471 research outputs found

    Quantum authentication with key recycling

    Get PDF
    We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all non-recycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and secret key resource have been slightly redefined; also added a proof in the appendix for quantum authentication without key recycling that has better parameters and only requires weak purity testing code

    Coffee consumption and prostate cancer risk: further evidence for inverse relationship

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Higher consumption of coffee intake has recently been linked with reduced risk of aggressive prostate cancer (PC) incidence, although meta-analysis of other studies that examine the association between coffee consumption and overall PC risk remains inconclusive. Only one recent study investigated the association between coffee intake and grade-specific incidence of PC, further evidence is required to understand the aetiology of aggressive PCs. Therefore, we conducted a prospective study to examine the relationship between coffee intake and overall as well as grade-specific PC risk.</p> <p>Methods</p> <p>We conducted a prospective cohort study of 6017 men who were enrolled in the Collaborative cohort study in the UK between 1970 and 1973 and followed up to 31st December 2007. Cox Proportional Hazards Models were used to evaluate the association between coffee consumption and overall, as well as Gleason grade-specific, PC incidence.</p> <p>Results</p> <p>Higher coffee consumption was inversely associated with risk of high grade but not with overall risk of PC. Men consuming 3 or more cups of coffee per day experienced 55% lower risk of high Gleason grade disease compared with non-coffee drinkers in analysis adjusted for age and social class (HR 0.45, 95% CI 0.23-0.90, p value for trend 0.01). This association changed a little after additional adjustment for Body Mass Index, smoking, cholesterol level, systolic blood pressure, tea intake and alcohol consumption.</p> <p>Conclusion</p> <p>Coffee consumption reduces the risk of aggressive PC but not the overall risk.</p

    Shallow water marine sediment bacterial community shifts along a natural CO2 gradient in the Mediterranean Sea off Vulcano, Italy.

    Get PDF
    The effects of increasing atmospheric CO(2) on ocean ecosystems are a major environmental concern, as rapid shoaling of the carbonate saturation horizon is exposing vast areas of marine sediments to corrosive waters worldwide. Natural CO(2) gradients off Vulcano, Italy, have revealed profound ecosystem changes along rocky shore habitats as carbonate saturation levels decrease, but no investigations have yet been made of the sedimentary habitat. Here, we sampled the upper 2 cm of volcanic sand in three zones, ambient (median pCO(2) 419 μatm, minimum Ω(arag) 3.77), moderately CO(2)-enriched (median pCO(2) 592 μatm, minimum Ω(arag) 2.96), and highly CO(2)-enriched (median pCO(2) 1611 μatm, minimum Ω(arag) 0.35). We tested the hypothesis that increasing levels of seawater pCO(2) would cause significant shifts in sediment bacterial community composition, as shown recently in epilithic biofilms at the study site. In this study, 454 pyrosequencing of the V1 to V3 region of the 16S rRNA gene revealed a shift in community composition with increasing pCO(2). The relative abundances of most of the dominant genera were unaffected by the pCO(2) gradient, although there were significant differences for some 5 % of the genera present (viz. Georgenia, Lutibacter, Photobacterium, Acinetobacter, and Paenibacillus), and Shannon Diversity was greatest in sediments subject to long-term acidification (>100 years). Overall, this supports the view that globally increased ocean pCO(2) will be associated with changes in sediment bacterial community composition but that most of these organisms are resilient. However, further work is required to assess whether these results apply to other types of coastal sediments and whether the changes in relative abundance of bacterial taxa that we observed can significantly alter the biogeochemical functions of marine sediments

    A rare case of metastatic renal carcinoid

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Carcinoid is an endocrine cell tumor with low-grade atypia, which is generally a low-grade malignant cancer with a good prognosis. Metastatic renal carcinoid is even rarer than primary carcinoids.</p> <p>Case presentation</p> <p>We present our experience of a patient with metastatic renal carcinoid from the gastrointestinal tract.</p> <p>Conclusions</p> <p>The carcinoid tumor of the kidney in our patient, who had a history of liver metastasis from rectal carcinoid, was considered metastatic based on the pathological findings.</p

