195 research outputs found

    Quantum authentication with key recycling

    Get PDF
    We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all non-recycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and secret key resource have been slightly redefined; also added a proof in the appendix for quantum authentication without key recycling that has better parameters and only requires weak purity testing code

    Metabolic Footprinting of Fermented Milk Consumption in Serum of Healthy Men.

    Get PDF
    Fermentation is a widely used method of natural food preservation that has consequences on the nutritional value of the transformed food. Fermented dairy products are increasingly investigated in view of their ability to exert health benefits beyond their nutritional qualities. To explore the mechanisms underpinning the health benefits of fermented dairy intake, the present study followed the effects of milk fermentation, from changes in the product metabolome to consequences on the human serum metabolome after its ingestion. A randomized crossover study design was conducted in 14 healthy men [mean age: 24.6 y; mean body mass index (in kg/m2): 21.8]. At the beginning of each test phase, serum samples were taken 6 h postprandially after the ingestion of 800 g of a nonfermented milk or a probiotic yogurt. During the 2-wk test phases, subjects consumed 400 g of the assigned test product daily (200 g, 2 times/d). Serum samples were taken from fasting participants at the end of each test phase. The serum metabolome was assessed through the use of LC-MS-based untargeted metabolomics. Postprandial serum metabolomes after milk or yogurt intake could be differentiated [orthogonal projections to latent structures discriminant analysis (OPLS-DA) Q2 = 0.74]. Yogurt intake was characterized by higher concentrations of 7 free amino acids (including proline, P = 0.03), reduced concentrations of 5 bile acids (including glycocholic acid, P = 0.04), and modulation of 4 indole derivative compounds (including indole lactic acid, P = 0.01). Fasting serum samples after 2 wk of daily intake of milk or yogurt could also be differentiated based on their metabolic profiles (OPLS-DA Q2 = 0.56) and were discussed in light of the postprandial results. Metabolic pathways related to amino acids, indole derivatives, and bile acids were modulated in healthy men by the intake of yogurt. Further investigation to explore novel health effects of fermented dairy products is warranted.This trial was registered at clinicaltrials.gov as NCT02230345

    Composable and Finite Computational Security of Quantum Message Transmission

    Full text link
    Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, game-based, and not known to be composable. We show how to define finite, composable, computational security for secure quantum message transmission. The new definitions do not involve any games or oracles, they are directly operational: a scheme is secure if it transforms an insecure channel and a shared key into an ideal secure channel from Alice to Bob, i.e., one which only allows Eve to block messages and learn their size, but not change them or read them. By modifying the ideal channel to provide Eve with more or less capabilities, one gets an array of different security notions. By design these transformations are composable, resulting in composable security. Crucially, the new definitions are finite. Security does not rely on the asymptotic hardness of a computational problem. Instead, one proves a finite reduction: if an adversary can distinguish the constructed (real) channel from the ideal one (for some fixed security parameters), then she can solve a finite instance of some computational problem. Such a finite statement is needed to make security claims about concrete implementations. We then prove that (slightly modified versions of) protocols proposed in the literature satisfy these composable definitions. And finally, we study the relations between some game-based definitions and our composable ones. In particular, we look at notions of quantum authenticated encryption and QCCA2, and show that they suffer from the same issues as their classical counterparts: they exclude certain protocols which are arguably secure.Comment: 43+11 pages, 18 figures, v2: minor changes, extended version of the published pape

    Evolution of Linear Absorption and Nonlinear Optical Properties in V-Shaped Ruthenium(II)-Based Chromophores

    Get PDF
    In this article, we describe a series of complexes with electron-rich cis-{Ru^(II)(NH_3)_4}^(2+) centers coordinated to two pyridyl ligands bearing N-methyl/arylpyridinium electron-acceptor groups. These V-shaped dipolar species are new, extended members of a class of chromophores first reported by us (Coe, B. J. et al. J. Am. Chem. Soc. 2005, 127, 4845−4859). They have been isolated as their PF_6− salts and characterized by using various techniques including ^1H NMR and electronic absorption spectroscopies and cyclic voltammetry. Reversible Ru^(III/II) waves show that the new complexes are potentially redox-switchable chromophores. Single crystal X-ray structures have been obtained for four complex salts; three of these crystallize noncentrosymmetrically, but with the individual molecular dipoles aligned largely antiparallel. Very large molecular first hyperpolarizabilities ÎČ have been determined by using hyper-Rayleigh scattering (HRS) with an 800 nm laser and also via Stark (electroabsorption) spectroscopic studies on the intense, visible d → π^* metal-to-ligand charge-transfer (MLCT) and π → π^* intraligand charge-transfer (ILCT) bands. The latter measurements afford total nonresonant ÎČ_0 responses as high as ca. 600 × 10^(−30) esu. These pseudo-C_(2v) chromophores show two substantial components of the ÎČ tensor, ÎČ_(zzz) and ÎČ_(zyy), although the relative significance of these varies with the physical method applied. According to HRS, ÎČ_(zzz) dominates in all cases, whereas the Stark analyses indicate that ÎČ_(zyy) is dominant in the shorter chromophores, but ÎČ_(zzz) and ÎČ_(zyy) are similar for the extended species. In contrast, finite field calculations predict that ÎČ_(zyy) is always the major component. Time-dependent density functional theory calculations predict increasing ILCT character for the nominally MLCT transitions and accompanying blue-shifts of the visible absorptions, as the ligand π-systems are extended. Such unusual behavior has also been observed with related 1D complexes (Coe, B. J. et al. J. Am. Chem. Soc. 2004, 126, 3880−3891)

    Data Work in a Knowledge-Broker Organization: How Cross-Organizational Data Maintenance shapes Human Data Interactions.

    Get PDF

    The Princeton Protein Orthology Database (P-POD): A Comparative Genomics Analysis Tool for Biologists

    Get PDF
    Many biological databases that provide comparative genomics information and tools are now available on the internet. While certainly quite useful, to our knowledge none of the existing databases combine results from multiple comparative genomics methods with manually curated information from the literature. Here we describe the Princeton Protein Orthology Database (P-POD, http://ortholog.princeton.edu), a user-friendly database system that allows users to find and visualize the phylogenetic relationships among predicted orthologs (based on the OrthoMCL method) to a query gene from any of eight eukaryotic organisms, and to see the orthologs in a wider evolutionary context (based on the Jaccard clustering method). In addition to the phylogenetic information, the database contains experimental results manually collected from the literature that can be compared to the computational analyses, as well as links to relevant human disease and gene information via the OMIM, model organism, and sequence databases. Our aim is for the P-POD resource to be extremely useful to typical experimental biologists wanting to learn more about the evolutionary context of their favorite genes. P-POD is based on the commonly used Generic Model Organism Database (GMOD) schema and can be downloaded in its entirety for installation on one's own system. Thus, bioinformaticians and software developers may also find P-POD useful because they can use the P-POD database infrastructure when developing their own comparative genomics resources and database tools

    Different populations and sources of human mesenchymal stem cells (MSC): A comparison of adult and neonatal tissue-derived MSC

    Get PDF
    The mesenchymal stroma harbors an important population of cells that possess stem cell-like characteristics including self renewal and differentiation capacities and can be derived from a variety of different sources. These multipotent mesenchymal stem cells (MSC) can be found in nearly all tissues and are mostly located in perivascular niches. MSC have migratory abilities and can secrete protective factors and act as a primary matrix for tissue regeneration during inflammation, tissue injuries and certain cancers
    • 

    corecore