1,269 research outputs found

    Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications

    Get PDF
    We devise new techniques for design and analysis of efficient lattice-based zero-knowledge proofs (ZKP). First, we introduce one-shot proof techniques for non-linear polynomial relations of degree k≥2k\ge 2, where the protocol achieves a negligible soundness error in a single execution, and thus performs significantly better in both computation and communication compared to prior protocols requiring multiple repetitions. Such proofs with degree k≥2k\ge 2 have been crucial ingredients for important privacy-preserving protocols in the discrete logarithm setting, such as Bulletproofs (IEEE S&P \u2718) and arithmetic circuit arguments (EUROCRYPT \u2716). In contrast, one-shot proofs in lattice-based cryptography have previously only been shown for the linear case (k=1k=1) and a very specific quadratic case (k=2k=2), which are obtained as a special case of our technique. Moreover, we introduce two speedup techniques for lattice-based ZKPs: a CRT-packing technique supporting ``inter-slot\u27\u27 operations, and ``NTT-friendly\u27\u27 tools that permit the use of fully-splitting rings. The former technique comes at almost no cost to the proof length, and the latter one barely increases it, which can be compensated for by tweaking the rejection sampling parameters while still having faster computation overall. To illustrate the utility of our techniques, we show how to use them to build efficient relaxed proofs for important relations, namely proof of commitment to bits, one-out-of-many proof, range proof and set membership proof. Despite their relaxed nature, we further show how our proof systems can be used as building blocks for advanced cryptographic tools such as ring signatures. Our ring signature achieves a dramatic improvement in length over all the existing proposals from lattices at the same security level. The computational evaluation also shows that our construction is highly likely to outperform all the relevant works in running times. Being efficient in both aspects, our ring signature is particularly suitable for both small-scale and large-scale applications such as cryptocurrencies and e-voting systems. No trusted setup is required for any of our proposals

    Metastatic breast carcinoma mimicking a sebaceous gland neoplasm: a case report

    Get PDF
    <p>Abstract</p> <p>Introduction</p> <p>Breast cancer is common in women and its metastases involve the skin in approximately one quarter of patients. Accordingly, metastatic breast cancer shown to be cutaneous through histology must be distinguished from a wide variety of other neoplasms as well as the diverse morphologic variants of breast cancer itself.</p> <p>Case presentation</p> <p>We report the case of a 61-year-old Caucasian woman with cutaneous metastases of a bilateral ductal breast carcinoma that in histopathological examination mimicked an adnexal neoplasm with sebaceous differentiation.</p> <p>Conclusion</p> <p>Against the background of metastatic breast carcinoma, dermatopathological considerations of sebaceous differentiation of skin lesions are presented and discussed focusing on the rare differential diagnosis of sebaceous carcinoma of the breast.</p

    The Conserved Tarp Actin Binding Domain Is Important for Chlamydial Invasion

    Get PDF
    The translocated actin recruiting phosphoprotein (Tarp) is conserved among all pathogenic chlamydial species. Previous reports identified single C. trachomatis Tarp actin binding and proline rich domains required for Tarp mediated actin nucleation. A peptide antiserum specific for the Tarp actin binding domain was generated and inhibited actin polymerization in vitro and C. trachomatis entry in vivo, indicating an essential role for Tarp in chlamydial pathogenesis. Sequence analysis of Tarp orthologs from additional chlamydial species and C. trachomatis serovars indicated multiple putative actin binding sites. In order to determine whether the identified actin binding domains are functionally conserved, GST-Tarp fusions from multiple chlamydial species were examined for their ability to bind and nucleate actin. Chlamydial Tarps harbored variable numbers of actin binding sites and promoted actin nucleation as determined by in vitro polymerization assays. Our findings indicate that Tarp mediated actin binding and nucleation is a conserved feature among diverse chlamydial species and this function plays a critical role in bacterial invasion of host cells