    Genomic Expansion of Magnetotactic Bacteria Reveals an Early Common Origin of Magnetotaxis with Lineage-specific Evolution

    Get PDF
    The origin and evolution of magnetoreception, which in diverse prokaryotes and protozoa is known as magnetotaxis and enables these microorganisms to detect Earth’s magnetic field for orientation and navigation, is not well understood in evolutionary biology. The only known prokaryotes capable of sensing the geomagnetic field are magnetotactic bacteria (MTB), motile microorganisms that biomineralize intracellular, membrane-bounded magnetic single-domain crystals of either magnetite (Fe3O4) or greigite (Fe3S4) called magnetosomes. Magnetosomes are responsible for magnetotaxis in MTB. Here we report the first large-scale metagenomic survey of MTB from both northern and southern hemispheres combined with 28 genomes from uncultivated MTB. These genomes expand greatly the coverage of MTB in the Proteobacteria, Nitrospirae, and Omnitrophica phyla, and provide the first genomic evidence of MTB belonging to the Zetaproteobacteria and “Candidatus Lambdaproteobacteria” classes. The gene content and organization of magnetosome gene clusters, which are physically grouped genes that encode proteins for magnetosome biosynthesis and organization, are more conserved within phylogenetically similar groups than between different taxonomic lineages. Moreover, the phylogenies of core magnetosome proteins form monophyletic clades. Together, these results suggest a common ancient origin of iron-based (Fe3O4 and Fe3S4) magnetotaxis in the domain Bacteria that underwent lineage-specific evolution, shedding new light on the origin and evolution of biomineralization and magnetotaxis, and expanding significantly the phylogenomic representation of MTB

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Get PDF
    Abstract. Universal hash functions are commonly used primitives for fast and secure message authentication in the form of Message Authentication Codes (MACs) or Authenticated Encryption with Associated Data (AEAD) schemes. These schemes are widely used and standardised, the most well known being McGrew and Viega’s Galois/Counter Mode (GCM). In this paper we identify some properties of hash functions based on polynomial evaluation that arise from the underlying algebraic structure. As a result we are able to describe a general forgery attack, of which Saarinen’s cycling attack from FSE 2012 is a special case. Our attack removes the requirement for long messages and applies regardless of the field in which the hash function is evaluated. Furthermore we provide a common description of all published attacks against GCM, by showing that the existing attacks are the result of these algebraic properties of the polynomial-based hash function. We also greatly expand the number of known weak GCM keys and show that almost every subset of the keyspace is a weak key class. Finally, we demonstrate that these algebraic properties and corresponding attacks are highly relevant to GCM/2 +, a variant of GCM designed to increase the efficiency in software

    Quantum Computing

    Full text link
    Quantum mechanics---the theory describing the fundamental workings of nature---is famously counterintuitive: it predicts that a particle can be in two places at the same time, and that two remote particles can be inextricably and instantaneously linked. These predictions have been the topic of intense metaphysical debate ever since the theory's inception early last century. However, supreme predictive power combined with direct experimental observation of some of these unusual phenomena leave little doubt as to its fundamental correctness. In fact, without quantum mechanics we could not explain the workings of a laser, nor indeed how a fridge magnet operates. Over the last several decades quantum information science has emerged to seek answers to the question: can we gain some advantage by storing, transmitting and processing information encoded in systems that exhibit these unique quantum properties? Today it is understood that the answer is yes. Many research groups around the world are working towards one of the most ambitious goals humankind has ever embarked upon: a quantum computer that promises to exponentially improve computational power for particular tasks. A number of physical systems, spanning much of modern physics, are being developed for this task---ranging from single particles of light to superconducting circuits---and it is not yet clear which, if any, will ultimately prove successful. Here we describe the latest developments for each of the leading approaches and explain what the major challenges are for the future.Comment: 26 pages, 7 figures, 291 references. Early draft of Nature 464, 45-53 (4 March 2010). Published version is more up-to-date and has several corrections, but is half the length with far fewer reference
    corecore