88 research outputs found

    Nanovesicles from Malassezia sympodialis and Host Exosomes Induce Cytokine Responses – Novel Mechanisms for Host-Microbe Interactions in Atopic Eczema

    Get PDF
    BACKGROUND: Intercellular communication can occur via the release of membrane vesicles. Exosomes are nanovesicles released from the endosomal compartment of cells. Depending on their cell of origin and their cargo they can exert different immunoregulatory functions. Recently, fungi were found to produce extracellular vesicles that can influence host-microbe interactions. The yeast Malassezia sympodialis which belongs to our normal cutaneous microbial flora elicits specific IgE- and T-cell reactivity in approximately 50% of adult patients with atopic eczema (AE). Whether exosomes or other vesicles contribute to the inflammation has not yet been investigated. OBJECTIVE: To investigate if M. sympodialis can release nanovesicles and whether they or endogenous exosomes can activate PBMC from AE patients sensitized to M. sympodialis. METHODS: Extracellular nanovesicles isolated from M. sympodialis, co-cultures of M. sympodialis and dendritic cells, and from plasma of patients with AE and healthy controls (HC) were characterised using flow cytometry, sucrose gradient centrifugation, Western blot and electron microscopy. Their ability to stimulate IL-4 and TNF-alpha responses in autologous CD14, CD34 depleted PBMC was determined using ELISPOT and ELISA, respectively. RESULTS: We show for the first time that M. sympodialis releases extracellular vesicles carrying allergen. These vesicles can induce IL-4 and TNF-α responses with a significantly higher IL-4 production in patients compared to HC. Exosomes from dendritic cell and M. sympodialis co-cultures induced IL-4 and TNF-α responses in autologous CD14, CD34 depleted PBMC of AE patients and HC while plasma exosomes induced TNF-α but not IL-4 in undepleted PBMC. CONCLUSIONS: Extracellular vesicles from M. sympodialis, dendritic cells and plasma can contribute to cytokine responses in CD14, CD34 depleted and undepleted PBMC of AE patients and HC. These novel observations have implications for understanding host-microbe interactions in the pathogenesis of AE

    Forward Secrecy of SPAKE2

    Get PDF
    Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3. Although it has been proven secure in the Find-then-Guess model of Bellare, Pointcheval and Rogaway (EUROCRYPT 2000), whether it satisfies some notion of forward secrecy remains an open question. In this work, we prove that the SPAKE2 protocol satisfies the so-called weak forward secrecy introduced by Krawczyk (CRYPTO 2005). Furthermore, we demonstrate that the incorporation of key-confirmation codes in SPAKE2 results in a protocol that provably satisfies the stronger notion of perfect forward secrecy. As forward secrecy is an explicit requirement for cipher suites supported in the TLS handshake, we believe this work could fill the gap in the literature and facilitate the adoption of SPAKE2 in the recently approved TLS 1.3

    Overexpression of the Mitochondrial T3 Receptor p43 Induces a Shift in Skeletal Muscle Fiber Types

    Get PDF
    In previous studies, we have characterized a new hormonal pathway involving a mitochondrial T3 receptor (p43) acting as a mitochondrial transcription factor and consequently stimulating mitochondrial activity and mitochondrial biogenesis. We have established the involvement of this T3 pathway in the regulation of in vitro myoblast differentiation.We have generated mice overexpressing p43 under control of the human α-skeletal actin promoter. In agreement with the previous characterization of this promoter, northern-blot and western-blot experiments confirmed that after birth p43 was specifically overexpressed in skeletal muscle. As expected from in vitro studies, in 2-month old mice, p43 overexpression increased mitochondrial genes expression and mitochondrial biogenesis as attested by the increase of mitochondrial mass and mt-DNA copy number. In addition, transgenic mice had a body temperature 0.8°C higher than control ones and displayed lower plasma triiodothyronine levels. Skeletal muscles of transgenic mice were redder than wild-type animals suggesting an increased oxidative metabolism. In line with this observation, in gastrocnemius, we recorded a strong increase in cytochrome oxidase activity and in mitochondrial respiration. Moreover, we observed that p43 drives the formation of oxidative fibers: in soleus muscle, where MyHC IIa fibers were partly replaced by type I fibers; in gastrocnemius muscle, we found an increase in MyHC IIa and IIx expression associated with a reduction in the number of glycolytic fibers type IIb. In addition, we found that PGC-1α and PPARδ, two major regulators of muscle phenotype were up regulated in p43 transgenic mice suggesting that these proteins could be downstream targets of mitochondrial activity. These data indicate that the direct mitochondrial T3 pathway is deeply involved in the acquisition of contractile and metabolic features of muscle fibers in particular by regulating PGC-1α and PPARδ

