172 research outputs found

    A paradox of immunodeficiency and inflammation in human aging: lessons learned from apoptosis

    Get PDF
    Aging is associated with a paradox of immunodeficiency and inflammation (an evidence of hyperactive immune system). Apoptosis is associated with cellular depletion and suppression of inflammatory response. In this brief review, we will present evidence for the role of increased apoptosis in immunodeficiency and paradoxical increased inflammation associated with human aging. In particular, a role of apoptotic cells in failure to generate anti-inflammatory responses and directly activating inflammatory responses will be discussed

    Freshwater oligochaetes of India: A review

    Get PDF
    The present review deals with freshwater oligochaetes of India which records the presence of 102 species of freshwater oligochaetes belonging to 17 genera and 4 families. Besides this, a brief description of their global and Indian distribution has also been made along with their ecology, morphology of typical oligochaetes methods of their collection and preparation for taxonomic study has also been given. A thorough survey of various states is needed for the distribution of oligochaetes systematically

    Age-associated epigenetic modifications in human DNA increase its immunogenicity

    Get PDF
    Chronic inflammation, increased reactivity to self-antigens and incidences of cancer are hallmarks of aging. However, the underlying mechanisms are not well understood. Age-associated alterations in the DNA either due to oxidative damage, defects in DNA repair or epigenetic modifications such as methylation that lead to mutations and changes in the expression of genes are thought to be partially responsible. Here we report that epigenetic modifications in aged DNA also increase its immunogenicity rendering it more reactive to innate immune system cells such as the dendritic cells. We observed increased upregulation of costimulatory molecules as well as enhanced secretion of IFN-α from dendritic cells in response to DNA from aged donors as compared to DNA from young donors when it was delivered intracellularly via Lipofectamine. Investigations into the mechanisms revealed that DNA from aged subjects is not degraded, neither is it more damaged compared to DNA from young subjects. However, there is significantly decreased global level of methylation suggesting that age-associated hypomethylation of the DNA may be the cause of its increased immunogenicity. Increased immunogenicity of self DNA may thus be another mechanism that may contribute to the increase in age-associated chronic inflammation, autoimmunity and cancer

    Strategy Formulation for Performance Improvement of Indian Corrugated Industry: An Application of SWOT Analysis and QSPM Matrix

    Get PDF
    Strategy formulation and implementation is one of the most important tasks that managers in every organization need to perform. This process has emerged with a range of approaches that enjoyed different levels of support and recognition over time. But, somehow in Indian unorganized SMEs, it has not been applied effectively. The aim of the present study is to develop an appropriate strategy for Indian corrugated firms. To reach this object, the study suggests SWOT analysis along with QSPM and SPACE matrix. Vast literature survey was done to explore different factors for SWOT Analysis and then the weight and importance of each factor was defined by using Focus Group approach. Based on the inputs given by experts during focus group session, EFE and IFE matrixes were developed. The result of SPACE matrix showed that aggressive strategies are required to pursue. The QSPM after analysis resulted in to selection of “Development of R&D Department” strategy with score of 4.06. This proposed strategy is very much beneficial for corrugated industry as the whole possibility of success is based on customization aiming more space in minimum dimensions at best quality and price

    Dendritic cells in inborn errors of immunity

    Get PDF
    Dendritic cells (DCs) are crucial cells for initiating and maintaining immune response. They play critical role in homeostasis, inflammation, and autoimmunity. A number of molecules regulate their functions including synapse formation, migration, immunity, and induction of tolerance. A number of IEI are characterized by mutations in genes encoding several of these molecules resulting in immunodeficiency, inflammation, and autoimmunity in IEI. Currently, there are 465 Inborn errors of immunity (IEI) that have been grouped in 10 different categories. However, comprehensive studies of DCs have been reported in only few IEI. Here we have reviewed biology of DCs in IEI classified according to recently published IUIS classification. We have reviewed DCs in selected IEI in each group category and discussed in depth changes in DCs where significant data are available regarding role of DCs in clinical and immunological manifestations. These include severe immunodeficiency diseases, antibody deficiencies, combined immunodeficiency with associated and syndromic features, especially disorders of synapse formation, and disorders of immune regulation

