185 research outputs found

    Multipartite entanglement, quantum-error-correcting codes, and entangling power of quantum evolutions

    Full text link
    We investigate the average bipartite entanglement, over all possible divisions of a multipartite system, as a useful measure of multipartite entanglement. We expose a connection between such measures and quantum-error-correcting codes by deriving a formula relating the weight distribution of the code to the average entanglement of encoded states. Multipartite entangling power of quantum evolutions is also investigated.Comment: 13 pages, 1 figur

    Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme

    Get PDF
    RankSign [GRSZ14a] is a code-based signature scheme proposed to the NIST competition for quantum-safe cryptography [AGHRZ17] and, moreover, is a fundamental building block of a new Identity-Based-Encryption (IBE) [GHPT17a]. This signature scheme is based on the rank metric and enjoys remarkably small key sizes, about 10KBytes for an intended level of security of 128 bits. Unfortunately we will show that all the parameters proposed for this scheme in [AGHRZ17] can be broken by an algebraic attack that exploits the fact that the augmented LRPC codes used in this scheme have very low weight codewords. Therefore, without RankSign the IBE cannot be instantiated at this time. As a second contribution we will show that the problem is deeper than finding a new signature in rank-based cryptography, we also found an attack on the generic problem upon which its security reduction relies. However, contrarily to the RankSign scheme, it seems that the parameters of the IBE scheme could be chosen in order to avoid our attack. Finally, we have also shown that if one replaces the rank metric in the [GHPT17a] IBE scheme by the Hamming metric, then a devastating attack can be found

    Expression of drug transporters in the human skin: comparison in different species and models and its implication for drug development

    Get PDF
    It is clear that many drug transporters (both ABCs and SLCs) are present in the human skin. Different in vitro skin models can be used to investigate the role of drug transporters in the skin despite quantitative differences in expression profile across species. P-gp was shown to have an important influence on transdermal drug absorption in the skin and to function in “absorptive” transport, carrying substrate drugs from the skin surface to the dermis. This observation might be used to modulate drug distribution inside the skin. If drugs can be retained in the epidermis compartment by inhibition of the transporters, such property of the drug would be beneficial for treatment of dermatological diseases. Therefore, it might be feasible to control transdermal delivery of drugs to specific locations in the skin, by modulating the function of the transporters in the skin. We are at the dawn of an exciting period where drug transporters might be novel targets for improvement of drug delivery to the skin and for pharmacological intervention

    Two attacks on rank metric code-based schemes: RankSign and an IBE scheme

    Get PDF
    International audienceRankSign [29] is a code-based signature scheme proposed to the NIST competition for quantum-safe cryptography [5] and, moreover , is a fundamental building block of a new Identity-Based-Encryption (IBE) [25]. This signature scheme is based on the rank metric and enjoys remarkably small key sizes, about 10KBytes for an intended level of security of 128 bits. Unfortunately we will show that all the parameters proposed for this scheme in [5] can be broken by an algebraic attack that exploits the fact that the augmented LRPC codes used in this scheme have very low weight codewords. Therefore, without RankSign the IBE cannot be instantiated at this time. As a second contribution we will show that the problem is deeper than finding a new signature in rank-based cryptography, we also found an attack on the generic problem upon which its security reduction relies. However, contrarily to the RankSign scheme, it seems that the parameters of the IBE scheme could be chosen in order to avoid our attack. Finally, we have also shown that if one replaces the rank metric in the [25] IBE scheme by the Hamming metric, then a devastating attack can be found

    Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes

    Get PDF
    We present here a new family of trapdoor one-way Preimage Sampleable Functions (PSF) based on codes, the Wave-PSF family. The trapdoor function is one-way under two computational assumptions: the hardness of generic decoding for high weights and the indistinguishability of generalized (U,U+V)(U,U+V)-codes. Our proof follows the GPV strategy [GPV08]. By including rejection sampling, we ensure the proper distribution for the trapdoor inverse output. The domain sampling property of our family is ensured by using and proving a variant of the left-over hash lemma. We instantiate the new Wave-PSF family with ternary generalized (U,U+V)(U,U+V)-codes to design a "hash-and-sign" signature scheme which achieves existential unforgeability under adaptive chosen message attacks (EUF-CMA) in the random oracle model. For 128 bits of classical security, signature sizes are in the order of 15 thousand bits, the public key size in the order of 4 megabytes, and the rejection rate is limited to one rejection every 10 to 12 signatures.Comment: arXiv admin note: text overlap with arXiv:1706.0806

    ErbB3-ErbB2 Complexes as a Therapeutic Target in a Subset of Wild-type BRAF/NRAS Cutaneous Melanomas.

    Get PDF
    The treatment options remain limited for patients with melanoma who are wild-type for both BRAF and NRAS (WT/WT). We demonstrate that a subgroup of WT/WT melanomas display high basal phosphorylation of ErbB3 that is associated with autocrine production of the ErbB3 ligand neuregulin-1 (NRG1). In WT/WT melanoma cells displaying high levels of phospho-ErbB3, knockdown of NRG1 reduced cell viability and was associated with decreased phosphorylation of ErbB3, its coreceptor ErbB2, and its downstream target, AKT. Similar effects were observed by targeting ErbB3 with either siRNAs or the neutralizing ErbB3 monoclonal antibodies huHER3-8 and NG33. In addition, pertuzumab-mediated inhibition of ErbB2 heterodimerization decreased AKT phosphorylation, cell growth in vitro, and xenograft growth in vivo. Pertuzumab also potentiated the effects of MEK inhibitor on WT/WT melanoma growth in vitro and in vivo. These findings demonstrate that targeting ErbB3-ErbB2 signaling in a cohort of WT/WT melanomas leads to tumor growth reduction. Together, these studies support the rationale to target the NRG1-ErbB3-ErbB2 axis as a novel treatment strategy in a subset of cutaneous melanomas

    Remodelling of human atrial K+ currents but not ion channel expression by chronic β-blockade

    Get PDF
    Chronic β-adrenoceptor antagonist (β-blocker) treatment in patients is associated with a potentially anti-arrhythmic prolongation of the atrial action potential duration (APD), which may involve remodelling of repolarising K+ currents. The aim of this study was to investigate the effects of chronic β-blockade on transient outward, sustained and inward rectifier K+ currents (ITO, IKSUS and IK1) in human atrial myocytes and on the expression of underlying ion channel subunits. Ion currents were recorded from human right atrial isolated myocytes using the whole-cell-patch clamp technique. Tissue mRNA and protein levels were measured using real time RT-PCR and Western blotting. Chronic β-blockade was associated with a 41% reduction in ITO density: 9.3 ± 0.8 (30 myocytes, 15 patients) vs 15.7 ± 1.1 pA/pF (32, 14), p < 0.05; without affecting its voltage-, time- or rate dependence. IK1 was reduced by 34% at −120 mV (p < 0.05). Neither IKSUS, nor its increase by acute β-stimulation with isoprenaline, was affected by chronic β-blockade. Mathematical modelling suggested that the combination of ITO- and IK1-decrease could result in a 28% increase in APD90. Chronic β-blockade did not alter mRNA or protein expression of the ITO pore-forming subunit, Kv4.3, or mRNA expression of the accessory subunits KChIP2, KChAP, Kvβ1, Kvβ2 or frequenin. There was no reduction in mRNA expression of Kir2.1 or TWIK to account for the reduction in IK1. A reduction in atrial ITO and IK1 associated with chronic β-blocker treatment in patients may contribute to the associated action potential prolongation, and this cannot be explained by a reduction in expression of associated ion channel subunits

    Clinical Practice Guidelines for Childbearing Female Candidates for Bariatric Surgery, Pregnancy, and Post-partum Management After Bariatric Surgery