    On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy

    Get PDF
    Password-based Authenticated Key-Exchange (PAKE) protocols allow the establishment of secure communication entirely based on the knowledge of a shared password. Over the last two decades, we have witnessed the debut of a number of prominent security models for PAKE protocols, whose aim is to capture the desired security properties that such protocols must satisfy when executed in the presence of an active adversary. These models are usually classified into (i) indistinguishability-based (IND-based) or (ii) simulation-based (SIM-based). However, the relation between these two security notions is unclear and mentioned as a gap in the literature. In this work, we prove that SIM-BMP security from Boyko et al. (EUROCRYPT 2000) implies IND-RoR security from Abdalla et al. (PKC 2005) and that IND-RoR security is equivalent to a slightly modified version of SIM-BMP security. We also investigate whether IND-RoR security implies (unmodified) SIM-BMP security. The results obtained also hold when forward secrecy is incorporated into the security models in question

    Zum Zusammenhang von Geschlechterungleichheiten in Bildung, Beruf und Karriere : ein Ausblick

    Get PDF
    Ziel der folgenden Ausführungen im abschliessenden Teil dieses Sammelbands zur Entwicklung und Genese von geschlechtsspezifischen Bildungsungleichheiten ist es, den Blick zu öffnen in Richtung Berufsleben. Wie sind die verbesserten Bildungsmöglichkeiten von Frauen zu interpretieren? Ist es in den letzten Jahrzehnten gelungen, eines der grundlegendsten gesellschaftlichen Ungleichheitsverhältnisse zu beseitigen? Oder beginnt sich dieses sogar zu verkehren in eine gesellschaftliche Benachteiligung der Männer? Wir gehen bei unseren Überlegungen von der These aus, dass ein Abbau von Benachteiligungen der Frauen im Bildungssystem für sich genommen noch wenig aussagekräftig ist, wenn wir uns mit der klassischen soziologischen Frage der Persistenz bzw. des Wandels von gesellschaftlichen Ungleichheiten befassen wollen. Erst wenn die ganze Verknüpfung von Bildung und gesellschaftlicher Ungleichheit in den Blick genommen wird und sich dabei zeigt, dass Frauen ihre Bildungsgewinne auch in entsprechende Chancen im Beschäftigungssystem umsetzen können, sind ihre verbesserten Bildungschancen ein Gewinn für die Individuen und ein Fortschritt für die Gesellschaft – und erst dann könnten mögliche Bildungsvorteile von Frauen, wie sie in den vorliegenden Aufsätzen z.T. diagnostiziert werden, gar als neue gesellschaftliche Benachteiligungen von Männern skandalisiert werden

    16p11.2 600 kb Duplications confer risk for typical and atypical Rolandic epilepsy

    Get PDF
    Rolandic epilepsy (RE) is the most common idiopathic focal childhood epilepsy. Its molecular basis is largely unknown and a complex genetic etiology is assumed in the majority of affected individuals. The present study tested whether six large recurrent copy number variants at 1q21, 15q11.2, 15q13.3, 16p11.2, 16p13.11 and 22q11.2 previously associated with neurodevelopmental disorders also increase risk of RE. Our association analyses revealed a significant excess of the 600 kb genomic duplication at the 16p11.2 locus (chr16: 29.5-30.1 Mb) in 393 unrelated patients with typical (n = 339) and atypical (ARE; n = 54) RE compared with the prevalence in 65 046 European population controls (5/393 cases versus 32/65 046 controls; Fisher's exact test P = 2.83 × 10−6, odds ratio = 26.2, 95% confidence interval: 7.9-68.2). In contrast, the 16p11.2 duplication was not detected in 1738 European epilepsy patients with either temporal lobe epilepsy (n = 330) and genetic generalized epilepsies (n = 1408), suggesting a selective enrichment of the 16p11.2 duplication in idiopathic focal childhood epilepsies (Fisher's exact test P = 2.1 × 10−4). In a subsequent screen among children carrying the 16p11.2 600 kb rearrangement we identified three patients with RE-spectrum epilepsies in 117 duplication carriers (2.6%) but none in 202 carriers of the reciprocal deletion. Our results suggest that the 16p11.2 duplication represents a significant genetic risk factor for typical and atypical R

    Secure Blind Decryption

    Get PDF
    Abstract. In this work we construct public key encryption schemes that admit a protocol for blindly decrypting ciphertexts. In a blind decryp-tion protocol, a user with a ciphertext interacts with a secret keyholder such that the user obtains the decryption of the ciphertext and the key-holder learns nothing about what it decrypted. While we are not the first to consider this problem, previous works provided only weak secu-rity guarantees against malicious users. We provide, to our knowledge, the first practical blind decryption schemes that are secure under a strong CCA security definition. We prove our construction secure in the stan-dard model under simple, well-studied assumptions in bilinear groups. To motivate the usefulness of this primitive we discuss several applica-tions including privacy-preserving distributed file systems and Oblivious Transfer schemes that admit public contribution.

    Accelerated surgery versus standard care in hip fracture (HIP ATTACK): an international, randomised, controlled trial

    Get PDF
    • …
    corecore