86 research outputs found

    Modulus Computational Entropy

    Full text link
    The so-called {\em leakage-chain rule} is a very important tool used in many security proofs. It gives an upper bound on the entropy loss of a random variable XX in case the adversary who having already learned some random variables Z1,,ZZ_{1},\ldots,Z_{\ell} correlated with XX, obtains some further information Z+1Z_{\ell+1} about XX. Analogously to the information-theoretic case, one might expect that also for the \emph{computational} variants of entropy the loss depends only on the actual leakage, i.e. on Z+1Z_{\ell+1}. Surprisingly, Krenn et al.\ have shown recently that for the most commonly used definitions of computational entropy this holds only if the computational quality of the entropy deteriorates exponentially in (Z1,,Z)|(Z_{1},\ldots,Z_{\ell})|. This means that the current standard definitions of computational entropy do not allow to fully capture leakage that occurred "in the past", which severely limits the applicability of this notion. As a remedy for this problem we propose a slightly stronger definition of the computational entropy, which we call the \emph{modulus computational entropy}, and use it as a technical tool that allows us to prove a desired chain rule that depends only on the actual leakage and not on its history. Moreover, we show that the modulus computational entropy unifies other,sometimes seemingly unrelated, notions already studied in the literature in the context of information leakage and chain rules. Our results indicate that the modulus entropy is, up to now, the weakest restriction that guarantees that the chain rule for the computational entropy works. As an example of application we demonstrate a few interesting cases where our restricted definition is fulfilled and the chain rule holds.Comment: Accepted at ICTS 201

    Forest Biodiversity Assessment in Peruvian Andean Montane Cloud Forest

    Get PDF
    Cloud forests are unusual and fragile habitats, being one of the least studied and least understood ecosystems. The tropical Andean dominion is considered one of the most significant places in the world as rega rds biological diversity, with a very high level of endemism. The biodiversity was analysed in an isolated remnant area of a tropical montane cloud forest known as the ?Bosque de Neblina de Cuyas?, in the North of the Peruvian Andean range. Composition, structure and dead wood were measured or estimated. The values obtained were compared with other cloud forests. The study revealed a high level of forest biodiversity, although the level of biodiversity differs from one area to another: in the inner areas, where human pressure is almost inexistent, the biodiversity values increase. The high species richness and the low dominance among species bear testimony to this montane cloud forest as a real enclave of biodiversity

    Programmable dispersion on a photonic integrated circuit for classical and quantum applications

    Get PDF
    We demonstrate a large-scale tunable-coupling ring resonator array, suitable for high-dimensional classical and quantum transforms, in a CMOS-compatible silicon photonics platform. The device consists of a waveguide coupled to 15 ring-based dispersive elements with programmable linewidths and resonance frequencies. The ability to control both quality factor and frequency of each ring provides an unprecedented 30 degrees of freedom in dispersion control on a single spatial channel. This programmable dispersion control system has a range of applications, including mode-locked lasers, quantum key distribution, and photon-pair generation. We also propose a novel application enabled by this circuit – high-speed quantum communications using temporal-mode-based quantum data locking – and discuss the utility of the system for performing the high-dimensional unitary optical transformations necessary for a quantum data locking demonstration

    An enhanced gas ionization sensor from Y-doped vertically aligned conductive ZnO nanorods

    Get PDF
    A stable and highly sensitive gas ionization sensor (GIS) constructed from vertically aligned, conductive yttrium–doped ZnO nanorod (YZO NR) arrays is demonstrated. The conductive YZO NRs are synthesized using a facile one-pot hydrothermal method. At higher Y/Zn molar ratio, the aspect ratio of the YZO NRs is increased from 11 to 25. Doping with yttrium atoms decreases the electrical resistivity of ZnO NRs more than 100 fold. GIS measurements reveal a 6-fold enhancement in the sensitivity accompanied with a significant reduction in breakdown voltage from the highly conductive YZO NRs. Direct correlations between the resistivity of the NRs and GIS characteristics are established

    Correlation analysis of the transcriptome of growing leaves with mature leaf parameters in a maize RIL population

    Full text link

    Albiglutide and cardiovascular outcomes in patients with type 2 diabetes and cardiovascular disease (Harmony Outcomes): a double-blind, randomised placebo-controlled trial

