213 research outputs found

    Non-malleable codes for space-bounded tampering

    Get PDF
    Non-malleable codesβ€”introduced by Dziembowski, Pietrzak and Wichs at ICS 2010β€”are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering attacks against the memory. Clearly, non-malleability is hopeless if the class of tampering adversaries includes the decoding and encoding algorithm. To circumvent this obstacle, the majority of past research focused on designing non-malleable codes for various tampering classes, albeit assuming that the adversary is unable to decode. Nonetheless, in many concrete settings, this assumption is not realistic

    Predictable arguments of knowledge

    Get PDF
    We initiate a formal investigation on the power of predictability for argument of knowledge systems for NP. Specifically, we consider private-coin argument systems where the answer of the prover can be predicted, given the private randomness of the verifier; we call such protocols Predictable Arguments of Knowledge (PAoK). Our study encompasses a full characterization of PAoK, showing that such arguments can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (i.e., two messages) of communication without loss of generality. We additionally explore PAoK satisfying additional properties (including zero-knowledge and the possibility of re-using the same challenge across multiple executions with the prover), present several constructions of PAoK relying on different cryptographic tools, and discuss applications to cryptography

    Multimode circuit optomechanics near the quantum limit

    Get PDF
    The coupling of distinct systems underlies nearly all physical phenomena and their applications. A basic instance is that of interacting harmonic oscillators, which gives rise to, for example, the phonon eigenmodes in a crystal lattice. Particularly important are the interactions in hybrid quantum systems consisting of different kinds of degrees of freedom. These assemblies can combine the benefits of each in future quantum technologies. Here, we investigate a hybrid optomechanical system having three degrees of freedom, consisting of a microwave cavity and two micromechanical beams with closely spaced frequencies around 32 MHz and no direct interaction. We record the first evidence of tripartite optomechanical mixing, implying that the eigenmodes are combinations of one photonic and two phononic modes. We identify an asymmetric dark mode having a long lifetime. Simultaneously, we operate the nearly macroscopic mechanical modes close to the motional quantum ground state, down to 1.8 thermal quanta, achieved by back-action cooling. These results constitute an important advance towards engineering entangled motional states.Comment: 6+7 page

    Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model

    Get PDF
    Secret sharing enables a dealer to split a secret into a set of shares, in such a way that certain authorized subsets of share holders can reconstruct the secret, whereas all unauthorized subsets cannot. Non-malleable secret sharing (Goyal and Kumar, STOC 2018) additionally requires that, even if the shares have been tampered with, the reconstructed secret is either the original or a completely unrelated one. In this work, we construct non-malleable secret sharing tolerating pp-time {\em joint-tampering} attacks in the plain model (in the computational setting), where the latter means that, for any p>0p>0 fixed {\em a priori}, the attacker can tamper with the same target secret sharing up to pp times. In particular, assuming one-to-one one-way functions, we obtain: - A secret sharing scheme for threshold access structures which tolerates joint pp-time tampering with subsets of the shares of maximal size ({\em i.e.}, matching the privacy threshold of the scheme). This holds in a model where the attacker commits to a partition of the shares into non-overlapping subsets, and keeps tampering jointly with the shares within such a partition (so-called {\em selective partitioning}). - A secret sharing scheme for general access structures which tolerates joint pp-time tampering with subsets of the shares of size O(log⁑n)O(\sqrt{\log n}), where nn is the number of parties. This holds in a stronger model where the attacker is allowed to adaptively change the partition within each tampering query, under the restriction that once a subset of the shares has been tampered with jointly, that subset is always either tampered jointly or not modified by other tampering queries (so-called {\em semi-adaptive partitioning}). At the heart of our result for selective partitioning lies a new technique showing that every one-time {\em statistically} non-malleable secret sharing against joint tampering is in fact {\em leakage-resilient} non-malleable ({\em i.e.},\ the attacker can leak jointly from the shares prior to tampering). We believe this may be of independent interest, and in fact we show it implies lower bounds on the share size and randomness complexity of statistically non-malleable secret sharing against {\em independent} tampering

    Preservation of large-scale chromatin structure in FISH experiments

    Get PDF
    The nuclear organization of specific endogenous chromatin regions can be investigated only by fluorescence in situ hybridization (FISH). One of the two fixation procedures is typically applied: (1) buffered formaldehyde or (2) hypotonic shock with methanol acetic acid fixation followed by dropping of nuclei on glass slides and air drying. In this study, we compared the effects of these two procedures and some variations on nuclear morphology and on FISH signals. We analyzed mouse erythroleukemia and mouse embryonic stem cells because their clusters of subcentromeric heterochromatin provide an easy means to assess preservation of chromatin. Qualitative and quantitative analyses revealed that formaldehyde fixation provided good preservation of large-scale chromatin structures, while classical methanol acetic acid fixation after hypotonic treatment severely impaired nuclear shape and led to disruption of chromosome territories, heterochromatin structures, and large transgene arrays. Our data show that such preparations do not faithfully reflect in vivo nuclear architecture. ELECTRONIC SUPPLEMENTARY MATERIAL: Supplementary material is available in the online version of this article at http://dx.doi.org/10.1007/s00412-006-0084-2 and is accessible for authorized users

