1,799 research outputs found

    Efficient Agreement Over Byzantine Gossip

    Get PDF
    Byzantine agreement (BA) asks for a set of parties to reach agreement in an adversarial setting. A central question is how to construct efficient BA protocols that scale well with the number of parties. In particular, the communication complexity is a critical barrier for large-scale implementations. State-of-the-art, scalable BA protocols typically work by sampling a small, unpredictable committee of parties that will send messages in each round. These messages must reach all honest parties, to allow the next round\u27s committee to function. In practice, this is usually accomplished by propagating messages over a gossip network, implemented over a partial communication graph. Most formulations of gossip networks have an ideal guarantee that every message delivered to any honest party will be delivered to every other honest party. Unfortunately, realizing this guarantee necessarily makes the protocol vulnerable to denial-of-service attacks, since an adversary can flood the network with many messages that the protocol must deliver to all parties. In this paper, we make several contributions towards realizing the goal of efficient, scalable byzantine agreement over a gossip network: 1. We define ``gossip with abort,\u27\u27 a relaxed gossip model that can be efficiently realized with minor modifications to existing gossip protocols, yet allows for significant savings in communication compared to the full point-to-point model. 2. Our protocols work in a graded PKI model, in which honest parties only have partial agreement about the set of participants in the protocol. This model arises naturally in settings without trusted setup, such as the ``permissionless\u27\u27 setting underlying many blockchain protocols. 3. We construct a new, player-replaceable BA protocol in the graded PKI model. The concrete communication complexity of our protocol, for typical parameter values, is more than 25 times better than the current state-of-the-art BA protocols in the honest-majority setting

    Variation in tibial functionality and fracture susceptibility among healthy, young adults arises from the acquisition of biologically distinct sets of traits

    Full text link
    Physiological systems like bone respond to many genetic and environmental factors by adjusting traits in a highly coordinated, compensatory manner to establish organ‐level function. To be mechanically functional, a bone should be sufficiently stiff and strong to support physiological loads. Factors impairing this process are expected to compromise strength and increase fracture risk. We tested the hypotheses that individuals with reduced stiffness relative to body size will show an increased risk of fracturing and that reduced strength arises from the acquisition of biologically distinct sets of traits (ie, different combinations of morphological and tissue‐level mechanical properties). We assessed tibial functionality retrospectively for 336 young adult women and men engaged in military training, and calculated robustness (total area/bone length), cortical area (Ct.Ar), and tissue‐mineral density (TMD). These three traits explained 69% to 72% of the variation in tibial stiffness ( p  < 0.0001). Having reduced stiffness relative to body size (body weight × bone length) was associated with odds ratios of 1.5 (95% confidence interval [CI], 0.5–4.3) and 7.0 (95% CI, 2.0–25.1) for women and men, respectively, for developing a stress fracture based on radiography and scintigraphy. K‐means cluster analysis was used to segregate men and women into subgroups based on robustness, Ct.Ar, and TMD adjusted for body size. Stiffness varied 37% to 42% among the clusters ( p  < 0.0001, ANOVA). For men, 78% of stress fracture cases segregated to three clusters ( p  < 0.03, chi‐square). Clusters showing reduced function exhibited either slender tibias with the expected Ct.Ar and TMD relative to body size and robustness (ie, well‐adapted bones) or robust tibias with reduced residuals for Ct.Ar or TMD relative to body size and robustness (ie, poorly adapted bones). Thus, we show there are multiple biomechanical and thus biological pathways leading to reduced function and increased fracture risk. Our results have important implications for developing personalized preventative diagnostics and treatments.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/98270/1/jbmr1879.pd

    Topology-Hiding Communication from Minimal Assumptions.

    Get PDF
    Topology-hiding broadcast (THB) enables parties communicating over an incomplete network to broadcast messages while hiding the topology from within a given class of graphs. THB is a central tool underlying general topology-hiding secure computation (THC) (Moran et al. TCC’15). Although broadcast is a privacy-free task, it was recently shown that THB for certain graph classes necessitates computational assumptions, even in the semi-honest setting, and even given a single corrupted party. In this work we investigate the minimal assumptions required for topology-hiding communication: both Broadcast or Anonymous Broadcast (where the broadcaster’s identity is hidden). We develop new techniques that yield a variety of necessary and sufficient conditions for the feasibility of THB/THAB in different cryptographic settings: information theoretic, given existence of key agreement, and given existence of oblivious transfer. Our results show that feasibility can depend on various properties of the graph class, such as connectivity, and highlight the role of different properties of topology when kept hidden, including direction, distance, and/or distance-of-neighbors to the broadcaster. An interesting corollary of our results is a dichotomy for THC with a public number of at least three parties, secure against one corruption: information-theoretic feasibility if all graphs are 2-connected; necessity and sufficiency of key agreement otherwise

