627 research outputs found

    Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions

    Get PDF
    We revisit the notion of Decentralized Traceable Attribute-Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions: Firstly, we provide a new stronger security model which circumvents some shortcomings in existing models. Our model minimizes the trust placed in attribute authorities and hence provides, among other things, a stronger definition for non-frameability. In addition, our model captures the notion of tracing soundness which is important for many applications of the primitive. Secondly, we provide a generic construction that is secure w.r.t. our strong security model and show two example instantiations in the standard model which are more efficient than existing constructions (secure under weaker security definitions). Finally, we dispense with the need for the expensive zero-knowledge proofs required for proving tracing correctness by the tracing authority. As a result, tracing a signature in our constructions is significantly more efficient than existing constructions, both in terms of the size of the tracing proof and the computational cost required to generate and verify it. For instance, verifying tracing correctness in our constructions requires only 4 pairings compared to 34 pairings in the most efficient existing construction

    Who died as a result of the tsunami? – Risk factors of mortality among internally displaced persons in Sri Lanka: a retrospective cohort analysis

    Get PDF
    BACKGROUND: Describing adverse health effects and identifying vulnerable populations during and after a disaster are important aspects of any disaster relief operation. This study aimed to describe the mortality and related risk factors which affected the displaced population over a period of two and a half months after the 2004 Indian Ocean tsunami in an eastern coastal district of Sri Lanka. METHODS: A cross-sectional household survey was conducted in 13 evacuation camps for internally displaced persons (IDP). Information on all pre-tsunami family members was collected from householders, and all deaths which occurred during the recall period (77 to 80 days starting from the day of the tsunami) were recorded. The distribution of mortality and associated risk factors were analysed. Logistic regression modelling using the generalized estimating equations method was applied in multivariate analysis. RESULTS: Overall mortality rate out of 3,533 individuals from 859 households was 12.9% (446 deaths and 11 missing persons). The majority of the deaths occurred during and immediately after the disaster. A higher mortality was observed among females (17.5% vs. 8.2% for males, p < 0.001), children and the elderly (31.8%, 23.7% and 15.3% for children aged less than 5 years, children aged 5 to 9 years and adults over 50 years, respectively, compared with 7.4% for adults aged 20 to 29 years, p < 0.001). Other risk factors, such as being indoors at the time of the tsunami (13.8% vs. 5.9% outdoors, p < 0.001), the house destruction level (4.6%, 5.5% and 14.2% in increasing order of destruction, p < 0.001) and fishing as an occupation (15.4% vs. 11.2% for other occupations, p < 0.001) were also significantly associated with increased mortality. These correlations remained significant after adjusting for the confounding effects by multivariate analysis. CONCLUSION: A significantly high mortality was observed in women and children among the displaced population in the eastern coastal district of Sri Lanka who were examined by us. Reconstruction activities should take into consideration these changes in population structure

    Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups

    Get PDF
    Structure-Preserving Signatures (SPSs) are a useful tool for the design of modular cryptographic protocols. Recent series of works have shown that by limiting the message space of those schemes to the set of Diffie-Hellman (DH) pairs, it is possible to circumvent the known lower bounds in the Type-3 bilinear group setting thus obtaining the shortest signatures consisting of only 2 elements from the shorter source group. It has been shown that such a variant yields efficiency gains for some cryptographic constructions, including attribute-based signatures and direct anonymous attestation. Only the cases of signing a single DH pair or a DH pair and a vector from Zp\Z_p have been considered. Signing a vector of group elements is required for various applications of SPSs, especially if the aim is to forgo relying on heuristic assumptions. An open question is whether such an improved lower bound also applies to signing a vector of >1\ell > 1 messages. We answer this question negatively for schemes existentially unforgeable under an adaptive chosen-message attack (EUF-CMA) whereas we answer it positively for schemes existentially unforgeable under a random-message attack (EUF-RMA) and those which are existentially unforgeable under a combined chosen-random-message attack (EUF-CMA-RMA). The latter notion is a leeway between the two former notions where it allows the adversary to adaptively choose part of the message to be signed whereas the remaining part of the message is chosen uniformly at random by the signer. Another open question is whether strongly existentially unforgeable under an adaptive chosen-message attack (sEUF-CMA) schemes with 2-element signatures exist. We answer this question negatively, proving it is impossible to construct sEUF-CMA schemes with 2-element signatures even if the signature consists of elements from both source groups. On the other hand, we prove that sEUF-RMA and sEUF-CMA-RMA schemes with 2-element (unilateral) signatures are possible by giving constructions for those notions. Among other things, our findings show a gap between random-message/combined chosen-random-message security and chosen-message security in this setting