    The developmental pattern of stimulus and response interference in a color-object Stroop task: an ERP study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Several studies have shown that Stroop interference is stronger in children than in adults. However, in a standard Stroop paradigm, stimulus interference and response interference are confounded. The purpose of the present study was to determine whether interference at the stimulus level and the response level are subject to distinct maturational patterns across childhood. Three groups of children (6–7 year-olds, 8–9 year-olds, and 10–12 year-olds) and a group of adults performed a manual Color-Object Stroop designed to disentangle stimulus interference and response interference. This was accomplished by comparing three trial types. In congruent (C) trials there was no interference. In stimulus incongruent (SI) trials there was only stimulus interference. In response incongruent (RI) trials there was stimulus interference and response interference. Stimulus interference and response interference were measured by a comparison of SI with C, and RI with SI trials, respectively. Event-related potentials (ERPs) were measured to study the temporal dynamics of these processes of interference.</p> <p>Results</p> <p>There was no behavioral evidence for stimulus interference in any of the groups, but in 6–7 year-old children ERPs in the SI condition in comparison with the C condition showed an occipital P1-reduction (80–140 ms) and a widely distributed amplitude enhancement of a negative component followed by an amplitude reduction of a positive component (400–560 ms). For response interference, all groups showed a comparable reaction time (RT) delay, but children made more errors than adults. ERPs in the RI condition in comparison with the SI condition showed an amplitude reduction of a positive component over lateral parietal (-occipital) sites in 10–12 year-olds and adults (300–540 ms), and a widely distributed amplitude enhancement of a positive component in all age groups (680–960 ms). The size of the enhancement correlated positively with the RT response interference effect.</p> <p>Conclusion</p> <p>Although processes of stimulus interference control as measured with the color-object Stroop task seem to reach mature levels relatively early in childhood (6–7 years), development of response interference control appears to continue into late adolescence as 10–12 year-olds were still more susceptible to errors of response interference than adults.</p

    Dynamic Imaging of the Effector Immune Response to Listeria Infection In Vivo

    Get PDF
    Host defense against the intracellular pathogen Listeria monocytogenes (Lm) requires innate and adaptive immunity. Here, we directly imaged immune cell dynamics at Lm foci established by dendritic cells in the subcapsular red pulp (scDC) using intravital microscopy. Blood borne Lm rapidly associated with scDC. Myelomonocytic cells (MMC) swarmed around non-motile scDC forming foci from which blood flow was excluded. The depletion of scDC after foci were established resulted in a 10-fold reduction in viable Lm, while graded depletion of MMC resulted in 30–1000 fold increase in viable Lm in foci with enhanced blood flow. Effector CD8+ [CD8 superscript +] T cells at sites of infection displayed a two-tiered reduction in motility with antigen independent and antigen dependent components, including stable interactions with infected and non-infected scDC. Thus, swarming MMC contribute to control of Lm prior to development of T cell immunity by direct killing and sequestration from blood flow, while scDC appear to promote Lm survival while preferentially interacting with CD8+ [CD8 superscript +] T cells in effector sites.National Institutes of Health (U.S.) (Grant P01AI-071195

    Real-Time Imaging Reveals the Dynamics of Leukocyte Behaviour during Experimental Cerebral Malaria Pathogenesis

    Get PDF
    During experimental cerebral malaria (ECM) mice develop a lethal neuropathological syndrome associated with microcirculatory dysfunction and intravascular leukocyte sequestration. The precise spatio-temporal context in which the intravascular immune response unfolds is incompletely understood. We developed a 2-photon intravital microscopy (2P-IVM)-based brain-imaging model to monitor the real-time behaviour of leukocytes directly within the brain vasculature during ECM. Ly6Chi monocytes, but not neutrophils, started to accumulate in the blood vessels of Plasmodium berghei ANKA (PbA)-infected MacGreen mice, in which myeloid cells express GFP, one to two days prior to the onset of the neurological signs (NS). A decrease in the rolling speed of monocytes, a measure of endothelial cell activation, was associated with progressive worsening of clinical symptoms. Adoptive transfer experiments with defined immune cell subsets in recombinase activating gene (RAG)-1-deficient mice showed that these changes were mediated by Plasmodium-specific CD8+ T lymphocytes. A critical number of CD8+ T effectors was required to induce disease and monocyte adherence to the vasculature. Depletion of monocytes at the onset of disease symptoms resulted in decreased lymphocyte accumulation, suggesting reciprocal effects of monocytes and T cells on their recruitment within the brain. Together, our studies define the real-time kinetics of leukocyte behaviour in the central nervous system during ECM, and reveal a significant role for Plasmodium-specific CD8+ T lymphocytes in regulating vascular pathology in this disease. Β© 2014 Pai et al

    Evaluating Effects of Divided Hemispheric Processing on Word Recognition in Foveal and Extrafoveal Displays: The Evidence from Arabic

    Get PDF
    Background: Previous studies have claimed that a precise split at the vertical midline of each fovea causes all words to the left and right of fixation to project to the opposite, contralateral hemisphere, and this division in hemispheric processing has considerable consequences for foveal word recognition. However, research in this area is dominated by the use of stimuli from Latinate languages, which may induce specific effects on performance. Consequently, we report two experiments using stimuli from a fundamentally different, non-Latinate language (Arabic) that offers an alternative way of revealing effects of split-foveal processing, if they exist. Methods and Findings: Words (and pseudowords) were presented to the left or right of fixation, either close to fixation and entirely within foveal vision, or further from fixation and entirely within extrafoveal vision. Fixation location and stimulus presentations were carefully controlled using an eye-tracker linked to a fixation-contingent display. To assess word recognition, Experiment 1 used the Reicher-Wheeler task and Experiment 2 used the lexical decision task. Results: Performance in both experiments indicated a functional division in hemispheric processing for words in extrafoveal locations (in recognition accuracy in Experiment 1 and in reaction times and error rates in Experiment 2) but no such division for words in foveal locations. Conclusions: These findings from a non-Latinate language provide new evidence that although a functional division i
    • …
    corecore