    The Occurrence of Photorhabdus-Like Toxin Complexes in Bacillus thuringiensis

    Get PDF
    Recently, genomic sequencing of a Bacillus thuringiensis (Bt) isolate from our collection revealed the presence of an apparent operon encoding an insecticidal toxin complex (Tca) similar to that first described from the entomopathogen Photorhabdus luminescens. To determine whether these genes are widespread among Bt strains, we screened isolates from the collection for the presence of tccC, one of the genes needed for the expression of fully functional toxin complexes. Among 81 isolates chosen to represent commonly encountered biochemical phenotypes, 17 were found to possess a tccC. Phylogenetic analysis of the 81 isolates by multilocus sequence typing revealed that all the isolates possessing a tccC gene were restricted to two sequence types related to Bt varieties morrisoni, tenebrionis, israelensis and toumanoffi. Sequencing of the ∼17 kb tca operon from two isolates representing each of the two sequence types revealed >99% sequence identity. Optical mapping of DNA from Bt isolates representing each of the sequence types revealed nearly identical plasmids of ca. 333 and 338 kbp, respectively. Selected isolates were found to be toxic to gypsy moth larvae, but were not as effective as a commercial strain of Bt kurstaki. Some isolates were found to inhibit growth of Colorado potato beetle. Custom Taqman® relative quantitative real-time PCR assays for Tc-encoding Bt revealed both tcaA and tcaB genes were expressed within infected gypsy moth larvae

    Ecosystem Overfishing in the Ocean

    Get PDF
    Fisheries catches represent a net export of mass and energy that can no longer be used by trophic levels higher than those fished. Thus, exploitation implies a depletion of secondary production of higher trophic levels (here the production of mass and energy by herbivores and carnivores in the ecosystem) due to the removal of prey. The depletion of secondary production due to the export of biomass and energy through catches was recently formulated as a proxy for evaluating the ecosystem impacts of fishing–i.e., the level of ecosystem overfishing. Here we evaluate the historical and current risk of ecosystem overfishing at a global scale by quantifying the depletion of secondary production using the best available fisheries and ecological data (i.e., catch and primary production). Our results highlight an increasing trend in the number of unsustainable fisheries (i.e., an increase in the risk of ecosystem overfishing) from the 1950s to the 2000s, and illustrate the worldwide geographic expansion of overfishing. These results enable to assess when and where fishing became unsustainable at the ecosystem level. At present, total catch per capita from Large Marine Ecosystems is at least twice the value estimated to ensure fishing at moderate sustainable levels

    Evolvable Neuronal Paths: A Novel Basis for Information and Search in the Brain

    Get PDF
    We propose a previously unrecognized kind of informational entity in the brain that is capable of acting as the basis for unlimited hereditary variation in neuronal networks. This unit is a path of activity through a network of neurons, analogous to a path taken through a hidden Markov model. To prove in principle the capabilities of this new kind of informational substrate, we show how a population of paths can be used as the hereditary material for a neuronally implemented genetic algorithm, (the swiss-army knife of black-box optimization techniques) which we have proposed elsewhere could operate at somatic timescales in the brain. We compare this to the same genetic algorithm that uses a standard ‘genetic’ informational substrate, i.e. non-overlapping discrete genotypes, on a range of optimization problems. A path evolution algorithm (PEA) is defined as any algorithm that implements natural selection of paths in a network substrate. A PEA is a previously unrecognized type of natural selection that is well suited for implementation by biological neuronal networks with structural plasticity. The important similarities and differences between a standard genetic algorithm and a PEA are considered. Whilst most experiments are conducted on an abstract network model, at the conclusion of the paper a slightly more realistic neuronal implementation of a PEA is outlined based on Izhikevich spiking neurons. Finally, experimental predictions are made for the identification of such informational paths in the brain

    Alcohol and HIV Disease Progression: Weighing the Evidence

    Get PDF
    Heavy alcohol use is commonplace among HIV-infected individuals; however, the extent that alcohol use adversely impacts HIV disease progression has not been fully elucidated. Fairly strong evidence suggests that heavy alcohol consumption results in behavioral and biological processes that likely increase HIV disease progression, and experimental evidence of the biological effect of heavy alcohol on simian immunodeficiency virus in macaques is quite suggestive. However, several observational studies of the effect of heavy alcohol consumption on HIV progression conducted in the 1990s found no association of heavy alcohol consumption with time to AIDS diagnosis, while some more recent studies showed associations of heavy alcohol consumption with declines of CD4 cell counts and nonsuppression of HIV viral load. We discuss several plausible biological and behavioral mechanisms by which alcohol may cause HIV disease progression, evidence from prospective observational human studies, and suggest future research to further illuminate this important issue
    • …
    corecore