27 research outputs found

    On Iterative Collision Search for LPN and Subset Sum

    Get PDF
    Iterative collision search procedures play a key role in developing combinatorial algorithms for the subset sum and learning parity with noise (LPN) problems. In both scenarios, the single-list pair-wise iterative collision search finds the most solutions and offers the best efficiency. However, due to its complex probabilistic structure, no rigorous analysis for it appears to be available to the best of our knowledge. As a result, theoretical works often resort to overly constrained and sub-optimal iterative collision search variants in exchange for analytic simplicity. In this paper, we present rigorous analysis for the single-list pair-wise iterative collision search method and its applications in subset sum and LPN. In the LPN literature, the method is known as the LF2 heuristic. Besides LF2, we also present rigorous analysis of other LPN solving heuristics and show that they work well when combined with LF2. Putting it together, we significantly narrow the gap between theoretical and heuristic algorithms for LPN

    Dissection-BKW

    Get PDF
    The slightly subexponential algorithm of Blum, Kalai and Wasserman (BKW) provides a basis for assessing LPN/LWE security. However, its huge memory consumption strongly limits its practical applicability, thereby preventing precise security estimates for cryptographic LPN/LWE instantiations. We provide the first time-memory trade-offs for the BKW algorithm. For instance, we show how to solve LPN in dimension kk in time 243klogk2^{\frac 43\frac k{\log k}} and memory 223klogk2^{\frac 23\frac k{\log k}}. Using the Dissection technique due to Dinur et al. (Crypto ’12) and a novel, slight generalization thereof, we obtain fine-grained trade-offs for any available (subexponential) memory while the running time remains subexponential. Reducing the memory consumption of BKW below its running time also allows us to propose a first quantum version QBKW for the BKW algorithm

    Armenian conference dedicated to the 850th death anniversary of St. Nerses the Gracious

    Get PDF
    Conference section 1 Opening of the conference with speeches by official persons Boghos Levon Zekiyan, Archeparch of Istanbul and Turkey for the Catholic Armenians - Saint Nerses Shnorhali as a Unique Figure in Christian Thought And Praxis: Shnorhali’s Pioneering Vision of Christian Oecumenism Claude Mutafian, Dr.hist. (University of Paris) -- Mleh, a Successful Armenian Prince (1169- 1175) Andris Priede, Dr.hist.eccl. (Faculty of Theology, University of Latvia) - Marginal Forms of Armenian Monasticism in 13th Century Valda Salmiņa, M.A. - St. Nerses Shnorhali’s historical poem “Lament of Edessa” Conference section 2 Vahan S. Hovhanessian, Bishop PhD (Karekin the First Research Center) -Analysis of the Four Gospels attributed to St. Nerses the Graceful Abraham Terian, Prof. emeritus (St. Nersess Armenian Seminary) - Shnorhali’s Commentary on the Beatitudes Elizabete Taivāne, Dr.theol. (Faculty of Theology, University of Latvia) -Christology of St. Nerses Shnorhali at the Crossroads of Eastern and Western Theology: The Edifying Details Conference section 3 Ojārs Spārītis, Dr.habil.art. (Latvian Academy of Arts) - View on Sacral Architecture of Central Armenia Haig Utidjian, PhD (CESEM, New University of Lisbon) - The music of the Šnorhali Corpus: challenges and rewards Arusyak Tamrazyan, PhD (Matenadaran, Research Institute of Ancient manuscripts) - Mystical symbolism in melismatic performance: the odes by St Nersēs th

    Role of retinoic receptors in lung carcinogenesis

    Get PDF
    Several in vitro and in vivo studies have examined the positive and negative effects of retinoids (vitamin A analogs) in premalignant and malignant lesions. Retinoids have been used as chemopreventive and anticancer agents because of their pleiotropic regulator function in cell differentiation, growth, proliferation and apoptosis through interaction with two types of nuclear receptors: retinoic acid receptors and retinoid X receptors. Recent investigations have gradually elucidated the function of retinoids and their signaling pathways and may explain the failure of earlier chemopreventive studies

    New Model of Macrophage Acquisition of the Lymphatic Endothelial Phenotype

    Get PDF
    Macrophage-derived lymphatic endothelial cell progenitors (M-LECPs) contribute to new lymphatic vessel formation, but the mechanisms regulating their differentiation, recruitment, and function are poorly understood. Detailed characterization of M-LECPs is limited by low frequency in vivo and lack of model systems allowing in-depth molecular analyses in vitro. Our goal was to establish a cell culture model to characterize inflammation-induced macrophage-to-LECP differentiation under controlled conditions.Time-course analysis of diaphragms from lipopolysaccharide (LPS)-treated mice revealed rapid mobilization of bone marrow-derived and peritoneal macrophages to the proximity of lymphatic vessels followed by widespread (∼50%) incorporation of M-LECPs into the inflamed lymphatic vasculature. A differentiation shift toward the lymphatic phenotype was found in three LPS-induced subsets of activated macrophages that were positive for VEGFR-3 and many other lymphatic-specific markers. VEGFR-3 was strongly elevated in the early stage of macrophage transition to LECPs but undetectable in M-LECPs prior to vascular integration. Similar transient pattern of VEGFR-3 expression was found in RAW264.7 macrophages activated by LPS in vitro. Activated RAW264.7 cells co-expressed VEGF-C that induced an autocrine signaling loop as indicated by VEGFR-3 phosphorylation inhibited by a soluble receptor. LPS-activated RAW264.7 macrophages also showed a 68% overlap with endogenous CD11b(+)/VEGFR-3(+) LECPs in the expression of lymphatic-specific genes. Moreover, when injected into LPS- but not saline-treated mice, GFP-tagged RAW264.7 cells massively infiltrated the inflamed diaphragm followed by integration into 18% of lymphatic vessels.We present a new model for macrophage-LECP differentiation based on LPS activation of cultured RAW264.7 cells. This system designated here as the "RAW model" mimics fundamental features of endogenous M-LECPs. Unlike native LECPs, this model is unrestricted by cell numbers, heterogeneity of population, and ability to change genetic composition for experimental purposes. As such, this model can provide a valuable tool for understanding the LECP and lymphatic biology

