269 research outputs found

    Why I am not an anti-haecceitist

    Get PDF
    Funding: Scottish Graduate School for Arts & Humanities (SGSAH) (AHRC: AH/R012717/1); St Leonard’s College European Doctoral Stipend Scholarship.In this paper I argue that if the Identity of Indiscernibles is not necessarily true, then Haecceitism ensues—where Haecceitism is the view that there are maximal possibilities that include all the same qualitative possibilities, and yet differ with respect to the non-qualitative possibilities they include. This goes against the common intuition that Anti-Haecceitism is compatible with the Identity of Indiscernibles being only contingently true. My argument is interesting in many respects. First, it shows that in any modal framework there is a connection between the number of worldbound ordinary spatio-temporal objects, and the number of overall possibilities. Second, it has repercussions for the tenability of some philosophical positions, like Generalism, which is usually interpreted as entailing Anti-Haecceitism while at the same time being compatible with the claim that the Identity of Indiscernibles is not necessarily true. If I am correct, Generalism and similar philosophical accounts turn out to be inconsistent. Finally, it provides a strong argument for Haecceitism, given that the majority of authors today find counterexamples to the Identity of Indiscernibles extremely convincing, and many philosophical positions have been and continue being criticised on the basis of their commitment to the Identity of Indiscernibles. The paper is structured as follows: I introduce Haecceitism and the Identity of Indiscernibles in Sects. 1 and 2 respectively. Drawing on a result from the Philosophy of Quantum Mechanics, which I survey in Sect. 3, I give my main argument in Sect. 4. Finally, I discuss some implications in Sect. 5.Publisher PDFPeer reviewe

    Essays on indiscernibility

    Get PDF
    This Thesis is a collection of essays on qualitatively indiscernible entities, i.e. entities which agree with respect to all the qualitative properties they instantiate. In Chapter 1 I introduce various accounts of indiscernibility, and provide a review of the relevant literature. Chapter 2 is dedicated to Leibniz’s principle of the Identity of Indiscernibles, the claim that indiscernibility suffices for numerical identity. I argue that if certain assumptions about identity criteria are accepted, the weakest non-trivial interpretation of the principle is one restricted solely to qualitative properties. In Chapter 3 I present a new counterexample to the Identity of Indiscernibles. In Chapter 4 I argue that Anti-Haecceitism, the claim that there are no maximal possibilities which differ only with respect to the non-qualitative possibilities they include, entails that the Identity of Indiscernibles holds of necessity. In Chapter 5 I propose a new account of qualitative properties, according to which a property is qualitative if and only if it is invariant under any identity assignment — where an identity assignment is a function from individuals and worlds to identities. In Chapter 6 I argue that singular reference to indiscernible individuals is possible, and show how current theories of Arbitrary Reference allow for a successful analysis of this phenomenon. In Chapter 7 I defend Arbitrary Reference against a popular objection, and advance a new probabilistic account of Arbitrary Reference. Finally, in Chapter 8, I show that singular reference to entities to which identity does not apply is impossible."This work was supported by the Scottish Graduate School for Arts & Humanities [Grant Number: AHRC: AH/R012717/1]. This work was supported by the St Leonard's College European Doctroal Stipend Scholarship."--Fundin

    Spinal muscular atrophy with respiratory distress type 1: Clinical phenotypes, molecular pathogenesis and therapeutic insights

    Get PDF
    Spinal muscular atrophy with respiratory distress type 1 (SMARD1) is a rare autosomal recessive neuromuscular disorder caused by mutations in the IGHMBP2 gene, which encodes immunoglobulin \u3bc-binding protein 2, leading to progressive spinal motor neuron degeneration. We review the data available in the literature about SMARD1. The vast majority of patients show an onset of typical symptoms in the first year of life. The main clinical features are distal muscular atrophy and diaphragmatic palsy, for which permanent supportive ventilation is required. No effective treatment is available yet, but novel therapeutic approaches, such as gene therapy, have shown encouraging results in preclinical settings and thus represent possible methods for treating SMARD1. Significant advancements in the understanding of both the SMARD1 clinical spectrum and its molecular mechanisms have allowed the rapid translation of preclinical therapeutic strategies to human patients to improve the poor prognosis of this devastating disease

    On the Security Notions for Homomorphic Signatures

    Get PDF
    Homomorphic signature schemes allow anyone to perform computation on signed data in such a way that the correctness of computation’s results is publicly certified. In this work we analyze the security notions for this powerful primitive considered in previous work, with a special focus on adaptive security. Motivated by the complications of existing security models in the adaptive setting, we consider a simpler and (at the same time) stronger security definition inspired to that proposed by Gennaro and Wichs (ASIACRYPT’13) for homomorphic MACs. In addition to strength and simplicity, this definition has the advantage to enable the adoption of homomorphic signatures in dynamic data outsourcing scenarios, such as delegation of computation on data streams. Then, since no existing homomorphic signature satisfies this stronger notion, our main technical contribution are general compilers which turn a homomorphic signature scheme secure under a weak definition into one secure under the new stronger notion. Our compilers are totally generic with respect to the underlying scheme. Moreover, they preserve two important properties of homomorphic signatures: context-hiding (i.e. signatures on computation’s output do not reveal information about the input) and efficient verification (i.e. verifying a signature against a program P can be made faster, in an amortized, asymptotic sense, than recomputing P from scratch)

