-cell secretion fingerprints in real time. This new biosensor system is anticipated to be a powerful tool to characterize single-cell signaling for basic and clinical research. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
The evolution of siderophore production as a competitive trait.
Niehus, Rene; Picot, Aurore; Oliveira, Nuno M; Mitri, Sara; Foster, Kevin R
2017-06-01
Microbes have the potential to be highly cooperative organisms. The archetype of microbial cooperation is often considered to be the secretion of siderophores, molecules scavenging iron, where cooperation is threatened by "cheater" genotypes that use siderophores without making them. Here, we show that this view neglects a key piece of biology: siderophores are imported by specific receptors that constrain their use by competing strains. We study the effect of this specificity in an ecoevolutionary model, in which we vary siderophore sharing among strains, and compare fully shared siderophores with private siderophores. We show that privatizing siderophores fundamentally alters their evolution. Rather than a canonical cooperative good, siderophores become a competitive trait used to pillage iron from other strains. We also study the physiological regulation of siderophores using in silico long-term evolution. Although shared siderophores evolve to be downregulated in the presence of a competitor, as expected for a cooperative trait, privatized siderophores evolve to be upregulated. We evaluate these predictions using published experimental work, which suggests that some siderophores are upregulated in response to competition akin to competitive traits like antibiotics. Although siderophores can act as a cooperative good for single genotypes, we argue that their role in competition is fundamental to understanding their biology. © 2017 The Author(s). Evolution © 2017 The Society for the Study of Evolution.
Vulvovaginitis in prepubertal girls
Stricker, T; Navratil, F; Sennhauser, F
2003-01-01
This retrospective study evaluated the clinical features and findings in bacterial cultures and in microscopic examination of vaginal secretions in 80 prepubertal girls, aged 2–12 years, with vulvovaginitis. Vaginal secretions were obtained directly from the vagina with a sterile catheter carefully inserted into the vagina. Pathogenic bacteria were isolated in 36% of cases. In 59% of these cases the isolated pathogen was group A ß-haemolytic streptococcus. Candida was not found in any of the patients. The finding of leucocytes in vaginal secretions as an indicator for growth of pathogenic bacteria had a sensitivity of 83% and a specificity of 59%. Antimicrobial treatment should therefore be based on bacteriological findings of vaginal secretions and not on the presence of leucocytes alone. PMID:12651758
Optimized FPGA Implementation of the Thyroid Hormone Secretion Mechanism Using CAD Tools.
Alghazo, Jaafar M
2017-02-01
The goal of this paper is to implement the secretion mechanism of the Thyroid Hormone (TH) based on bio-mathematical differential eqs. (DE) on an FPGA chip. Hardware Descriptive Language (HDL) is used to develop a behavioral model of the mechanism derived from the DE. The Thyroid Hormone secretion mechanism is simulated with the interaction of the related stimulating and inhibiting hormones. Synthesis of the simulation is done with the aid of CAD tools and downloaded on a Field Programmable Gate Arrays (FPGAs) Chip. The chip output shows identical behavior to that of the designed algorithm through simulation. It is concluded that the chip mimics the Thyroid Hormone secretion mechanism. The chip, operating in real-time, is computer-independent stand-alone system.
Multi-party Quantum Key Agreement without Entanglement
NASA Astrophysics Data System (ADS)
Cai, Bin-Bin; Guo, Gong-De; Lin, Song
2017-04-01
A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.
Structure and Function of Lipopolysaccharide Binding Protein
NASA Astrophysics Data System (ADS)
Schumann, Ralf R.; Leong, Steven R.; Flaggs, Gail W.; Gray, Patrick W.; Wright, Samuel D.; Mathison, John C.; Tobias, Peter S.; Ulevitch, Richard J.
1990-09-01
The primary structure of lipopolysaccharide binding protein (LBP), a trace plasma protein that binds to the lipid A moiety of bacterial lipopolysaccharides (LPSs), was deduced by sequencing cloned complementary DNA. LBP shares sequence identity with another LPS binding protein found in granulocytes, bactericidal/permeability-increasing protein, and with cholesterol ester transport protein of the plasma. LBP may control the response to LPS under physiologic conditions by forming high-affinity complexes with LPS that bind to monocytes and macrophages, which then secrete tumor necrosis factor. The identification of this pathway for LPS-induced monocyte stimulation may aid in the development of treatments for diseases in which Gram-negative sepsis or endotoxemia are involved.