    Get PDF
    Background: Glucagon-like peptide 1 receptor agonists differ in chemical structure, duration of action, and in their effects on clinical outcomes. The cardiovascular effects of once-weekly albiglutide in type 2 diabetes are unknown. We aimed to determine the safety and efficacy of albiglutide in preventing cardiovascular death, myocardial infarction, or stroke. Methods: We did a double-blind, randomised, placebo-controlled trial in 610 sites across 28 countries. We randomly assigned patients aged 40 years and older with type 2 diabetes and cardiovascular disease (at a 1:1 ratio) to groups that either received a subcutaneous injection of albiglutide (30–50 mg, based on glycaemic response and tolerability) or of a matched volume of placebo once a week, in addition to their standard care. Investigators used an interactive voice or web response system to obtain treatment assignment, and patients and all study investigators were masked to their treatment allocation. We hypothesised that albiglutide would be non-inferior to placebo for the primary outcome of the first occurrence of cardiovascular death, myocardial infarction, or stroke, which was assessed in the intention-to-treat population. If non-inferiority was confirmed by an upper limit of the 95% CI for a hazard ratio of less than 1·30, closed testing for superiority was prespecified. This study is registered with ClinicalTrials.gov, number NCT02465515. Findings: Patients were screened between July 1, 2015, and Nov 24, 2016. 10 793 patients were screened and 9463 participants were enrolled and randomly assigned to groups: 4731 patients were assigned to receive albiglutide and 4732 patients to receive placebo. On Nov 8, 2017, it was determined that 611 primary endpoints and a median follow-up of at least 1·5 years had accrued, and participants returned for a final visit and discontinuation from study treatment; the last patient visit was on March 12, 2018. These 9463 patients, the intention-to-treat population, were evaluated for a median duration of 1·6 years and were assessed for the primary outcome. The primary composite outcome occurred in 338 (7%) of 4731 patients at an incidence rate of 4·6 events per 100 person-years in the albiglutide group and in 428 (9%) of 4732 patients at an incidence rate of 5·9 events per 100 person-years in the placebo group (hazard ratio 0·78, 95% CI 0·68–0·90), which indicated that albiglutide was superior to placebo (p<0·0001 for non-inferiority; p=0·0006 for superiority). The incidence of acute pancreatitis (ten patients in the albiglutide group and seven patients in the placebo group), pancreatic cancer (six patients in the albiglutide group and five patients in the placebo group), medullary thyroid carcinoma (zero patients in both groups), and other serious adverse events did not differ between the two groups. There were three (<1%) deaths in the placebo group that were assessed by investigators, who were masked to study drug assignment, to be treatment-related and two (<1%) deaths in the albiglutide group. Interpretation: In patients with type 2 diabetes and cardiovascular disease, albiglutide was superior to placebo with respect to major adverse cardiovascular events. Evidence-based glucagon-like peptide 1 receptor agonists should therefore be considered as part of a comprehensive strategy to reduce the risk of cardiovascular events in patients with type 2 diabetes. Funding: GlaxoSmithKline

    Genome-Wide Meta-Analyses of Breast, Ovarian, and Prostate Cancer Association Studies Identify Multiple New Susceptibility Loci Shared by at Least Two Cancer Types.

    Get PDF
    UNLABELLED: Breast, ovarian, and prostate cancers are hormone-related and may have a shared genetic basis, but this has not been investigated systematically by genome-wide association (GWA) studies. Meta-analyses combining the largest GWA meta-analysis data sets for these cancers totaling 112,349 cases and 116,421 controls of European ancestry, all together and in pairs, identified at P < 10(-8) seven new cross-cancer loci: three associated with susceptibility to all three cancers (rs17041869/2q13/BCL2L11; rs7937840/11q12/INCENP; rs1469713/19p13/GATAD2A), two breast and ovarian cancer risk loci (rs200182588/9q31/SMC2; rs8037137/15q26/RCCD1), and two breast and prostate cancer risk loci (rs5013329/1p34/NSUN4; rs9375701/6q23/L3MBTL3). Index variants in five additional regions previously associated with only one cancer also showed clear association with a second cancer type. Cell-type-specific expression quantitative trait locus and enhancer-gene interaction annotations suggested target genes with potential cross-cancer roles at the new loci. Pathway analysis revealed significant enrichment of death receptor signaling genes near loci with P < 10(-5) in the three-cancer meta-analysis. SIGNIFICANCE: We demonstrate that combining large-scale GWA meta-analysis findings across cancer types can identify completely new risk loci common to breast, ovarian, and prostate cancers. We show that the identification of such cross-cancer risk loci has the potential to shed new light on the shared biology underlying these hormone-related cancers. Cancer Discov; 6(9); 1052-67. ©2016 AACR.This article is highlighted in the In This Issue feature, p. 932.The Breast Cancer Association Consortium (BCAC), the Prostate Cancer Association Group to Investigate Cancer Associated Alterations in the Genome (PRACTICAL), and the Ovarian Cancer Association Consortium (OCAC) that contributed breast, prostate, and ovarian cancer data analyzed in this study were in part funded by Cancer Research UK [C1287/A10118 and C1287/A12014 for BCAC; C5047/A7357, C1287/A10118, C5047/A3354, C5047/A10692, and C16913/A6135 for PRACTICAL; and C490/A6187, C490/A10119, C490/A10124, C536/A13086, and C536/A6689 for OCAC]. Funding for the Collaborative Oncological Gene-environment Study (COGS) infrastructure came from: the European Community's Seventh Framework Programme under grant agreement number 223175 (HEALTH-F2-2009-223175), Cancer Research UK (C1287/A10118, C1287/A 10710, C12292/A11174, C1281/A12014, C5047/A8384, C5047/A15007, C5047/A10692, and C8197/A16565), the US National Institutes of Health (CA128978) and the Post-Cancer GWAS Genetic Associations and Mechanisms in Oncology (GAME-ON) initiative (1U19 CA148537, 1U19 CA148065, and 1U19 CA148112), the US Department of Defence (W81XWH-10-1-0341), the Canadian Institutes of Health Research (CIHR) for the CIHR Team in Familial Risks of Breast Cancer, Komen Foundation for the Cure, the Breast Cancer Research Foundation, and the Ovarian Cancer Research Fund [with donations by the family and friends of Kathryn Sladek Smith (PPD/RPCI.07)]. Additional financial support for contributing studies is documented under Supplementary Financial Support.This is the author accepted manuscript. The final version is available from the American Association for Cancer Research via http://dx.doi.org/10.1158/2159-8290.CD-15-122

    Fast and Secure Updatable Encryption

    No full text
    Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update token, received from the client, which should not reveal anything about plaintexts to an adversary. We provide a new and highly efficient suite of updatable encryption schemes that we collectively call SHINE. In the variant designed for short messages, ciphertext generation consists of applying one permutation and one exponentiation (per message block), while updating ciphertexts requires just one exponentiation. Variants for longer messages provide much stronger security guarantees than prior work that has comparable efficiency. We present a new confidentiality notion for updatable encryption schemes that implies prior notions. We prove that SHINE is secure under our new confidentiality definition while also providing ciphertext integrity
    corecore