1,517 research outputs found

    Non-malleable encryption: simpler, shorter, stronger

    Get PDF
    In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: 1. Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? 2. Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? 3. Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the scheme of Choi et al. by a factor O(λ), where λ is the security parameter. Still, encrypting a message of size O(λ) would require ciphertext and keys of size O(λ2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a λ-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(λ) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural “encode-then-encrypt-bit-by-bit” approach to work. Finally, we introduce a new security notion for public-key encryption that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results—(faster) construction from IND-CPA and domain extension from one-bit scheme—also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA securit

    National Mesothelioma Virtual Bank: A standard based biospecimen and clinical data resource to enhance translational research

    Get PDF
    Background: Advances in translational research have led to the need for well characterized biospecimens for research. The National Mesothelioma Virtual Bank is an initiative which collects annotated datasets relevant to human mesothelioma to develop an enterprising biospecimen resource to fulfill researchers' need. Methods: The National Mesothelioma Virtual Bank architecture is based on three major components: (a) common data elements (based on College of American Pathologists protocol and National North American Association of Central Cancer Registries standards), (b) clinical and epidemiologic data annotation, and (c) data query tools. These tools work interoperably to standardize the entire process of annotation. The National Mesothelioma Virtual Bank tool is based upon the caTISSUE Clinical Annotation Engine, developed by the University of Pittsburgh in cooperation with the Cancer Biomedical Informatics Grid™ (caBIG™, see http://cabig.nci.nih.gov). This application provides a web-based system for annotating, importing and searching mesothelioma cases. The underlying information model is constructed utilizing Unified Modeling Language class diagrams, hierarchical relationships and Enterprise Architect software. Result: The database provides researchers real-time access to richly annotated specimens and integral information related to mesothelioma. The data disclosed is tightly regulated depending upon users' authorization and depending on the participating institute that is amenable to the local Institutional Review Board and regulation committee reviews. Conclusion: The National Mesothelioma Virtual Bank currently has over 600 annotated cases available for researchers that include paraffin embedded tissues, tissue microarrays, serum and genomic DNA. The National Mesothelioma Virtual Bank is a virtual biospecimen registry with robust translational biomedical informatics support to facilitate basic science, clinical, and translational research. Furthermore, it protects patient privacy by disclosing only de-identified datasets to assure that biospecimens can be made accessible to researchers. © 2008 Amin et al; licensee BioMed Central Ltd

    Performance of wheat varieties, Oklahoma - 1981

    Get PDF
    The Oklahoma Cooperative Extension Service periodically issues revisions to its publications. The most current edition is made available. For access to an earlier edition, if available for this title, please contact the Oklahoma State University Library Archives by email at [email protected] or by phone at 405-744-6311

    CARP-1 Functional Mimetics Are a Novel Class of Small Molecule Inhibitors of Malignant Pleural Mesothelioma Cells

    Get PDF
    Malignant pleural mesothelioma (MPM) is an asbestos-related thoracic malignancy that is characterized by late metastases, and resistance to therapeutic modalities. The toxic side-effects of MPM therapies often limit their clinical effectiveness, thus necessitating development of new agents to effectively treat and manage this disease in clinic. CARP-1 functional mimetics (CFMs) are a novel class of compounds that inhibit growth of diverse cancer cell types. Here we investigated MPM cell growth suppression by the CFMs and the molecular mechanisms involved. CFM-1, -4, and -5 inhibited MPM cell growth, in vitro, in part by stimulating apoptosis. Apoptosis by CFM-4 involved activation of pro-apoptotic stress-activated protein kinases (SAPKs) p38 and JNK, elevated CARP-1 expression, cleavage of PARP1, and loss of the oncogene c-myc as well as mitotic cyclin B1. Treatments of MPM cells with CFM-4 resulted in depletion of NF-κB signaling inhibitor ABIN1 and Inhibitory κB (IκB)α and β, while increasing expression of pro-apoptotic death receptor (DR) 4 protein. CFM-4 enhanced expression of serine-phosphorylated podoplanin and cleavage of vimetin. CFMs also attenuated biological properties of the MPM cells by blocking their abilities to migrate, form colonies in suspension, and invade through the matrix-coated membranes. Both podoplanin and vimentin regulate processes of cell motility and invasion, and their expression often correlates with metastatic disease, and poor prognosis. The fact that phosphorylation of serines in the cytoplasmic domain of podoplanin interferes with processes of cellular motility, CFM-4-dependent elevated phosphorylated podoplanin and cleavage of vimentin underscore a metastasis inhibitory property of these compounds, and suggest that CFMs and/or their future analogs have potential as anti-MPM agents