Quantum Teleportation of an Arbitrary N-qubit State via GHZ-like States
NASA Astrophysics Data System (ADS)
Zhang, Bo; Liu, Xing-tong; Wang, Jian; Tang, Chao-jing
2016-03-01
Recently Zhu (Int. J. Theor. Phys. 53, 4095, 2014) had shown that using GHZ-like states as quantum channel, it is possible to teleport an arbitrary unknown two-qubit state. We investigate this channel for the teleportation of an arbitrary N-qubit state. The strict proof through mathematical induction is presented and the rule for the receiver to reconstruct the desired state is explicitly derived in the most general case. We also discuss that if a system of quantum secret sharing of classical message is established, our protocol can be transformed to a N-qubit perfect controlled teleportation scheme from the controller's point of view.
Optimal quantum error correcting codes from absolutely maximally entangled states
NASA Astrophysics Data System (ADS)
Raissi, Zahra; Gogolin, Christian; Riera, Arnau; Acín, Antonio
2018-02-01
Absolutely maximally entangled (AME) states are pure multi-partite generalizations of the bipartite maximally entangled states with the property that all reduced states of at most half the system size are in the maximally mixed state. AME states are of interest for multipartite teleportation and quantum secret sharing and have recently found new applications in the context of high-energy physics in toy models realizing the AdS/CFT-correspondence. We work out in detail the connection between AME states of minimal support and classical maximum distance separable (MDS) error correcting codes and, in particular, provide explicit closed form expressions for AME states of n parties with local dimension \
Masking Quantum Information is Impossible
NASA Astrophysics Data System (ADS)
Modi, Kavan; Pati, Arun Kumar; SenDe, Aditi; Sen, Ujjwal
2018-06-01
Classical information encoded in composite quantum states can be completely hidden from the reduced subsystems and may be found only in the correlations. Can the same be true for quantum information? If quantum information is hidden from subsystems and spread over quantum correlation, we call it masking of quantum information. We show that while this may still be true for some restricted sets of nonorthogonal quantum states, it is not possible for arbitrary quantum states. This result suggests that quantum qubit commitment—a stronger version of the quantum bit commitment—is not possible in general. Our findings may have potential applications in secret sharing and future quantum communication protocols.
Anisotropic Invariance and the Distribution of Quantum Correlations.
Cheng, Shuming; Hall, Michael J W
2017-01-06
We report the discovery of two new invariants for three-qubit states which, similarly to the three-tangle, are invariant under local unitary transformations and permutations of the parties. These quantities have a direct interpretation in terms of the anisotropy of pairwise spin correlations. Applications include a universal ordering of pairwise quantum correlation measures for pure three-qubit states; trade-off relations for anisotropy, three-tangle and Bell nonlocality; strong monogamy relations for Bell inequalities, Einstein-Podolsky-Rosen steering inequalities, geometric discord and fidelity of remote state preparation (including results for arbitrary three-party states); and a statistical and reference-frame-independent form of quantum secret sharing.
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
Fault-tolerant Remote Quantum Entanglement Establishment for Secure Quantum Communications
NASA Astrophysics Data System (ADS)
Tsai, Chia-Wei; Lin, Jason
2016-07-01
This work presents a strategy for constructing long-distance quantum communications among a number of remote users through collective-noise channel. With the assistance of semi-honest quantum certificate authorities (QCAs), the remote users can share a secret key through fault-tolerant entanglement swapping. The proposed protocol is feasible for large-scale distributed quantum networks with numerous users. Each pair of communicating parties only needs to establish the quantum channels and the classical authenticated channels with his/her local QCA. Thus, it enables any user to communicate freely without point-to-point pre-establishing any communication channels, which is efficient and feasible for practical environments.
Anisotropic Invariance and the Distribution of Quantum Correlations
NASA Astrophysics Data System (ADS)
Cheng, Shuming; Hall, Michael J. W.
2017-01-01
We report the discovery of two new invariants for three-qubit states which, similarly to the three-tangle, are invariant under local unitary transformations and permutations of the parties. These quantities have a direct interpretation in terms of the anisotropy of pairwise spin correlations. Applications include a universal ordering of pairwise quantum correlation measures for pure three-qubit states; trade-off relations for anisotropy, three-tangle and Bell nonlocality; strong monogamy relations for Bell inequalities, Einstein-Podolsky-Rosen steering inequalities, geometric discord and fidelity of remote state preparation (including results for arbitrary three-party states); and a statistical and reference-frame-independent form of quantum secret sharing.
A novel quantum LSB-based steganography method using the Gray code for colored quantum images
NASA Astrophysics Data System (ADS)
Heidari, Shahrokh; Farzadnia, Ehsan
2017-10-01
As one of the prevalent data-hiding techniques, steganography is defined as the act of concealing secret information in a cover multimedia encompassing text, image, video and audio, imperceptibly, in order to perform interaction between the sender and the receiver in which nobody except the receiver can figure out the secret data. In this approach a quantum LSB-based steganography method utilizing the Gray code for quantum RGB images is investigated. This method uses the Gray code to accommodate two secret qubits in 3 LSBs of each pixel simultaneously according to reference tables. Experimental consequences which are analyzed in MATLAB environment, exhibit that the present schema shows good performance and also it is more secure and applicable than the previous one currently found in the literature.
