394 research outputs found

    New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs

    Get PDF
    Evolving secret-sharing schemes, defined by Komargodski, Naor, and Yogev [TCC 2016B, IEEE Trans. on Info. Theory 2018], are secret-sharing schemes in which there is no a-priory bound on the number of parties. In such schemes, parties arrive one by one; when a party arrives, the dealer gives it a share and cannot update this share in later stages. The requirement is that some predefined sets (called authorized sets) should be able to reconstruct the secret, while other sets should learn no information on the secret. The collection of authorized sets that can reconstruct the secret is called an evolving access structure. The challenge of the dealer is to be able to give short shares to the the current parties without knowing how many parties will arrive in the future. The requirement that the dealer cannot update shares is designed to prevent expensive updates. Komargodski et al. constructed an evolving secret-sharing scheme for every monotone evolving access structure; the share size of the ttht^{\text{th}} party in this scheme is 2t12^{t-1}. Recently, Mazor [ITC 2023] proved that evolving secret-sharing schemes require exponentially-long shares for some evolving access structure, namely shares of size 2to(t)2^{t-o(t)}.In light of these results, our goal is to construct evolving secret-sharing schemes with non-trivial share size for wide classes of evolving access structures; e.g., schemes with share size 2ct2^{ct} for c<1c<1 or even polynomial size. We provide several results achieving this goal: -We define layered infinite branching programs representing evolving access structures, show how to transform them into generalized infinite decision trees, and show how to construct evolving secret-sharing schemes for generalized infinite decision trees. Combining these steps, we get a secret-sharing scheme realizing the evolving access structure. As an application of this framework, we construct an evolving secret-sharing scheme with non-trivial share size for access structures that can be represented by layered infinite branching programs with width at layer tt of at most 20.15t2^{0.15t}. If the width is polynomial, then we get an evolving secret-sharing scheme with quasi-polynomial share size. -We construct efficient evolving secret-sharing schemes for dynamic-threshold access structures with high dynamic-threshold and for infinite 22 slice and 33-slice access structures. The share size of the ttht^{\text{th}} party in these schemes is 2O~((logt)1/2+ϵ)2^{\tilde{O}((\log t)^{1/\sqrt{2}+\epsilon})} for any constant ϵ>0\epsilon>0, which is comparable to the best-known share size of 2O~((logt)1/2))2^{\tilde{O}((\log t)^{1/2}))} for finite 22-slice and 3-slice access structures. -We prove lower bounds on the share size of evolving secret-sharing schemes for infinite kk-hypergraph access structures and for infinite directed st-connectivity access structures. As a by-product of the lower bounds, we provide the first non-trivial lower bound for finite directed st-connectivity access structures for general secret-sharing schemes

    Slow rupture of frictional interfaces

    Full text link
    The failure of frictional interfaces and the spatiotemporal structures that accompany it are central to a wide range of geophysical, physical and engineering systems. Recent geophysical and laboratory observations indicated that interfacial failure can be mediated by slow slip rupture phenomena which are distinct from ordinary, earthquake-like, fast rupture. These discoveries have influenced the way we think about frictional motion, yet the nature and properties of slow rupture are not completely understood. We show that slow rupture is an intrinsic and robust property of simple non-monotonic rate-and-state friction laws. It is associated with a new velocity scale cminc_{min}, determined by the friction law, below which steady state rupture cannot propagate. We further show that rupture can occur in a continuum of states, spanning a wide range of velocities from cminc_{min} to elastic wave-speeds, and predict different properties for slow rupture and ordinary fast rupture. Our results are qualitatively consistent with recent high-resolution laboratory experiments and may provide a theoretical framework for understanding slow rupture phenomena along frictional interfaces.Comment: 6 pages, 4 figures, 1 table (Supplementary material: 5 pages, 2 figures

    Metabolic networking in Brunfelsia calycina petals after flower opening

    Get PDF
    Brunfelsia calycina flowers change colour from purple to white due to anthocyanin degradation, parallel to an increase in fragrance and petal size. Here it was tested whether the production of the fragrant benzenoids is dependent on induction of the shikimate pathway, or if they are formed from the anthocyanin degradation products. An extensive characterization of the events taking place in Brunfelsia flowers is presented. Anthocyanin characterization was performed using ultraperfomance liquid chromatography–quadrupole time of flight–tandem mass specrometry (UPLC-QTOF-MS/MS). Volatiles emitted were identified by headspace solid phase microextraction–gas chromatography–mass spectrometry (HS-SPME-GC-MS). Accumulated proteins were identified by 2D gel electrophoresis. Transcription profiles were characterized by cross-species hybridization of Brunfelsia cDNAs to potato cDNA microarrays. Identification of accumulated metabolites was performed by UPLC-QTOF-MS non-targeted metabolite analysis. The results include characterization of the nine main anthocyanins in Brunfelsia flowers. In addition, 146 up-regulated genes, 19 volatiles, seven proteins, and 17 metabolites that increased during anthocyanin degradation were identified. A multilevel analysis suggests induction of the shikimate pathway. This pathway is the most probable source of the phenolic acids, which in turn are precursors of both the benzenoid and lignin production pathways. The knowledge obtained is valuable for future studies on degradation of anthocyanins, formation of volatiles, and the network of secondary metabolism in Brunfelsia and related species

    Comparative effectiveness of intensity modulated radiation therapy to 3-dimensional conformal radiation in locally advanced lung cancer: pathological and clinical outcomes.