    Candida dubliniensis fungemia: the first four cases in North America.

    Get PDF
    We report the first four North American cases of Candida dubliniensis fungemia, including the first isolation of this organism from the bloodstream of an HIV-infected person. All isolates were susceptible in vitro to commonly used antifungal drugs. This report demonstrates that C. dubliniensis can cause bloodstream infection; however, the incidence of disease is not known

    FORECASTOR -- II. Simulating Galaxy Surveys with the Cosmological Advanced Survey Telescope for Optical and UV Research

    Full text link
    The Cosmological Advanced Survey Telescope for Optical and UV Research (CASTOR) is a planned flagship space telescope, covering the blue-optical and UV part of the spectrum. Here we introduce the CASTOR image simulator, a Python GalSim package-based script capable of generating mock CASTOR images from an input catalogue. We generate example images from the CASTOR Wide, Deep, and Ultra-Deep surveys using simulated light-cones from the Santa Cruz Semi-Analytic Model. We make predictions for the performance of these surveys by comparing galaxies that are extracted from each image using Source Extractor to the input catalogue. We find that the Wide, Deep, and Ultra-Deep surveys will be complete to ~27, 29 and 30 mag, respectively, in the UV, u, and g filters, with the UV-split and u-split filters reaching a shallower depth. With a large area of ~2200 deg2^2, the Wide survey will detect hundreds of millions of galaxies out to z~4, mostly with M109MM_\ast \gtrsim 10^9 M_\odot. The Ultra-Deep survey will probe to z~5, detecting a large fraction of M108MM_\ast \simeq 10^8 M_\odot galaxies. These powerful samples will enable precision measurements of the distribution of star formation in the cosmic web, connecting the growth of stellar mass to the assembly of dark matter halos over two thirds of the history of the Universe, and other core goals of CASTOR's legacy surveys. These image simulations and the tools developed to generate them will be a vital planning tool to estimate CASTOR's performance and iterate the telescope and survey designs prior to launch.Comment: Submitted to A

    A Formal Treatment of Hardware Wallets

    Get PDF
    Bitcoin, being the most successful cryptocurrency, has been repeatedly attacked with many users losing their funds. The industry\u27s response to securing the user\u27s assets is to offer tamper-resistant hardware wallets. Although such wallets are considered to be the most secure means for managing an account, no formal attempt has been previously done to identify, model and formally verify their properties. This paper provides the first formal model of the Bitcoin hardware wallet operations. We identify the properties and security parameters of a Bitcoin wallet and formally define them in the Universal Composition (UC) Framework. We present a modular treatment of a hardware wallet ecosystem, by realizing the wallet functionality in a hybrid setting defined by a set of protocols. This approach allows us to capture in detail the wallet\u27s components, their interaction and the potential threats. We deduce the wallet\u27s security by proving that it is secure under common cryptographic assumptions, provided that there is no deviation in the protocol execution. Finally, we define the attacks that are successful under a protocol deviation, and analyze the security of commercially available wallets

    Detection of a Single Identical Cytomegalovirus (CMV) Strain in Recently Seroconverted Young Women