    Mixed Mediation of Supersymmetry Breaking with Anomalous U(1) Gauge Symmetry

    Full text link
    Models with anomalous U(1) gauge symmetry contain various superfields which can have nonzero supersymmetry breaking auxiliary components providing the origin of soft terms in the visible sector, e.g. the U(1) vector superfield, the modulus or dilaton superfield implementing the Green-Schwarz anomaly cancellation mechanism, U(1)-charged but standard model singlet matter superfield required to cancel the Fayet-Iliopoulos term, and finally the supergravity multiplet. We examine the relative strength between these supersymmetry breaking components in a simple class of models, and find that various different mixed mediations of supersymmetry breaking, involving the modulus, gauge, anomaly and D-term mediations, can be realized depending upon the characteristics of D-flat directions and how those D-flat directions are stabilized with a vanishing cosmological constant. We identify two parameters which represent such properties and thus characterize how the various mediations are mixed. We also discuss the moduli stabilization and soft terms in a variant of KKLT scenario, in which the visible sector K\"ahler modulus is stabilized by the D-term potential of anomalous U(1) gauge symmetry.Comment: 30 pages, 5 figure

    Calcium Homeostasis in Myogenic Differentiation Factor 1 (MyoD)-Transformed, Virally-Transduced, Skin-Derived Equine Myotubes

    Get PDF
    Dysfunctional skeletal muscle calcium homeostasis plays a central role in the pathophysiology of several human and animal skeletal muscle disorders, in particular, genetic disorders associated with ryanodine receptor 1 (RYR1) mutations, such as malignant hyperthermia, central core disease, multiminicore disease and certain centronuclear myopathies. In addition, aberrant skeletal muscle calcium handling is believed to play a pivotal role in the highly prevalent disorder of Thoroughbred racehorses, known as Recurrent Exertional Rhabdomyolysis. Traditionally, such defects were studied in human and equine subjects by examining the contractile responses of biopsied muscle strips exposed to caffeine, a potent RYR1 agonist. However, this test is not widely available and, due to its invasive nature, is potentially less suitable for valuable animals in training or in the human paediatric setting. Furthermore, increasingly, RYR1 gene polymorphisms (of unknown pathogenicity and significance) are being identified through next generation sequencing projects. Consequently, we have investigated a less invasive test that can be used to study calcium homeostasis in cultured, skin-derived fibroblasts that are converted to the muscle lineage by viral transduction with a MyoD (myogenic differentiation 1) transgene. Similar models have been utilised to examine calcium homeostasis in human patient cells, however, to date, there has been no detailed assessment of the cells’ calcium homeostasis, and in particular, the responses to agonists and antagonists of RYR1. Here we describe experiments conducted to assess calcium handling of the cells and examine responses to treatment with dantrolene, a drug commonly used for prophylaxis of recurrent exertional rhabdomyolysis in horses and malignant hyperthermia in humans

    More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds

    Get PDF
    Structure-preserving signatures are an important cryptographic primitive that is useful for the design of modular cryptographic protocols. It has been proven that structure-preserving signatures (in the most efficient Type-III bilinear group setting) have a lower bound of 3 group elements in the signature (which must include elements from both source groups) and require at least 2 pairing-product equations for verification. In this paper, we show that such lower bounds can be circumvented. In particular, we define the notion of Unilateral Structure-Preserving Signatures on Diffie-Hellman pairs (USPSDH) which are structure-preserving signatures in the efficient Type-III bilinear group setting with the message space being the set of Diffie-Hellman pairs, in the terminology of Abe et al. (Crypto 2010). The signatures in these schemes are elements of one of the source groups, i.e. unilateral, whereas the verification key elements\u27 are from the other source group. We construct a number of new structure-preserving signature schemes which bypass the Type-III lower bounds and hence they are much more efficient than all existing structure-preserving signature schemes. We also prove optimality of our constructions by proving lower bounds and giving some impossibility results. Our contribution can be summarized as follows: \begin{itemize} \item We construct two optimal randomizable CMA-secure schemes with signatures consisting of only 2 group elements from the first short source group and therefore our signatures are at least half the size of the best existing structure-preserving scheme for unilateral messages in the (most efficient) Type-III setting. Verifying signatures in our schemes requires, besides checking the well-formedness of the message, the evaluation of a single Pairing-Product Equation (PPE) and requires a fewer pairing evaluations than all existing structure-preserving signature schemes in the Type-III setting. Our first scheme has a feature that permits controlled randomizability (combined unforgeability) where the signer can restrict some messages such that signatures on those cannot be re-randomized which might be useful for some applications. \item We construct optimal strongly unforgeable CMA-secure one-time schemes with signatures consisting of 1 group element, and which can also sign a vector of messages while maintaining the same signature size. \item We give a one-time strongly unforgeable CMA-secure structure-preserving scheme that signs unilateral messages, i.e. messages in one of the source groups, whose efficiency matches the best existing optimal one-time scheme in every respect. \item We investigate some lower bounds and prove some impossibility results regarding this variant of structure-preserving signatures. \item We give an optimal (with signatures consisting of 2 group elements and verification requiring 1 pairing-product equation) fully randomizable CMA-secure partially structure-preserving scheme that simultaneously signs a Diffie-Hellman pair and a vector in Zpk\Z^k_p. \item As an example application of one of our schemes, we obtain efficient instantiations of randomizable weakly blind signatures which do not rely on random oracles. The latter is a building block that is used, for instance, in constructing Direct Anonymous Attestation (DAA) protocols, which are protocols deployed in practice. \end{itemize} Our results offer value along two fronts: On the practical side, our constructions are more efficient than existing ones and thus could lead to more efficient instantiations of many cryptographic protocols. On the theoretical side, our results serve as a proof that many of the lower bounds for the Type-III setting can be circumvented