    Editorial: Women in aging and the immune system

    Get PDF

    Multi-Input Attribute Based Encryption and Predicate Encryption

    Get PDF
    Motivated by several new and natural applications, we initiate the study of multi-input predicate encryption (miPE{\sf miPE}) and further develop multi-input attribute based encryption (miABE{\sf miABE}). Our contributions are: 1. Formalizing Security: We provide definitions for miABE{\sf miABE} and miPE{\sf miPE} in the {symmetric} key setting and formalize security in the standard indistinguishability (IND) paradigm, against unbounded collusions. 2. Two-input ABE{\sf ABE} for NC1{\sf NC}_1 from LWE{\sf LWE} and Pairings: We provide the first constructions for two-input key-policy ABE{\sf ABE} for NC1{\sf NC}_1 from LWE{\sf LWE} and pairings. Our construction leverages a surprising connection between techniques recently developed by Agrawal and Yamada (Eurocrypt, 2020) in the context of succinct single-input ciphertext-policy ABE{\sf ABE}, to the seemingly unrelated problem of two-input key-policy ABE{\sf ABE}. Similarly to Agrawal-Yamada, our construction is proven secure in the bilinear generic group model. By leveraging inner product functional encryption and using (a variant of) the KOALA knowledge assumption, we obtain a construction in the standard model analogously to Agrawal, Wichs and Yamada (TCC, 2020). 3. Heuristic two-input ABE{\sf ABE} for P{\sf P} from Lattices: We show that techniques developed for succinct single-input ciphertext-policy ABE{\sf ABE} by Brakerski and Vaikuntanathan (ITCS 2022) can also be seen from the lens of miABE{\sf miABE} and obtain the first two-input key-policy ABE{\sf ABE} from lattices for P{\sf P}. 4. Heuristic three-input ABE{\sf ABE} and PE{\sf PE} for NC1{\sf NC}_1 from Pairings and Lattices: We obtain the first three-input ABE{\sf ABE} for NC1{\sf NC}_1 by harnessing the powers of both the Agrawal-Yamada and the Brakerski-Vaikuntanathan constructions. 5. Multi-input ABE{\sf ABE} to multi-input PE{\sf PE} via Lockable Obfuscation: We provide a generic compiler that lifts multi-input ABE{\sf ABE} to multi-input PE{\sf PE} by relying on the hiding properties of Lockable Obfuscation (LO{\sf LO}) by Wichs-Zirdelis and Goyal-Koppula-Waters (FOCS 2018), which can be based on LWE{\sf LWE}. Our compiler generalizes such a compiler for single-input setting to the much more challenging setting of multiple inputs. By instantiating our compiler with our new two and three-input ABE{\sf ABE} schemes, we obtain the first constructions of two and three-input PE{\sf PE} schemes. Our constructions of multi-input ABE{\sf ABE} provide the first improvement to the compression factor of non-trivially exponentially efficient Witness Encryption defined by Brakerski et al. (SCN 2018) without relying on compact functional encryption or indistinguishability obfuscation. We believe that the unexpected connection between succinct single-input ciphertext-policy ABE{\sf ABE} and multi-input key-policy ABE{\sf ABE} may lead to a new pathway for witness encryption

    Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums

    Get PDF
    Recently, Abdalla, Gong and Wee (Crypto 2020) provided the first functional encryption scheme for attribute-weighted sums (AWS), where encryption takes as input NN (unbounded) attribute-value pairs {xi,zi}I[N]\{\vec{x}_i, \vec{z}_i\}_{I \in [N]} where xi\vec{x}_i is public and zi\vec{z}_i is private, the secret key is associated with an arithmetic branching programs ff, and decryption returns the weighted sum i[N]f(xi)zi{\sum}_{{i \in [N]}} f(\vec{x}_i)^\top \vec{z}_i, leaking no additional information about the zi\vec{z}_i\u27s. We extend FE for AWS to the significantly more challenging multi-party setting and provide the first construction for {\it attribute-based} multi-input FE (MIFE) supporting AWS. For i[n]i \in [n], encryptor ii can choose an attribute yi\vec{y}_i together with AWS input {xi,j,zi,j}\{\vec{x}_{i,j}, \vec{z}_{i,j}\} where j[Ni]j \in [N_i] and NiN_i is unbounded, the key generator can choose an access control policy gig_i along with its AWS function hih_i for each i[n]i \in [n], and the decryptor can compute i[n]j[Ni]hi(xi,j)zi,j iff gi(yi)=0 for all i[n]\sum_{i \in [n]}\sum_{j \in [N_{i}]}h_{i}(\vec{x}_{i,j})^{\top}\vec{z}_{i,j} \text{ iff } g_{i}(\vec{y}_{i}) =0 \text{ for all } i \in [n] Previously, the only known attribute based MIFE was for the inner product functionality (Abdalla et al.~Asiacrypt 2020), where additionally, yi\vec{y}_i had to be fixed during setup and must remain the same for all ciphertexts in a given slot. Our attribute based MIFE implies the notion of multi-input {\it attribute based encryption} (\miabe) recently studied by Agrawal, Yadav and Yamada (Crypto 2022) and Francati, Friolo, Malavolta and Venturi (Eurocrypt 2023), for a conjunction of predicates represented as arithmetic branching programs (ABP). Along the way, we also provide the first constructions of multi-client FE (MCFE) and dynamic decentralized FE (DDFE) for the AWS functionality. Previously, the best known MCFE and DDFE schemes were for inner products (Chotard et al.~ePrint 2018, Abdalla, Benhamouda and Gay, Asiacrypt 2019, and Chotard et al.~Crypto 2020). Our constructions are based on pairings and proven selectively secure under the matrix DDH assumption

    Ovol1 regulates the growth arrest of embryonic epidermal progenitor cells and represses c-myc transcription

    Get PDF
    Transcriptional control plays a key role in regulating epidermal proliferation and differentiation. Although ample information has been obtained on how epidermal homeostasis is controlled in adult skin, less is known about the control of proliferation/differentiation of epidermal stem/progenitor cells in the developing embryo. Ovol1, encoding a zinc finger protein homologous to Drosophila melanogaster Ovo, is expressed in embryonic epidermal progenitor cells that are transiting from proliferation to terminal differentiation. In this study, we demonstrate a function for Ovol1 in interfollicular epidermal development. In its absence, developing epidermis fails to properly restrict the proliferative potential of progenitor cells, and cultured keratinocytes fail to efficiently undergo growth arrest in response to extrinsic growth-inhibitory signals. We present molecular evidence that c-myc expression is up-regulated in Ovol1-deficient suprabasal cells and that Ovol1 represses c-myc transcription by directly binding to its promoter. Collectively, our findings indicate that Ovol1 is required for proliferation exit of committed epidermal progenitor cells and identify c-myc as an Ovol1 target
    corecore