Barron, Martin J.; Smith, Claire E.L.; Poulter, James A.; Mighell, Alan J.; Inglehearn, Chris F.; Brown, Catriona J.; Rodd, Helen; Kirkham, Jennifer; Dixon, Michael J.
2017-01-01
Abstract ‘Amelogenesis imperfecta’ (AI) describes a group of inherited diseases of dental enamel that have major clinical impact. Here, we identify the aetiology driving AI in mice carrying a p.S55I mutation in enamelin; one of the most commonly mutated proteins underlying AI in humans. Our data indicate that the mutation inhibits the ameloblast secretory pathway leading to ER stress and an activated unfolded protein response (UPR). Initially, with the support of the UPR acting in pro-survival mode, Enamp.S55I heterozygous mice secreted structurally normal enamel. However, enamel secreted thereafter was structurally abnormal; presumably due to the UPR modulating ameloblast behaviour and function in an attempt to relieve ER stress. Homozygous mutant mice failed to produce enamel. We also identified a novel heterozygous ENAMp.L31R mutation causing AI in humans. We hypothesize that ER stress is the aetiological factor in this case of human AI as it shared the characteristic phenotype described above for the Enamp.S55I mouse. We previously demonstrated that AI in mice carrying the Amelxp.Y64H mutation is a proteinopathy. The current data indicate that AI in Enamp.S55I mice is also a proteinopathy, and based on comparative phenotypic analysis, we suggest that human AI resulting from the ENAMp.L31R mutation is another proteinopathic disease. Identifying a common aetiology for AI resulting from mutations in two different genes opens the way for developing pharmaceutical interventions designed to relieve ER stress or modulate the UPR during enamel development to ameliorate the clinical phenotype. PMID:28334996
Brookes, Steven J; Barron, Martin J; Smith, Claire E L; Poulter, James A; Mighell, Alan J; Inglehearn, Chris F; Brown, Catriona J; Rodd, Helen; Kirkham, Jennifer; Dixon, Michael J
2017-05-15
'Amelogenesis imperfecta' (AI) describes a group of inherited diseases of dental enamel that have major clinical impact. Here, we identify the aetiology driving AI in mice carrying a p.S55I mutation in enamelin; one of the most commonly mutated proteins underlying AI in humans. Our data indicate that the mutation inhibits the ameloblast secretory pathway leading to ER stress and an activated unfolded protein response (UPR). Initially, with the support of the UPR acting in pro-survival mode, Enamp.S55I heterozygous mice secreted structurally normal enamel. However, enamel secreted thereafter was structurally abnormal; presumably due to the UPR modulating ameloblast behaviour and function in an attempt to relieve ER stress. Homozygous mutant mice failed to produce enamel. We also identified a novel heterozygous ENAMp.L31R mutation causing AI in humans. We hypothesize that ER stress is the aetiological factor in this case of human AI as it shared the characteristic phenotype described above for the Enamp.S55I mouse. We previously demonstrated that AI in mice carrying the Amelxp.Y64H mutation is a proteinopathy. The current data indicate that AI in Enamp.S55I mice is also a proteinopathy, and based on comparative phenotypic analysis, we suggest that human AI resulting from the ENAMp.L31R mutation is another proteinopathic disease. Identifying a common aetiology for AI resulting from mutations in two different genes opens the way for developing pharmaceutical interventions designed to relieve ER stress or modulate the UPR during enamel development to ameliorate the clinical phenotype. © The Author 2017. Published by Oxford University Press.
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.
Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J
2018-05-01
Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.
Rhizosphere hydrophobicity: A positive trait in the competition for water.
Zeppenfeld, Thorsten; Balkenhol, Niko; Kóvacs, Kristóf; Carminati, Andrea
2017-01-01
The ability to acquire water from the soil is a major driver in interspecific plant competition and it depends on several root functional traits. One of these traits is the excretion of gel-like compounds (mucilage) that modify physical soil properties. Mucilage secreted by roots becomes hydrophobic upon drying, impedes the rewetting of the soil close to the root, the so called rhizosphere, and reduces water availability to plants. The function of rhizosphere hydrophobicity is not easily understandable when looking at a single plant, but it may constitute a competitive advantage at the ecosystem level. We hypothesize that by making the top soil hydrophobic, deep-rooted plants avoid competititon with shallow-rooted plants. To test this hypothesis we used an individual-based model to simulate water uptake and growth of two virtual plant species, one deep-rooted plant capable of making the soil hydrophobic and a shallow-rooted plant. We ran scenarios with different precipitation regimes ranging from dry to wet (350, 700, and 1400 mm total annual precipitation) and from high to low precipitation frequencies (1, 7, and 14 days). Plant species abundance and biomass were chosen as indicators for competitiveness of plant species. At constant precipitation frequency mucilage hydrophobicity lead to a benefit in biomass and abundance of the tap-rooted population. Under wet conditions this effect diminished and tap-rooted plants were less productive. Without this trait both species coexisted. The effect of root exudation trait remained constant under different precipitation frequencies. This study shows that mucilage secretion is a competitive trait for the acquisition of water. This advantage is achieved by the modification of the soil hydraulic properties and specifically by inducing water repellency in soil regions which are shared with other species.