    Decaying Dark Matter in Supersymmetric Model and Cosmic-Ray Observations

    Full text link
    We study cosmic-rays in decaying dark matter scenario, assuming that the dark matter is the lightest superparticle and it decays through a R-parity violating operator. We calculate the fluxes of cosmic-rays from the decay of the dark matter and those from the standard astrophysical phenomena in the same propagation model using the GALPROP package. We reevaluate the preferred parameters characterizing standard astrophysical cosmic-ray sources with taking account of the effects of dark matter decay. We show that, if energetic leptons are produced by the decay of the dark matter, the fluxes of cosmic-ray positron and electron can be in good agreements with both PAMELA and Fermi-LAT data in wide parameter region. It is also discussed that, in the case where sizable number of hadrons are also produced by the decay of the dark matter, the mass of the dark matter is constrained to be less than 200-300 GeV in order to avoid the overproduction of anti-proton. We also show that the cosmic gamma-ray flux can be consistent with the results of Fermi-LAT observation if the mass of the dark matter is smaller than nearly 4 TeV.Comment: 24 pages, 5 figure

    Mechanisms of confluence-dependent expression of CD26 in colon cancer cell lines

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>CD26 (dipeptidyl peptidase IV, DPPIV) is a 110 kDa surface glycoprotein expressed in most normal tissues, and is a potential novel therapeutic target for selected cancers. Our work evaluates the mechanism involved in confluence-dependent CD26 expression in colon cancer.</p> <p>Methods</p> <p>Colon adenocarcinoma cells were grown to confluence, and expression of CD26 and transcription factors implicated in its regulation was confirmed by immunofluorescence and Western blotting. Real-time PCR was also performed to evaluate CD26 upregulation at the transcriptional level. The influence of c-Myc on CD26 expression during different growth conditions was further evaluated following transient transfection of a c-Myc-expressing plasmid and a c-Myc specific siRNA.</p> <p>Results</p> <p>We found that the colon cancer cell lines HCT-116 and HCT-15 exhibited a confluence-dependent increase in CD26 mRNA and protein, associated with decreased expression of c-Myc, increased USF-1 and Cdx 2 levels, and unchanged HNF-1α expression. Meanwhile, ectopic expression of c-Myc in both cell lines led to decreased CD26 expression. In contrast, transfection of a siRNA targeted to Cdx2 resulted in decreased CD26 level. Importantly, culturing of cells in serum-depleted media, but not acidic conditions, upregulated CD26. While HIF-1α level also increased when cells were cultured in serum-depleted media, its expression was required but not sufficient for CD26 upregulation.</p> <p>Conclusions</p> <p>CD26 mRNA and protein levels increase in a confluence-dependent manner in colon carcinoma cell lines, with c-Myc acting as a repressor and Cdx2 acting as an enhancer of CD26 expression. The enhanced expression of CD26 in serum-depleted media and a requirement for HIF-1α suggest a role for nutrients or growth factors in the regulation of CD26 protein expression.</p

    Measurements of neutrino oscillation in appearance and disappearance channels by the T2K experiment with 6.6 x 10(20) protons on target

    Get PDF
    111 pages, 45 figures, submitted to Physical Review D. Minor revisions to text following referee comments111 pages, 45 figures, submitted to Physical Review D. Minor revisions to text following referee comments111 pages, 45 figures, submitted to Physical Review D. Minor revisions to text following referee commentsWe thank the J-PARC staff for superb accelerator performance and the CERN NA61/SHINE Collaboration for providing valuable particle production data. We acknowledge the support of MEXT, Japan; NSERC, NRC, and CFI, Canada; CEA and CNRS/IN2P3, France; DFG, Germany; INFN, Italy; National Science Centre (NCN), Poland; RSF, RFBR and MES, Russia; MINECO and ERDF funds, Spain; SNSF and SER, Switzerland; STFC, UK; and the U. S. Deparment of Energy, USA. We also thank CERN for the UA1/NOMAD magnet, DESY for the HERA-B magnet mover system, NII for SINET4, the WestGrid and SciNet consortia in Compute Canada, GridPP, UK, and the Emerald High Performance Computing facility in the Centre for Innovation, UK. In addition, participation of individual researchers and institutions has been further supported by funds from ERC (FP7), EU; JSPS, Japan; Royal Society, UK; and DOE Early Career program, USA

    Measurement of the electron neutrino charged-current interaction rate on water with the T2K ND280 pi(0) detector

    Get PDF
    10 pages, 6 figures, Submitted to PRDhttp://journals.aps.org/prd/abstract/10.1103/PhysRevD.91.112010© 2015 American Physical Society11 pages, 6 figures, as accepted to PRD11 pages, 6 figures, as accepted to PRD11 pages, 6 figures, as accepted to PR
    corecore