364 research outputs found

    ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

    Get PDF
    The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys are attached directly to messages, and thus the encryption can be implemented by email clients without any collaboration of the providers. The decentralized nature of this in-band key distribution, however, makes it prone to man-in-the-middle attacks and can leak the social graph of users. To address this problem we introduce ClaimChain, a cryptographic construction for privacy-preserving authentication of public keys. Users store claims about their identities and keys, as well as their beliefs about others, in ClaimChains. These chains form authenticated decentralized repositories that enable users to prove the authenticity of both their keys and the keys of their contacts. ClaimChains are encrypted, and therefore protect the stored information, such as keys and contact identities, from prying eyes. At the same time, ClaimChain implements mechanisms to provide strong non-equivocation properties, discouraging malicious actors from distributing conflicting or inauthentic claims. We implemented ClaimChain and we show that it offers reasonable performance, low overhead, and authenticity guarantees.Comment: Appears in 2018 Workshop on Privacy in the Electronic Society (WPES'18

    Silencing of the XAF1 gene by promoter hypermethylation in cancer cells and reactivation to TRAIL-sensitization by IFN-β

    Get PDF
    BACKGROUND: XIAP-associated factor 1 (XAF1) is a putative tumor suppressor that exerts its proapoptotic effects through both caspase-dependent and – independent means. Loss of XAF1 expression through promoter methylation has been implicated in the process of tumorigenesis in a variety of cancers. In this report, we investigated the role of basal xaf1 promoter methylation in xaf1 expression and assessed the responsiveness of cancer cell lines to XAF1 induction by IFN-β. METHODS: We used the conventional bisulfite DNA modification and sequencing method to determine the methylation status in the CpG sites of xaf1 promoter in glioblastoma (SF539, SF295), neuroblastoma (SK-N-AS) and cervical carcinoma (HeLa) cells. We analysed the status and incidence of basal xaf1 promoter methylation in xaf1 expression in non-treated cells as well as under a short or long exposure to IFN-β. Stable XAF1 glioblastoma knock-down cell lines were established to characterize the direct implication of XAF1 in IFN-β-mediated sensitization to TRAIL-induced cell death. RESULTS: We found a strong variability in xaf1 promoter methylation profile and responsiveness to IFN-β across the four cancer cell lines studied. At the basal level, aberrant promoter methylation was linked to xaf1 gene silencing. After a short exposure, the IFN-β-mediated reactivation of xaf1 gene expression was related to the degree of basal promoter methylation. However, in spite of continued promoter hypermethylation, we find that IFN-β induced a transient xaf1 expression, that in turn, was followed by promoter demethylation upon a prolonged exposure. Importantly, we demonstrated for the first time that IFN-β-mediated reactivation of endogenous XAF1 plays a critical role in TRAIL-induced cell death since XAF1 knock-down cell lines completely lost their IFN-β-mediated TRAIL sensitivity. CONCLUSION: Together, these results suggest that promoter demethylation is not the sole factor determining xaf1 gene induction under IFN-β treatment. Furthermore, our study provides evidence that XAF1 is a crucial interferon-stimulated gene (ISG) mediator of IFN-induced sensitization to TRAIL in cancer

    Securing computation against continuous leakage

    Get PDF
    30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. ProceedingsWe present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded number of executions. Our method uses as a building block a semantically secure subsidiary bit encryption scheme with the following additional operations: key refreshing, oblivious generation of cipher texts, leakage resilience re-generation, and blinded homomorphic evaluation of one single complete gate (e.g. NAND). Furthermore, the security properties of the subsidiary encryption scheme should withstand bounded leakage incurred while performing each of the above operations. We show how to implement such a subsidiary encryption scheme under the DDH intractability assumption and the existence of a simple secure hardware component. The hardware component is independent of the encryption scheme secret key. The subsidiary encryption scheme resists leakage attacks where the leakage is computable in polynomial time and of length bounded by a constant fraction of the security parameter.Israel Science Foundation (710267)United States-Israel Binational Science Foundation (710613)National Science Foundation (U.S.) (6914349)Weizmann KAMAR Gran

    Spatially resolved spectroscopy of monolayer graphene on SiO2

    Full text link
    We have carried out scanning tunneling spectroscopy measurements on exfoliated monolayer graphene on SiO2_2 to probe the correlation between its electronic and structural properties. Maps of the local density of states are characterized by electron and hole puddles that arise due to long range intravalley scattering from intrinsic ripples in graphene and random charged impurities. At low energy, we observe short range intervalley scattering which we attribute to lattice defects. Our results demonstrate that the electronic properties of graphene are influenced by intrinsic ripples, defects and the underlying SiO2_2 substrate.Comment: 6 pages, 7 figures, extended versio

    Adaptive-Secure VRFs with Shorter Keys from Static Assumptions

    Get PDF
    Verifiable random functions are pseudorandom functions producing publicly verifiable proofs for their outputs, allowing for efficient checks of the correctness of their computation. In this work, we introduce a new computational hypothesis, the n-Eigen-Value assumption, which can be seen as a relaxation of the U_n-MDDH assumption, and prove its equivalence with the n-Rank assumption. Based on the newly introduced computational hypothesis, we build the core of a verifiable random function having an exponentially large input space and reaching adaptive security under a static assumption. The final construction achieves shorter public and secret keys compared to the existing schemes reaching the same properties

