158 research outputs found

    Practical End-to-End Verifiable Voting via Split-Value Representations and Randomized Partial Checking

    Get PDF
    We describe how to use Rabin's "split-value" representations, originally developed for use in secure auctions, to efficiently implement end-to-end verifiable voting. We propose a simple and very elegant combination of split-value representations with "randomized partial checking" (due to Jakobsson et al. [16])

    Practical Provably Correct Voter Privacy Protecting End-to-End Voting Employing Multiparty Computations and Split Value Representations of Votes

    Get PDF
    Continuing the work of Rabin and Rivest we present another simple and fast method for conducting end to end voting and allowing public verification of correctness of the announced vote tallying results. This method was referred to in as the SV/VCP method. In the present note voter privacy protection is achieved by use of a simple form of Multi Party Computations (MPC). At the end of vote tallying process, random permutations of the cast votes are publicly posted in the clear, without identification of voters or ballot ids. Thus vote counting and assurance of correct form of cast votes are directly available. Also, a proof of the claim that the revealed votes are a permutation of the concealed cast votes is publicly posted and verifiable by any interested party. Advantages of this method are: Easy understandability by non-­‐cryptographers, implementers and ease of use by voters and election officials. Direct handling of complicated ballot forms. Independence from any specialized primitives. Speed of vote-­‐tallying and correctness proving: elections involving a million voters can be tallied and proof of correctness of results posted within a few minutes

    Efficient Multiparty Computations with Dishonest Minority

    Get PDF
    We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols, secure against an adversary that can corrupt any minority of the players. In this paper, we rst observe that a subprotocol of theirs, known as weak secret sharing (WSS), is not secure against an adaptive adversary, contrary to what was believed earlier. We then propose new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones. Our protocols generalize easily to provide security against general Q2 adversaries

    Respiratory Syncytial Virus Interferon Antagonist NS1 Protein Suppresses and Skews the Human T Lymphocyte Response

    Get PDF
    We recently demonstrated that the respiratory syncytial virus (RSV) NS1 protein, an antagonist of host type I interferon (IFN-I) production and signaling, has a suppressive effect on the maturation of human dendritic cells (DC) that was only partly dependent on released IFN-I. Here we investigated whether NS1 affects the ability of DC to activate CD8+ and CD4+ T cells. Human DC were infected with RSV deletion mutants lacking the NS1 and/or NS2 genes and assayed for the ability to activate autologous T cells in vitro, which were analyzed by multi-color flow cytometry. Deletion of the NS1, but not NS2, protein resulted in three major effects: (i) an increased activation and proliferation of CD8+ T cells that express CD103, a tissue homing integrin that directs CD8+ T cells to mucosal epithelial cells of the respiratory tract and triggers cytolytic activity; (ii) an increased activation and proliferation of Th17 cells, which have recently been shown to have anti-viral effects and also indirectly attract neutrophils; and (iii) decreased activation of IL-4-producing CD4+ T cells - which are associated with enhanced RSV disease - and reduced proliferation of total CD4+ T cells. Except for total CD4+ T cell proliferation, none of the T cell effects appeared to be due to increased IFN-I signaling. In the infected DC, deletion of the NS1 and NS2 genes strongly up-regulated the expression of cytokines and other molecules involved in DC maturation. This was partly IFN-I-independent, and thus might account for the T cell effects. Taken together, these data demonstrate that the NS1 protein suppresses proliferation and activation of two of the protective cell populations (CD103+ CD8+ T cells and Th17 cells), and promotes proliferation and activation of Th2 cells that can enhance RSV disease

    Social Preferences and the Efficiency of Bilateral Exchange

    Get PDF
    Under what conditions do social preferences, such as altruism or a concern for fair outcomes, generate efficient trade? I analyze theoretically a simple bilateral exchange game: Each player sequentially takes an action that reduces his own material payoff but increases the other player’s. Each player’s preferences may depend on both his/her own material payoff and the other player’s. I identify necessary conditions and sufficient conditions on the players’ preferences for the outcome of their interaction to be Pareto efficient. The results have implications for interpreting the rotten kid theorem, gift exchange in the laboratory, and gift exchange in the field