    Get PDF
    Emerging evidence suggests that bariatric surgery improves pregnancy outcomes of women with obesity by reducing the rates of gestational diabetes, pregnancy-induced hypertension, and macrosomia. However, it is associated with an increased risk of a small-for-gestational-age fetus and prematurity. Based on the work of a multidisciplinary task force, we propose clinical practice recommendations for pregnancy management following bariatric surgery. They are derived from a comprehensive review of the literature, existing guidelines, and expert opinion covering the preferred type of surgery for women of childbearing age, timing between surgery and pregnancy, contraception, systematic nutritional support and management of nutritional deficiencies, screening and management of gestational diabetes, weight gain during pregnancy, gastric banding management, surgical emergencies, obstetrical management, and specific care in the postpartum period and for newborns

    In situ probing of the present-day zircon-bearing magma chamber at Krafla, Northeastern Iceland

    Get PDF
    Active felsic magmatism has been rarely probed in situ by drilling but one recent exception is quenched rhyolite sampled during the 2009 Iceland Deep Drilling Project (IDDP). We report finding of rare zircons of up to ∼100 µm in size in rhyolite glasses from the IDDP-1 well products and the host 1724 AD Viti granophyres. The applied SHRIMP U-Th dating for both the IDDP and the Viti granophyre zircons gives zero-age (±2 kyr), and therefore suggests that the IDDP-1 zircons have crystallized from an active magma intrusion rather than due to the 20–80 ka post-caldera magmatic episodes recorded by nearby domes and ridges. Ti-in-zircon geothermometer for Viti granophyre reveals zircon crystallization temperatures ∼800°C–900°C, whereas IDDP-1 rhyolite zircon cores show Ti content higher than 100 ppm, corresponding to temperatures up to ∼1,100°C according to the Ti-in-zircon thermometer. According to our thermochemical model at such elevated temperatures as 1,100°C, rhyolitic magma cannot be saturated with zircon and zircon crystallization is not possible. We explain this controversy by either kinetic effects or non-ideal Ti incorporation into growing zircons at low pressures that start to grow from nucleus at temperatures ∼930°C. High temperatures recorded by IDDP-1 zircon together with an occurrence of baddeleyite require that the rhyolite magma formed by partial melting of the host granophyre due to basaltic magma intrusion. Zr concentration profiles in glass around zircons are flat, suggesting residence in rhyolitic melt for >4 years. In our thermochemical modeling, three scenarios are considered. The host felsite rocks are intruded by: 1) a basaltic sill, 2) rhyolite magma 3) rhyolite sill connected to a deeper magmatic system. Based on the solution of the heat conduction equation accounting for the release of latent heat and effective thermal conductivity, these data confirm that the rhyolite magma could be produced by felsic crust melting as a result of injection of a basaltic or rhyolite sill during the Krafla Fires eruption (1975 AD)

    An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric

    Get PDF
    The use of rank instead of Hamming metric has been proposed to address the main drawback of code-based cryptography: large key sizes. There exist several Key Encapsulation Mechanisms (KEM) and Public Key Encryption (PKE) schemes using rank metric including some submissions to the NIST call for standardization of Post-Quantum Cryptography. In this work, we present an IND-CCA PKE scheme based on the McEliece adaptation to rank metric proposed by Loidreau at PQC 2017. This IND-CCA PKE scheme based on rank metric does not use a hybrid construction KEM + symmetric encryption. Instead, we take advantage of the bigger message space obtained by the different parameters chosen in rank metric, being able to exchange multiple keys in one ciphertext. Our proposal is designed considering some specific properties of the random error generated during the encryption. We prove our proposal IND-CCA-secure in the QROM by using a security notion called disjoint simulatability introduced by Saito et al. in Eurocrypt 2018. Moreover, we provide security bounds by using the semi-oracles introduced by Ambainis et al
    corecore