    Anopheles gambiae PGRPLC-Mediated Defense against Bacteria Modulates Infections with Malaria Parasites

    Get PDF
    Recognition of peptidoglycan (PGN) is paramount for insect antibacterial defenses. In the fruit fly Drosophila melanogaster, the transmembrane PGN Recognition Protein LC (PGRP-LC) is a receptor of the Imd signaling pathway that is activated after infection with bacteria, mainly Gram-negative (Gram−). Here we demonstrate that bacterial infections of the malaria mosquito Anopheles gambiae are sensed by the orthologous PGRPLC protein which then activates a signaling pathway that involves the Rel/NF-κB transcription factor REL2. PGRPLC signaling leads to transcriptional induction of antimicrobial peptides at early stages of hemolymph infections with the Gram-positive (Gram+) bacterium Staphylococcus aureus, but a different signaling pathway might be used in infections with the Gram− bacterium Escherichia coli. The size of mosquito symbiotic bacteria populations and their dramatic proliferation after a bloodmeal, as well as intestinal bacterial infections, are also controlled by PGRPLC signaling. We show that this defense response modulates mosquito infection intensities with malaria parasites, both the rodent model parasite, Plasmodium berghei, and field isolates of the human parasite, Plasmodium falciparum. We propose that the tripartite interaction between mosquito microbial communities, PGRPLC-mediated antibacterial defense and infections with Plasmodium can be exploited in future interventions aiming to control malaria transmission. Molecular analysis and structural modeling provided mechanistic insights for the function of PGRPLC. Alternative splicing of PGRPLC transcripts produces three main isoforms, of which PGRPLC3 appears to have a key role in the resistance to bacteria and modulation of Plasmodium infections. Structural modeling indicates that PGRPLC3 is capable of binding monomeric PGN muropeptides but unable to initiate dimerization with other isoforms. A dual role of this isoform is hypothesized: it sequesters monomeric PGN dampening weak signals and locks other PGRPLC isoforms in binary immunostimulatory complexes further enhancing strong signals

    Effective polyploidy causes phenotypic delay and influences bacterial evolvability

    Get PDF
    Whether mutations in bacteria exhibit a noticeable delay before expressing their corresponding mutant phenotype was discussed intensively in the 1940s to 1950s, but the discussion eventually waned for lack of supportive evidence and perceived incompatibility with observed mutant distributions in fluctuation tests. Phenotypic delay in bacteria is widely assumed to be negligible, despite the lack of direct evidence. Here, we revisited the question using recombineering to introduce antibiotic resistance mutations into E. coli at defined time points and then tracking expression of the corresponding mutant phenotype over time. Contrary to previous assumptions, we found a substantial median phenotypic delay of three to four generations. We provided evidence that the primary source of this delay is multifork replication causing cells to be effectively polyploid, whereby wild-type gene copies transiently mask the phenotype of recessive mutant gene copies in the same cell. Using modeling and simulation methods, we explored the consequences of effective polyploidy for mutation rate estimation by fluctuation tests and sequencing-based methods. For recessive mutations, despite the substantial phenotypic delay, the per-copy or per-genome mutation rate is accurately estimated. However, the per-cell rate cannot be estimated by existing methods. Finally, with a mathematical model, we showed that effective polyploidy increases the frequency of costly recessive mutations in the standing genetic variation (SGV), and thus their potential contribution to evolutionary adaptation, while drastically reducing the chance that de novo recessive mutations can rescue populations facing a harsh environmental change such as antibiotic treatment. Overall, we have identified phenotypic delay and effective polyploidy as previously overlooked but essential components in bacterial evolvability, including antibiotic resistance evolution

    Cryptanalysis of a homomorphic encryption scheme

    No full text

    Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM

    No full text
    It is getting popular for users to outsource their data to a cloud system as well as leverage the high-speed computing power of this third-party platform to process the data. For the sake of data privacy, outsourced data from different users is usually encrypted under different keys. To enable users to run data mining algorithms collaboratively in the cloud, we need an efficient scheme to process the encrypted data under multiple keys. Dot product is one of the most important building blocks of data mining algorithms. In this paper, we show how to give the cloud the permission to decrypt the encrypted dot product of two encrypted vectors without compromising the privacy of the data owners. We propose the first feasible scheme that trains a SVM (Support Vector Machine) classifier for both horizontally and vertically partitioned datasets using only one server. Existing schemes either can only handle a much simpler classifier (linear mean classifier) with two non-colluding servers or can only be applied to vertically partitioned dataset. We also show that our scheme not only preserves data privacy but also runs faster than existing schemes
    corecore