107 research outputs found

    Surface relief grating near-eye display waveguide design

    Full text link
    A near-eye display device (NED) is a visual optical system that places a miniature display in front of the human eye to provide an immersive viewing experience. NEDs have been playing an irreplaceable role in both early military flight applications and today's civil and entertainment applications. In this paper, we propose an easy-to-machine design of a near-eye display based on surface relief grating waveguides, taking into account the experience of previous designs of near-eye displays, the superior performance of the design, and the accuracy level of existing grating processing. The design is designed to meet the requirements of large field of view and large outgoing pupil extension as much as possible. The design is insensitive to the incident angle and achieves a full-field field-of-view angle of 40{\deg}, an angular uniformity error of 20% for diffraction efficiency, and an average diffraction efficiency of 80% for the full field of view. Based on the design, the overall simulation of the optical path of the NED device is completed, and the illumination uniformity of the outgoing pupil expansion of the device is analyzed through simulation.Comment: 12 pages; 10 figures; 2 table

    Universally-composable finite-key analysis for efficient four-intensity decoy-state quantum key distribution

    Full text link
    We propose an efficient four-intensity decoy-state BB84 protocol and derive concise security bounds for this protocol with the universally composable finite-key analysis method. Comparing with the efficient three-intensity protocol, we find that our efficient four-intensity protocol can increase the secret key rate by at least 30%30\%. Particularly, this increasing rate of secret key rate will be raised as the transmission distance increases. At a large transmission distance, our efficient four-intensity protocol can improve the performance of quantum key distribution profoundly.Comment: accepted by Eur. Phys. J.

    On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model

    Get PDF
    Key encapsulation mechanism (KEM) variants of the Fujisaki-Okamoto (FO) transformation (TCC 2017) that turn a weakly-secure public-key encryption (PKE) into an IND-CCA-secure KEM, were widely used among the KEM submissions to the NIST Post-Quantum Cryptography Standardization Project. Under the standard CPA security assumptions, i.e., OW-CPA and IND-CPA, the security of these variants in the quantum random oracle model (QROM) has been proved by black-box reductions, e.g., Jiang et al. (CRYPTO 2018), and by non-black-box reductions (EUROCRYPT 2020). The non-black-box reductions (EUROCRYPT 2020) have a liner security loss, but can only apply to specific reversible adversaries with strict reversible implementation. On the contrary, the existing black-box reductions in the literature can apply to an arbitrary adversary with an arbitrary implementation, but suffer a quadratic security loss. In this paper, for KEM variants of the FO transformation, we first show the tightness limits of the black-box reductions, and prove that a measurement-based reduction in the QROM from breaking the standard OW-CPA (or IND-CPA) security of the underlying PKE to breaking the IND-CCA security of the resulting KEM, will inevitably incur a quadratic loss of the security, where ``measurement-based means the reduction measures a hash query from the adversary and uses the measurement outcome to break the underlying security of PKE. In particular, most black-box reductions for these FO-like KEM variants are of this type, and our results suggest an explanation for the lack of progress in improving this reduction tightness in terms of the degree of security loss. Then, we further show that the quadratic loss is also unavoidable when one turns a search problem into a decision problem using the one-way to hiding technique in a black-box manner, which has been recognized as an essential technique to prove the security of cryptosystems involving quantum random oracles

    Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query

    Get PDF
    Recently, in post-quantum cryptography migration, it has been shown that an IND-1-CCA-secure key encapsulation mechanism (KEM) is required for replacing an ephemeral Diffie-Hellman (DH) in widely-used protocols, e.g., TLS, Signal, and Noise. IND-1-CCA security is a notion similar to the traditional IND-CCA security except that the adversary is restricted to one single decapsulation query. At EUROCRYPT 2022, based on CPA-secure public-key encryption (PKE), Huguenin-Dumittan and Vaudenay presented two IND-1-CCA KEM constructions called TCHT_{CH} and THT_H, which are much more efficient than the widely-used IND-CCA-secure Fujisaki-Okamoto (FO) KEMs. The security of TCHT_{CH} was proved in both random oracle model (ROM) and quantum random oracle model (QROM). However, the QROM proof of TCHT_{CH} relies on an additional ciphertext expansion. While, the security of THT_H was only proved in the ROM, and the QROM proof is left open. In this paper, we prove the security of THT_H and TRHT_{RH} (an implicit variant of THT_H) in both ROM and QROM with much tighter reductions than Huguenin-Dumittan and Vaudenay\u27s work. In particular, our QROM proof will not lead to ciphertext expansion. Moreover, for TRHT_{RH}, THT_H and TCHT_{CH}, we also show that a O(1/q)O(1/q) (O(1/q2)O(1/q^2), resp.) reduction loss is unavoidable in the ROM (QROM, resp.), and thus claim that our ROM proof is optimal in tightness. Finally, we make a comprehensive comparison among the relative strengths of IND-1-CCA and IND-CCA in the ROM and QROM

