446 research outputs found

    Multi-Prover Commitments Against Non-Signaling Attacks

    Get PDF
    We reconsider the concept of multi-prover commitments, as introduced in the late eighties in the seminal work by Ben-Or et al. As was recently shown by Cr\'{e}peau et al., the security of known two-prover commitment schemes not only relies on the explicit assumption that the provers cannot communicate, but also depends on their information processing capabilities. For instance, there exist schemes that are secure against classical provers but insecure if the provers have quantum information processing capabilities, and there are schemes that resist such quantum attacks but become insecure when considering general so-called non-signaling provers, which are restricted solely by the requirement that no communication takes place. This poses the natural question whether there exists a two-prover commitment scheme that is secure under the sole assumption that no communication takes place; no such scheme is known. In this work, we give strong evidence for a negative answer: we show that any single-round two-prover commitment scheme can be broken by a non-signaling attack. Our negative result is as bad as it can get: for any candidate scheme that is (almost) perfectly hiding, there exists a strategy that allows the dishonest provers to open a commitment to an arbitrary bit (almost) as successfully as the honest provers can open an honestly prepared commitment, i.e., with probability (almost) 1 in case of a perfectly sound scheme. In the case of multi-round schemes, our impossibility result is restricted to perfectly hiding schemes. On the positive side, we show that the impossibility result can be circumvented by considering three provers instead: there exists a three-prover commitment scheme that is secure against arbitrary non-signaling attacks

    Variable strength of forest stand attributes and weather conditions on the questing activity of Ixodes ricinus ticks over years in managed forests

    Get PDF
    Given the ever-increasing human impact through land use and climate change on the environment, we crucially need to achieve a better understanding of those factors that influence the questing activity of ixodid ticks, a major disease-transmitting vector in temperate forests. We investigated variation in the relative questing nymph densities of Ixodes ricinus in differently managed forest types for three years (2008–2010) in SW Germany by drag sampling. We used a hierarchical Bayesian modeling approach to examine the relative effects of habitat and weather and to consider possible nested structures of habitat and climate forces. The questing activity of nymphs was considerably larger in young forest successional stages of thicket compared with pole wood and timber stages. Questing nymph density increased markedly with milder winter temperatures. Generally, the relative strength of the various environmental forces on questing nymph density differed across years. In particular, winter temperature had a negative effect on tick activity across sites in 2008 in contrast to the overall effect of temperature across years. Our results suggest that forest management practices have important impacts on questing nymph density. Variable weather conditions, however, might override the effects of forest management practices on the fluctuations and dynamics of tick populations and activity over years, in particular, the preceding winter temperatures. Therefore, robust predictions and the detection of possible interactions and nested structures of habitat and climate forces can only be quantified through the collection of long-term data. Such data are particularly important with regard to future scenarios of forest management and climate warming

    First Impressions of HIV Risk: It Takes Only Milliseconds to Scan a Stranger

    Get PDF
    Research indicates that many people do not use condoms consistently but instead rely on intuition to identify sexual partners high at risk for HIV infection. The present studies examined neural correlates for first impressions of HIV risk and determined the association of perceived HIV risk with other trait characteristics. Participants were presented with 120 self-portraits retrieved from a popular online photo-sharing community (www.flickr.com). Factor analysis of various explicit ratings of trait characteristics yielded two orthogonal factors: (1) a ‘valence-approach’ factor encompassing perceived attractiveness, healthiness, valence, and approach tendencies, and (2) a ‘safeness’ factor, entailing judgments of HIV risk, trustworthiness, and responsibility. These findings suggest that HIV risk ratings systematically relate to cardinal features of a high-risk HIV stereotype. Furthermore, event-related brain potential recordings revealed neural correlates of first impressions about HIV risk. Target persons perceived as risky elicited a differential brain response in a time window from 220–340 ms and an increased late positive potential in a time window from 350–700 ms compared to those perceived as safe. These data suggest that impressions about HIV risk can be formed in a split second and despite a lack of information about the actual risk profile. Findings of neural correlates of risk impressions and their relationship to key features of the HIV risk stereotype are discussed in the context of the ‘risk as feelings’ theory

    11th German Conference on Chemoinformatics (GCC 2015) : Fulda, Germany. 8-10 November 2015.

    Get PDF

    Genotypes and haplotypes of the VEGF gene and survival in locally advanced non-small cell lung cancer patients treated with chemoradiotherapy

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Vascular endothelial growth factor (VEGF) is a major mediator of angiogenesis involving in carcinogenesis, including lung cancer. We hypothesized that <it>VEGF </it>polymorphisms may affect survival outcomes among locally advanced non-small cell lung cancer (LA-NSCLC) patients.</p> <p>Methods</p> <p>We genotyped three potentially functional <it>VEGF </it>variants [-460 T > C (rs833061), -634 G > C (rs2010963), and +936 C > T (rs3025039)] and estimated haplotypes in 124 Caucasian patients with LA-NSCLC treated with definitive radiotherapy. We used Kaplan-Meier log-rank tests, and Cox proportional hazard models to evaluate the association between <it>VEGF </it>variants and overall survival (OS).</p> <p>Results</p> <p>Gender, Karnofsky's performance scores (KPS) and clinical stage seemed to influence the OS. The variant C genotypes were independently associated with significantly improved OS (CT+CC vs. TT: adjusted hazard ratio [HR] = 0.58; 95% confidence interval [CI] = 0.37-0.92, <it>P </it>= 0.022), compared with the <it>VEGF </it>-460 TT genotype.</p> <p>Conclusions</p> <p>Our study suggests that <it>VEGF </it>-460 C genotypes may be associated with a better survival of LA-NSCLC patients after chemoradiotherapy. Large studies are needed to confirm our findings.</p

    The quality case for information technology in healthcare

    Get PDF
    BACKGROUND: As described in the Institute of Medicine's Crossing the Quality Chasm report, the quality of health care in the U.S. today leaves much to be desired. DISCUSSION: One major opportunity for improving quality relates to increasing the use of information technology, or IT. Health care organizations currently invest less in IT than in any other information-intensive industry, and not surprisingly current systems are relatively primitive, compared with industries such as banking or aviation. Nonetheless, a number of organizations have demonstrated that quality can be substantially improved in a variety of ways if IT use is increased in ways that improve care. Specifically, computerization of processes that are error-prone and computerized decision support may substantially improve both efficiency and quality, as well as dramatically facilitate quality measurement. This report discusses the current levels of IT and quality in health care, how quality improvement and management are currently done, the evidence that more IT might be helpful, a vision of the future, and the barriers to getting there. SUMMARY: This report suggests that there are five key policy domains that need to be addressed: standards, incentives, security and confidentiality, professional involvement, and research, with financial incentives representing the single most important lever
    corecore