    Get PDF
    OBJECTIVE: Intensity-modulated radiotherapy (IMRT) has better normal-tissue sparing compared with 3-dimensional conformal radiation (3DCRT). We sought to assess the impact of radiation technique on pathological and clinical outcomes in locally advanced non-small cell lung cancer (LANSCLC) treated with a trimodality strategy. METHODS: Retrospective review of LANSCLC patients treated from August 2012 to August 2018 at Sheba Medical Center, Israel. The trimodality strategy consisted of concomitant chemoradiation to 60 Gray (Gy) followed by completion surgery. The planning target volume (PTV) was defined by co-registered PET/CT. Here we compare the pathological regression, surgical margin status, local control rates (LC), disease free (DFS) and overall survival (OS) between 3DCRT and IMRT. RESULTS: Our cohort consisted of 74 patients with mean age 62.9 years, male in 51/74 (69%), adenocarcinoma in 46/74 (62.1%), stage 3 in 59/74 (79.7%) and chemotherapy in 72/74 (97.3%). Radiation mean dose: 59.2 Gy (SD ± 3.8). Radiation technique : 3DCRT in 51/74 (68.9%), IMRT in 23/74 (31%). Other variables were similar between groups.Major pathological response (including pathological complete response or less than 10% residual tumor cells) was similar: 32/51 (62.7%) in 3DCRT and 15/23 (65.2%) in IMRT, p=0.83. Pathological complete response (pCR) rates were similar: 17/51 (33.3%) in 3DCRT and 8/23 (34.8%) in IMRT, p=0.9. Surgical margins were negative in 46/51 (90.1%) in 3DCRT vs. 17/19 (89.4%) in IMRT (p=1.0).The 2-year LC rates were 81.6% (95% CI 69-89.4%); DFS 58.3% (95% CI 45.5-69%) and 3-year OS 70% (95% CI57-80%). Comparing radiation techniques, there were no significant differences in LC (p=0.94), DFS (p=0.33) and OS (p=0.72). CONCLUSION: When used to treat LANSCLC in the neoadjuvant setting, both IMRT and 3DCRT produce comparable pathological and clinical outcomes. ADVANCES IN KNOWLEDGE: This study validates the real-world effectiveness of IMRT compared to 3DCRT

    Comparison of Short- and Long-Term Effectiveness between Anti-TNF and Ustekinumab after Vedolizumab Failure as First-Line Therapy in Crohn's Disease: A Multi-Center Retrospective Cohort Study

    Get PDF
    BACKGROUND The effectiveness of anti-TNF or ustekinumab (UST) as a second-line biologic after vedolizumab (VDZ) failure has not yet been described. AIMS AND METHODS In this retrospective multicenter cohort study, We aim to investigate the effectiveness of anti-TNF and UST as second-line therapy in patients with Crohn's disease (CD) who failed VDZ as a first-line treatment. The primary outcome was clinical response at week 16-22. Secondary outcomes included the rates of clinical remission, steroid-free clinical remission, CRP normalization, and adverse events. RESULTS Fifty-nine patients who failed on VDZ as a first-line treatment for CD were included; 52.8% patients received anti-TNF and 47.2% UST as a second-line therapy. In initial period (Week 16-22), the clinical response and remission rate was similar between both groups: 61.2% vs. 68%, p = 0.8 and 48.3% vs. 56%, p = 0.8 on anti-TNF and UST therapy, respectively. Furthermore, in the maintenance period the rate was similar: 75% vs. 82.3%, p = 0.8 and 62.5% vs. 70.5%, p = 0.8, respectively. Of the patients, 12 out of the 59 stopped the therapy, without a significant difference between the two groups (p = 0.6). CONCLUSION Second-line biological therapy after VDZ failure therapy was effective in >60% of the patients with CD. No differences in effectiveness were detected between the use of anti-TNF and UST as a second line

    CHiME-6 Challenge:Tackling Multispeaker Speech Recognition for Unsegmented Recordings

    Get PDF
    Following the success of the 1st, 2nd, 3rd, 4th and 5th CHiME challenges we organize the 6th CHiME Speech Separation and Recognition Challenge (CHiME-6). The new challenge revisits the previous CHiME-5 challenge and further considers the problem of distant multi-microphone conversational speech diarization and recognition in everyday home environments. Speech material is the same as the previous CHiME-5 recordings except for accurate array synchronization. The material was elicited using a dinner party scenario with efforts taken to capture data that is representative of natural conversational speech. This paper provides a baseline description of the CHiME-6 challenge for both segmented multispeaker speech recognition (Track 1) and unsegmented multispeaker speech recognition (Track 2). Of note, Track 2 is the first challenge activity in the community to tackle an unsegmented multispeaker speech recognition scenario with a complete set of reproducible open source baselines providing speech enhancement, speaker diarization, and speech recognition modules

    Intergroup Dialogue as a Just Dialogue: Challenging and Preventing Normalization in Campus Dialogues

    Full text link
    The tensions from the Israeli occupation of Palestine reach around the globe and heated debates over the struggles of these two peoples are evident on U.S. college campuses. The power imbalance represented in the relationship between Palestinians and Israelis is replicated on college campuses. BDS (Boycott, Divestment, and Sanctions) is a response to this inequality, is a movement to end the occupation, and has raised the issue of normalization. Teaching about this conflict presents particular challenges for faculty who negotiate this highly contested issue in classrooms or campus communities, and intergroup dialogue is an important pedagogy that can be used. It is critical to address normalization in intergroup dialogue. We discuss examples and themes of normalization in intergroup dialogue, and present pedagogical and other strategies to prevent and address normalization in intergroup dialogue and in other similar intergroup contact approaches with Arab or Palestinian and Jewish or Israeli participants.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/116007/1/dome12067.pd
    corecore