Rhizosphere hydrophobicity: A positive trait in the competition for water
Balkenhol, Niko; Kóvacs, Kristóf; Carminati, Andrea
2017-01-01
The ability to acquire water from the soil is a major driver in interspecific plant competition and it depends on several root functional traits. One of these traits is the excretion of gel-like compounds (mucilage) that modify physical soil properties. Mucilage secreted by roots becomes hydrophobic upon drying, impedes the rewetting of the soil close to the root, the so called rhizosphere, and reduces water availability to plants. The function of rhizosphere hydrophobicity is not easily understandable when looking at a single plant, but it may constitute a competitive advantage at the ecosystem level. We hypothesize that by making the top soil hydrophobic, deep-rooted plants avoid competititon with shallow-rooted plants. To test this hypothesis we used an individual-based model to simulate water uptake and growth of two virtual plant species, one deep-rooted plant capable of making the soil hydrophobic and a shallow-rooted plant. We ran scenarios with different precipitation regimes ranging from dry to wet (350, 700, and 1400 mm total annual precipitation) and from high to low precipitation frequencies (1, 7, and 14 days). Plant species abundance and biomass were chosen as indicators for competitiveness of plant species. At constant precipitation frequency mucilage hydrophobicity lead to a benefit in biomass and abundance of the tap-rooted population. Under wet conditions this effect diminished and tap-rooted plants were less productive. Without this trait both species coexisted. The effect of root exudation trait remained constant under different precipitation frequencies. This study shows that mucilage secretion is a competitive trait for the acquisition of water. This advantage is achieved by the modification of the soil hydraulic properties and specifically by inducing water repellency in soil regions which are shared with other species. PMID:28753673
Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398
Approach to design neural cryptography: a generalized architecture and a heuristic rule.
Mu, Nankun; Liao, Xiaofeng; Huang, Tingwen
2013-06-01
Neural cryptography, a type of public key exchange protocol, is widely considered as an effective method for sharing a common secret key between two neural networks on public channels. How to design neural cryptography remains a great challenge. In this paper, in order to provide an approach to solve this challenge, a generalized network architecture and a significant heuristic rule are designed. The proposed generic framework is named as tree state classification machine (TSCM), which extends and unifies the existing structures, i.e., tree parity machine (TPM) and tree committee machine (TCM). Furthermore, we carefully study and find that the heuristic rule can improve the security of TSCM-based neural cryptography. Therefore, TSCM and the heuristic rule can guide us to designing a great deal of effective neural cryptography candidates, in which it is possible to achieve the more secure instances. Significantly, in the light of TSCM and the heuristic rule, we further expound that our designed neural cryptography outperforms TPM (the most secure model at present) on security. Finally, a series of numerical simulation experiments are provided to verify validity and applicability of our results.
Einstein-Podolsky-Rosen-steering swapping between two Gaussian multipartite entangled states
NASA Astrophysics Data System (ADS)
Wang, Meihong; Qin, Zhongzhong; Wang, Yu; Su, Xiaolong
2017-08-01
Multipartite Einstein-Podolsky-Rosen (EPR) steering is a useful quantum resource for quantum communication in quantum networks. It has potential applications in secure quantum communication, such as one-sided device-independent quantum key distribution and quantum secret sharing. By distributing optical modes of a multipartite entangled state to space-separated quantum nodes, a local quantum network can be established. Based on the existing multipartite EPR steering in a local quantum network, secure quantum communication protocol can be accomplished. In this manuscript, we present swapping schemes for EPR steering between two space-separated Gaussian multipartite entangled states, which can be used to connect two space-separated quantum networks. Two swapping schemes, including the swapping between a tripartite Greenberger-Horne-Zeilinger (GHZ) entangled state and an EPR entangled state and that between two tripartite GHZ entangled states, are analyzed. Various types of EPR steering are presented after the swapping of two space-separated independent multipartite entanglement states without direct interaction, which can be used to implement quantum communication between two quantum networks. The presented schemes provide technical reference for more complicated quantum networks with EPR steering.
NASA Astrophysics Data System (ADS)
Soelistijanto, B.; Muliadi, V.
2018-03-01
Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.