    Public-Key Encryption Schemes with Auxiliary Inputs

    Get PDF
    7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. ProceedingsWe construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields.National Science Foundation (U.S.) (Grant CCF-0514167)National Science Foundation (U.S.) (Grant CCF-0635297)National Science Foundation (U.S.) (Grant NSF-0729011)Israel Science Foundation (700/08)Chais Family Fellows Progra

    The number of matchings in random graphs

    Full text link
    We study matchings on sparse random graphs by means of the cavity method. We first show how the method reproduces several known results about maximum and perfect matchings in regular and Erdos-Renyi random graphs. Our main new result is the computation of the entropy, i.e. the leading order of the logarithm of the number of solutions, of matchings with a given size. We derive both an algorithm to compute this entropy for an arbitrary graph with a girth that diverges in the large size limit, and an analytic result for the entropy in regular and Erdos-Renyi random graph ensembles.Comment: 17 pages, 6 figures, to be published in Journal of Statistical Mechanic

    Affine modifications and affine hypersurfaces with a very transitive automorphism group

    Full text link
    We study a kind of modification of an affine domain which produces another affine domain. First appeared in passing in the basic paper of O. Zariski (1942), it was further considered by E.D. Davis (1967). The first named author applied its geometric counterpart to construct contractible smooth affine varieties non-isomorphic to Euclidean spaces. Here we provide certain conditions which guarantee preservation of the topology under a modification. As an application, we show that the group of biregular automorphisms of the affine hypersurface X⊂Ck+2X \subset C^{k+2} given by the equation uv=p(x1,...,xk)uv=p(x_1,...,x_k) where p∈C[x1,...,xk],p \in C[x_1,...,x_k], acts m−m-transitively on the smooth part regXX of XX for any m∈N.m \in N. We present examples of such hypersurfaces diffeomorphic to Euclidean spaces.Comment: 39 Pages, LaTeX; a revised version with minor changes and correction

    Efficacy and safety of N-acetyl-GED-0507-34-LEVO gel in patients with moderate-to severe facial acne vulgaris: A phase 2B randomised double-blind, vehicle-controlled trial.

    Get PDF
    Background: Preliminary in vitro and in vivo studies have supported the efficacy of the peroxisome proliferator-activated receptor-γ (PPARγ) modulator N-acetyl-GED-0507-34-LEVO (NAC-GED) for the treatment of acne-inducing sebocyte differentiation, improving sebum composition and controlling the inflammatory process. Objectives: To evaluate the efficacy and safety of NAC-GED (5% and 2%) in patients with moderate-to-severe facial acne vulgaris. Methods: This double-blind phase II randomized controlled clinical trial was conducted at 36 sites in Germany, Italy and Poland. Patients aged 12-30 years with facial acne, an Investigator Global Assessment (IGA) score of 3-4, and an inflammatory and noninflammatory lesion count of 20-100 were randomized to topical application of the study drug (2% or 5%) or placebo (vehicle), once daily for 12 weeks. The co-primary efficacy endpoints were percentage change from baseline in total lesion count (TLC) and IGA success at week 12; the safety endpoints were adverse events (AEs) and serious AEs. This study was registered with EudraCT (2018-003307-19). Results: Between Q1 in 2019 and Q1 in 2020 450 patients [n = 418 (92·9%) IGA 3; n = 32 (7·1%) IGA 4] were randomly assigned to NAC-GED 5% (n = 150), NAC-GED 2% (n = 150) or vehicle (n = 150). The percentage change in TLC reduction was statistically significantly higher in both the NAC-GED 5% [-57·1%, 95% confidence interval (CI) -60·8 to -53·4; P < 0·001] and NAC-GED 2% (-44·7%, 95% CI -49·1 to -40·1; P < 0·001) groups compared with vehicle (-33·9%, 95% CI -37·6 to -30·2). A higher proportion of patients treated with NAC-GED 5% experienced IGA success (45%, 95% CI 38-53) vs. the vehicle group (24%, 95% CI 18-31; P < 0·001). The IGA success rate was 33% in the NAC-GED 2% group (P = not significant vs. vehicle). The percentage of patients who had one or more AEs was 19%, 16% and 19% in the NAC-GED 5%, NAC-GED 2% and vehicle groups, respectively. Conclusions: The topical application of NAC-GED 5% reduced TLC, increased the IGA success rate and was safe for use in patients with acne vulgaris. Thus, NAC-GED, a new PPARγ modulator, showed an effective clinical response. What is already known about this topic? Acne vulgaris, one of the most common dermatological diseases, affects more than 85% of adolescents. There is a medical need for innovative and safe treatment of acne vulgaris. The peroxisome proliferator-activated receptor-γ (PPARγ) is involved in lipid metabolism and specifically in cell differentiation, sebum production and the inflammatory reaction. What does this study add? N-acetyl-GED-0507-34-LEVO (NAC-GED 5%), a PPARγ modulator, significantly improves acne manifestations in patients with moderate-to-severe acne and is safe and well tolerated. The results suggest that the PPARγ receptor is a novel therapeutic target for acne. The results provide a basis for a large phase III trial to assess the effectiveness and safety profile of NAC-GED in combating a disease that afflicts 80-90% of adolescents
    • …
    corecore