    Alpha and lambda interferon together mediate suppression of CD4 T cells induced by respiratory syncytial virus

    Get PDF
    The mechanism by which respiratory syncytial virus (RSV) suppresses T-cell proliferation to itself and other antigens is poorly understood. We used monocyte-derived dendritic cells (MDDC) and CD4 T cells and measured [(3)H]thymidine incorporation to determine the factors responsible for RSV-induced T-cell suppression. These two cell types were sufficient for RSV-induced suppression of T-cell proliferation in response to cytomegalovirus or Staphylococcus enterotoxin B. Suppressive activity was transferable with supernatants from RSV-infected MDDC and was not due to transfer of live virus or RSV F (fusion) protein. Supernatants from RSV-infected MDDC, but not MDDC exposed to UV-killed RSV or mock conditions, contained alpha interferon (IFN-alpha; median, 43 pg/ml) and IFN-lambda (approximately 1 to 20 ng/ml). Neutralization of IFN-alpha with monoclonal antibody (MAb) against one of its receptor chains, IFNAR2, or of IFN-lambda with MAb against either of its receptor chains, IFN-lambdaR1 (interleukin 28R [IL-28R]) or IL-10R2, had a modest effect. In contrast, blocking the two receptors together markedly reduced or completely blocked the RSV-induced suppression of CD4 T-cell proliferation. Defining the mechanism of RSV-induced suppression may guide vaccine design and provide insight into previously uncharacterized human T-cell responses and activities of interferons

    The Role of the CD4 Receptor versus HIV Coreceptors in Envelope-Mediated Apoptosis in Peripheral Blood Mononuclear Cells

    Get PDF
    AbstractWe examined the role of CD4, CXCR4, and CCR5 in HIV envelope-mediated apoptosis by measuring the response of activated PBMCs to recombinant envelope proteins derived from CXCR4- and CCR5-utilizing viruses. Apoptosis of T cells was assessed by annexin-V staining and TdT-mediated dUTP-biotin nick-end labeling. Treatment of CCR5Δ32 homozygote PBMCs with a CCR5-specific envelope induced apoptosis in T cells, demonstrating that envelope–CD4 interactions are sufficient to induce apoptosis. However, a CXCR4-specific envelope induced higher levels of apoptosis than a CCR5-specific envelope, suggesting that envelope-mediated apoptosis can be enhanced by envelope–CXCR4 interactions. We conclude that envelope can induce apoptosis in T cells independently of the coreceptor specificity of a given envelope, or the expression profile of CXCR4 or CCR5 on a target cell. However, envelope–coreceptor interactions, and in particular, envelope–CXCR4 interactions, can contribute to this process

    Towards the scalable isolation of cellulose nanocrystals from tunicates

    Get PDF
    ABSTRACT: In order for sustainable nanomaterials such as cellulose nanocrystals (CNCs) to be utilized in industrial applications, a large-scale production capacity for CNCs must exist. Currently the only CNCs available commercially in kilogram scale are obtained from wood pulp (W-CNCs). Scaling the production capacity of W-CNCs isolation has led to their use in broader applications and captured the interest of researchers, industries and governments alike. Another source of CNCs with potential for commercial scale production are tunicates, a species of marine animal. Tunicate derived CNCs (T-CNCs) are a high aspect ratio CNC, which can complement commercially available W-CNCs in the growing global CNC market. Herein we report the isolation and characterization of T-CNCs from the tunicate Styela clava, an invasive species currently causing significant harm to local aquaculture communities. The reported procedure utilizes scalable CNC processing techniques and is based on our experiences from laboratory scale T-CNC isolation and pilot scale W-CNC isolation. To our best knowledge, this study represents the largest scale where T-CNCs have been isolated from any tunicate species, under any reaction conditions. Demonstrating a significant step towards commercial scale isolation of T-CNCs, and offering a potential solution to the numerous challenges which invasive tunicates pose to global aquaculture communities
    • 

    corecore