    Subversion-Resilient Enhanced Privacy ID

    Get PDF
    Anonymous attestation for secure hardware platforms leverages tailored group signature schemes and assumes the hardware to be trusted. Yet, there is an ever increasing concern on the trustworthiness of hardware components and embedded systems. A subverted hardware may, for example, use its signatures to exfiltrate identifying information or even the signing key. In this paper we focus on Enhanced Privacy ID (EPID)---a popular anonymous attestation scheme used in commodity secure hardware platforms like Intel SGX. We define and instantiate a \emph{subversion resilient} EPID scheme (or SR-EPID). In a nutshell, SR-EPID provides the same functionality and security guarantees of the original EPID, despite potentially subverted hardware. In our design, a ``sanitizer\u27\u27 ensures no covert channel between the hardware and the outside world both during enrollment and during attestation (i.e., when signatures are produced). We design a practical SR-EPID scheme secure against adaptive corruptions and based on a novel combination of malleable NIZKs and hash functions modeled as random oracles. Our approach has a number of advantages over alternative designs. Namely, the sanitizer bears no secret information---hence, a memory leak does not erode security. Further, the role of sanitizer may be distributed in a cascade fashion among several parties so that sanitization becomes effective as long as one of the parties has access to a good source of randomness. Also, we keep the signing protocol non-interactive, thereby minimizing latency during signature generation

    Generalizing Homomorphic MACs for Arithmetic Circuits

    Get PDF
    Homomorphic MACs, introduced by Gennaro and Wichs in 2013, allow anyone to validate computations on authenticated data without knowledge of the secret key. Moreover, the secret-key owner can verify the validity of the computation without needing to know the original (authenticated) inputs. Beyond security, homomorphic MACs are required to produce short tags (succinctness) and to support composability (i.e., outputs of authenticated computations should be re-usable as inputs for new computations). At Eurocrypt 2013, Catalano and Fiore proposed two realizations of homomorphic MACs that support a restricted class of computations (arithmetic circuits of polynomial degree), are practically efficient, but fail to achieve both succinctness and composability at the same time. In this paper, we generalize the work of Catalano and Fiore in several ways. First, we abstract away their results using the notion of encodings with limited malleability, thus yielding new schemes based on different algebraic settings. Next, we generalize their constructions to work with graded encodings, and more abstractly with kk-linear groups. The main advantage of this latter approach is that it allows for homomorphic MACs which are (somewhat) composable while retaining succinctness. Interestingly, our construction uses graded encodings in a generic way. Thus, all its limitations (limited composability and non-constant size of the tags) solely depend on the fact that currently known multilinear maps share similar constraints. This means, for instance, that our scheme would support arbitrary circuits (polynomial depth) if we had compact multilinear maps with an exponential number of levels

    TDP-43 promotes the formation of neuromuscular synapses through the regulation of Disc-large expression in Drosophila skeletal muscles

    Get PDF
    Background: The ribonuclear protein TDP-43 has been implicated in the pathophysiology of amyotrophic lateral sclerosis (ALS), with genetic mutations being linked to the neurological symptoms of the disease. Though alterations in the intracellular distribution of TDP-43 have been observed in skeletal muscles of patients suffering from ALS, it is not clear whether such modifications play an active role in the disease or merely represent an expression of muscle homeostatic mechanisms. Also, the molecular and metabolic pathways regulated by TDP-43 in the skeletal muscle remain largely unknown. Here, we analyze the function of TBPH, the Drosophila melanogaster ortholog of TDP-43, in skeletal muscles. Results: We modulated the activity of TDP-43 in Drosophila muscles by means of RNA interference and observed that it is required to promote the formation and growth of neuromuscular synapses. TDP-43 regulated the expression levels of Disc-large (Dlg), and restoring Dlg expression either in skeletal muscles or in motoneurons was sufficient to suppress the locomotive and synaptic defects of TDP-43-null flies. These results were validated by the observation of a decrease in Dlg levels in human neuroblastoma cells and iPSC-differentiated motoneurons derived from ALS patients, suggesting similar mechanisms may potentially be involved in the pathophysiology of the disease. Conclusions: Our results help to unveil the physiological role of TDP-43 in skeletal muscles as well as the mechanisms responsible for the autonomous and non-autonomous behavior of this protein concerning the organization of neuromuscular synapses
    • …
    corecore