    Behind Every Domain There is a Shift: Adapting Distortion-aware Vision Transformers for Panoramic Semantic Segmentation

    Full text link
    In this paper, we address panoramic semantic segmentation which is under-explored due to two critical challenges: (1) image distortions and object deformations on panoramas; (2) lack of semantic annotations in the 360-degree imagery. To tackle these problems, first, we propose the upgraded Transformer for Panoramic Semantic Segmentation, i.e., Trans4PASS+, equipped with Deformable Patch Embedding (DPE) and Deformable MLP (DMLPv2) modules for handling object deformations and image distortions whenever (before or after adaptation) and wherever (shallow or deep levels). Second, we enhance the Mutual Prototypical Adaptation (MPA) strategy via pseudo-label rectification for unsupervised domain adaptive panoramic segmentation. Third, aside from Pinhole-to-Panoramic (Pin2Pan) adaptation, we create a new dataset (SynPASS) with 9,080 panoramic images, facilitating Synthetic-to-Real (Syn2Real) adaptation scheme in 360-degree imagery. Extensive experiments are conducted, which cover indoor and outdoor scenarios, and each of them is investigated with Pin2Pan and Syn2Real regimens. Trans4PASS+ achieves state-of-the-art performances on four domain adaptive panoramic semantic segmentation benchmarks. Code is available at https://github.com/jamycheung/Trans4PASS.Comment: Extended version of CVPR 2022 paper arXiv:2203.01452. Code is available at https://github.com/jamycheung/Trans4PAS

    Reactive Oxygen Species Suppress Cardiac NaV1.5 Expression through Foxo1

    Get PDF
    NaV1.5 is a cardiac voltage-gated Na+ channel Ξ±subunit and is encoded by the SCN5a gene. The activity of this channel determines cardiac depolarization and electrical conduction. Channel defects, including mutations and decrease of channel protein levels, have been linked to the development of cardiac arrhythmias. The molecular mechanisms underlying the regulation of NaV1.5 expression are largely unknown. Forkhead box O (Foxo) proteins are transcriptional factors that bind the consensus DNA sequences in their target gene promoters and regulate the expression of these genes. Comparative analysis revealed conserved DNA sequences, 5β€²-CAAAACA-3β€² (insulin responsive element, IRE), in rat, mouse and human SCN5a promoters with the latter two containing two overlapping Foxo protein binding IREs, 5β€²-CAAAACAAAACA-3β€². This finding led us to hypothesize that Foxo1 regulates NaV1.5 expression by directly binding the SCN5a promoter and affecting its transcriptional activity. In the present study, we determined whether Foxo1 regulates NaV1.5 expression at the transcriptional level and also defined the role of Foxo1 in hydrogen peroxide (H2O2)-mediated NaV1.5 suppression in HL-1 cardiomyocytes using chromatin immunoprecipitation (ChIP), constitutively nuclear Foxo1 expression, and RNAi Foxo1 knockdown as well as whole cell voltage-clamp recordings. ChIP with anti-Foxo1 antibody and follow-up semi-quantitative PCR with primers flanking Foxo1 binding sites in the proximal SCN5a promoter region clearly demonstrated enrichment of DNA, confirming Foxo1 recruitment to this consensus sequence. Foxo1 mutant (T24A/S319A-GFP, Foxo1-AA-GFP) was retained in nuclei, leading to a decrease of NaV1.5 expression and Na+ current, while silencing of Foxo1 expression by RNAi resulted in the augmentation of NaV1.5 expression. H2O2 significantly reduced NaV1.5 expression by promoting Foxo1 nuclear localization and this reduction was prevented by RNAi silencing Foxo1 expression. These studies indicate that Foxo1 negatively regulates NaV1.5 expression in cardiomyocytes and reactive oxygen species suppress NaV1.5 expression through Foxo1
    • …
    corecore