    Functional polymorphisms in the P2X7 receptor gene are associated with stress fracture injury

    Get PDF
    Context: Military recruits and elite athletes are susceptible to stress fracture injuries. Genetic predisposition has been postulated to have a role in their development. The P2X7 receptor (P2X7R) gene, a key regulator of bone remodelling, is a genetic candidate that may contribute to stress fracture predisposition. Objective: To evaluate the putative contribution of P2X7R to stress fracture injury in two separate cohorts, military personnel and elite athletes. Methods: In 210 Israeli Defence Forces (IDF) military conscripts, stress fracture injury was diagnosed (n=43) based on symptoms and a positive bone scan. In a separate cohort of 518 elite athletes, self-reported medical imaging scan-certified stress fracture injuries were recorded (n=125). Non-stress fracture controls were identified from these cohorts who had a normal bone scan or no history or symptoms of stress fracture injury. Study participants were genotyped for functional SNPs within the P2X7R gene using proprietary fluorescence-based competitive allele-specific PCR assay. Pearson Chi-square (χ2) tests, corrected for multiple comparisons, were used to assess associations in genotype frequencies. Results: The variant allele of P2X7R SNP rs3751143 (Glu496Ala- loss of function) was associated with stress fracture injury, while the variant allele of rs1718119 (Ala348Thr- gain of function) was associated with a reduced occurrence of stress fracture injury in military conscripts (P<0.05). The association of the variant allele of rs3751143 with stress fractures was replicated in elite athletes (P<0.05), whereas the variant allele of rs1718119 was also associated with reduced multiple stress fracture cases in elite athletes (P<0.05). Conclusions: The association between independent P2X7R polymorphisms with stress fracture prevalence supports the role of a genetic predisposition in the development of stress fracture injury

    Topology-Hiding Computation for Networks with Unknown Delays

    Get PDF
    Topology-Hiding Computation (THC) allows a set of parties to securely compute a function over an incomplete network without revealing information on the network topology. Since its introduction in TCC\u2715 by Moran et al., the research on THC has focused on reducing the communication complexity, allowing larger graph classes, and tolerating stronger corruption types. All of these results consider a fully synchronous model with a known upper bound on the maximal delay of all communication channels. Unfortunately, in any realistic setting this bound has to be extremely large, which makes all fully synchronous protocols inefficient. In the literature on multi-party computation, this is solved by considering the fully asynchronous model. However, THC is unachievable in this model (and even hard to define), leaving even the definition of a meaningful model as an open problem. The contributions of this paper are threefold. First, we introduce a meaningful model of unknown and random communication delays for which THC is both definable and achievable. The probability distributions of the delays can be arbitrary for each channel, but one needs to make the (necessary) assumption that the delays are independent. The existing fully-synchronous THC protocols do not work in this setting and would, in particular, leak information about the topology. Second, in the model with trusted stateless hardware boxes introduced at Eurocrypt\u2718 by Ball et al., we present a THC protocol that works for any graph class. Third, we explore what is achievable in the standard model without trusted hardware and present a THC protocol for specific graph types (cycles and trees) secure under the DDH assumption. The speed of all protocols scales with the actual (unknown) delay times, in contrast to all previously known THC protocols whose speed is determined by the assumed upper bound on the network delay

    Analysis of Methicillin Resistance among Staphylococcus aureus Blood Isolates in an Emergency Department

    Get PDF
    The increasing prevalence of methicillin-resistant Staphylococcus aureus (MRSA) has become of great concern in both hospital and community settings. To evaluate the prevalence and risk factors for methicillin resistance among Staphylococcus aureus, blood isolates in our Emergency Department (ED) were collected. All patients with S. aureus bacteremia (SAB) who presented to the ED from January 2000 to August 2005 were included, and a retrospective study was performed. A total of 231 patients with SAB were enrolled (median age, 59 yr; M:F, 125:106). Among these patients, methicillin-resistant strains accounted for 27.3% (63 patients). Catheter-related infection was the most frequent primary site of SAB (39.0%), followed by skin and soft tissue infection (16.5%). In multivariate analysis, recent surgery (OR, 3.41; 95% CI, 1.48-7.85), recent hospitalization (2.17; 1.06-4.62), and older age (≥61 yr) (2.39; 1.25-4.57) were independently associated with the acquisition of methicillin-resistant strains. When antimicrobial therapy is considered for the treatment of a patient with suspected SAB, clinicians should consider obtaining cultures and modifying empirical therapy to provide MRSA coverage for patients with risk factors: older age, recent hospitalization, and recent surgery
    corecore