    Get PDF
    Infection with multiple CMV strains is common in immunocompromised hosts, but its occurrence in normal hosts has not been well-studied.We analyzed CMV strains longitudinally in women who acquired CMV while enrolled in a CMV glycoprotein B (gB) vaccine trial. Sequencing of four variable genes was performed in samples collected from seroconversion and up to 34 months thereafter.199 cultured isolates from 53 women and 65 original fluids from a subset of 19 women were sequenced. 51 women were infected with one strain each without evidence for genetic drift; only two women shed multiple strains. Genetic variability among strains increased with the number of sequenced genetic loci. Nevertheless, 13 of 53 women proved to be infected with an identical CMV strain based on sequencing at all four variable genes. CMV vaccine did not alter the degree of genetic diversity amongst strains.Primary CMV infection in healthy women nearly always involves shedding of one strain that remains stable over time. Immunization with CMVgB-1 vaccine strain is not selective against specific strains. Although 75% of women harbored their unique strain, or a strain shared with only one other woman, 25% shared a single common strain, suggesting that this predominant strain with a particular combination of genetic loci is advantageous in this large urban area

    Intermediate follow-up following intravascular stenting for treatment of coarctation of the aorta

    Full text link
    Background : We report a multiinstitutional study on intermediate-term outcome of intravascular stenting for treatment of coarctation of the aorta using integrated arch imaging (IAI) techniques. Methods and Results : Medical records of 578 patients from 17 institutions were reviewed. A total of 588 procedures were performed between May 1989 and Aug 2005. About 27% (160/588) procedures were followed up by further IAI of their aorta (MRI/CT/repeat cardiac catheterization) after initial stent procedures. Abnormal imaging studies included: the presence of dissection or aneurysm formation, stent fracture, or the presence of reobstruction within the stent (instent restenosis or significant intimal build-up within the stent). Forty-one abnormal imaging studies were reported in the intermediate follow-up at median 12 months (0.5–92 months). Smaller postintervention of the aorta (CoA) diameter and an increased persistent systolic pressure gradient were associated with encountering abnormal follow-up imaging studies. Aortic wall abnormalities included dissections ( n = 5) and aneurysm ( n = 13). The risk of encountering aortic wall abnormalities increased with larger percent increase in CoA diameter poststent implant, increasing balloon/coarc ratio, and performing prestent angioplasty. Stent restenosis was observed in 5/6 parts encountering stent fracture and neointimal buildup ( n = 16). Small CoA diameter poststent implant and increased poststent residual pressure gradient increased the likelihood of encountering instent restenosis at intermediate follow-up. Conclusions : Abnormalities were observed at intermediate follow-up following IS placement for treatment of native and recurrent coarctation of the aorta. Not exceeding a balloon:coarctation ratio of 3.5 and avoidance of prestent angioplasty decreased the likelihood of encountering an abnormal follow-up imaging study in patients undergoing intravascular stent placement for the treatment of coarctation of the aorta. We recommend IAI for all patients undergoing IS placement for treatment of CoA. © 2007 Wiley-Liss, Inc.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/57392/1/21191_ftp.pd

    An Integrated TCGA Pan-Cancer Clinical Data Resource to Drive High-Quality Survival Outcome Analytics

    Get PDF
    For a decade, The Cancer Genome Atlas (TCGA) program collected clinicopathologic annotation data along with multi-platform molecular profiles of more than 11,000 human tumors across 33 different cancer types. TCGA clinical data contain key features representing the democratized nature of the data collection process. To ensure proper use of this large clinical dataset associated with genomic features, we developed a standardized dataset named the TCGA Pan-Cancer Clinical Data Resource (TCGA-CDR), which includes four major clinical outcome endpoints. In addition to detailing major challenges and statistical limitations encountered during the effort of integrating the acquired clinical data, we present a summary that includes endpoint usage recommendations for each cancer type. These TCGA-CDR findings appear to be consistent with cancer genomics studies independent of the TCGA effort and provide opportunities for investigating cancer biology using clinical correlates at an unprecedented scale. Analysis of clinicopathologic annotations for over 11,000 cancer patients in the TCGA program leads to the generation of TCGA Clinical Data Resource, which provides recommendations of clinical outcome endpoint usage for 33 cancer types
    corecore