163 resultados para weak-strong uniqueness
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
Resumo:
IODP Expedition 339 drilled five sites in the Gulf of Cadiz and two off the west Iberian margin (November 2011 to January 2012), and recovered 5.5 km of sediment cores with an average recovery of 86.4%. The Gulf of Cadiz was targeted for drilling as a key location for the investigation of Mediterranean outflow water (MOW) through the Gibraltar Gateway and its influence on global circulation and climate. It is also a prime area for understanding the effects of tectonic activity on evolution of the Gibraltar Gateway and on margin sedimentation. We penetrated into the Miocene at two different sites and established a strong signal of MOW in the sedimentary record of the Gulf of Cadiz, following the opening of the Gibraltar Gateway. Preliminary results show the initiation of contourite deposition at 4.2–4.5 Ma, although subsequent research will establish whether this dates the onset of MOW. The Pliocene succession, penetrated at four sites, shows low bottom current activity linked with a weak MOW. Significant widespread unconformities, present in all sites but with hiatuses of variable duration, are interpreted as a signal of intensified MOW, coupled with flow confinement. The Quaternary succession shows a much more pronounced phase of contourite drift development, with two periods of MOW intensification separated by a widespread unconformity. Following this, the final phase of drift evolution established the contourite depositional system (CDS) architecture we see today. There is a significant climate control on this evolution of MOW and bottom-current activity. However, from the closure of the Atlantic–Mediterranean gateways in Spain and Morocco just over 6 Ma and the opening of the Gibraltar Gateway at 5.3 Ma, there has been an even stronger tectonic control on margin development, downslope sediment transport and contourite drift evolution. The Gulf of Cadiz is the world's premier contourite laboratory and thus presents an ideal testing ground for the contourite paradigm. Further study of these contourites will allow us to resolve outstanding issues related to depositional processes, drift budgets, and recognition of fossil contourites in the ancient record on shore. The expedition also verified an enormous quantity and extensive distribution of contourite sands that are clean and well sorted. These represent a relatively untapped and important exploration target for potential oil and gas reservoirs.
Resumo:
Mycotoxins – from the Greek μύκης (mykes, mukos) “fungus” and the Latin (toxicum) “poison” – are a large and growing family of secondary metabolites and hence natural products produced by fungi, in particular by molds (1). It is estimated that well over 1,000 mycotoxins have been isolated and characterized so far, but this number will increase over the next few decades due the availability of more specialized analytical tools and the increasing number of fungi being isolated. However, the most important classes of fungi responsible for these compounds are Alternaria, Aspergillus (multiple forms), Penicillium, and Stachybotrys. The biological activity of mycotoxins ranges from weak and/or sometimes positive effects such as antibacterial activity (e.g. penicillin derivatives derived from Penicillium strains) to strong mutagenic (e.g. aflatoxins, patulin), carcinogenic (e.g. aflatoxins), teratogenic, neurotoxic (e.g. ochratoxins), nephrotoxic (e.g. fumonisins, citrinin), hepatotoxic, and immunotoxic (e.g. ochratoxins, diketopiperazines) activities (1, 2), which are discussed in detail in this volume.
Resumo:
Process models specify behavioral aspects by describing ordering constraints between tasks which must be accomplished to achieve envisioned goals. Tasks usually exchange information by means of data objects, i.e., by writing information to and reading information from data objects. A data object can be characterized by its states and allowed state transitions. In this paper, we propose a notion which checks conformance of a process model with respect to data objects that its tasks access. This new notion can be used to tell whether in every execution of a process model each time a task needs to access a data object in a particular state, it is ensured that the data object is in the expected state or can reach the expected state and, hence, the process model can achieve its goals.
Resumo:
The removal of fluoride using red mud has been improved by acidifying red mud with hydrochloric, nitric and sulphuric acid. This investigation shows that the removal of fluoride using red mud is significantly improved if red mud is initially acidified. The acidification of red mud causes sodalite and cancrinite phases to dissociate, confirmed by the release of sodium and aluminium into solution as well as the disappearance of sodalite bands and peaks in infrared and X-ray diffraction data. The dissolution of these mineral phases increases the amount of available iron and aluminium oxide/hydroxide sites that are accessible for the adsorption of fluoride. The removal of fluoride is dependent on the charge of iron and aluminium oxide/hydroxides on the surface of red mud. Acidifying red mud with hydrochloric, nitric and sulphuric acid resulted in surface sites of the form ≡ SOH2+ and ≡ SOH. Optimum removal is obtained when the majority of surface sites are in the form ≡ SOH2+ as the substitution of a fluoride ion doesn’t cause a significant increase in pH. This investigation shows the importance of having a low and consistent pH for the removal of fluoride from aqueous solutions using red mud.
Resumo:
The expression of neutrophil gelatinase-associated lipocalin (NGAL) has been shown to be upregulated in ovarian cancer cells. In this study, we report that the expression of immunoreactive NGAL (irNGAL) in ovarian tumors changes with disease grade and that this change is reflected in the concentration of NGAL in peripheral blood. A total of 59 ovarian tissues including normal, benign, borderline malignant and grades 1, 2 and 3 malignant were analyzed using immunohistochemistry. irNGAL was not present in normal ovaries and the NGAL expression was weak to moderate in benign tissues. Both borderline and grade 1 tumors displayed the highest amount of NGAL expression with moderate to strong staining, whereas in grade 2 and 3 tumors, the extent of staining was significantly less (p < 0.01) and staining intensity was weak to moderate. Staining in all cases was confined to the epithelium. NGAL expression was analyzed by ELISA in 62 serum specimens from normal and different grades of cancer patients. Compared to control samples, the NGAL concentration was 2 and 2.6-fold higher in the serum of patients with benign tumors and cancer patients with grade 1 tumors (p < 0.05) and that result was consistent with the expression of NGAL performed by Western blot. NGAL expression was evaluated by Western blot in an immortalized normal ovarian cell line (IOSE29) as well as ovarian cancer cell lines. Moderate to strong expression of NGAL was observed in epithelial ovarian cancer cell lines SKOV3 and OVCA433 while no expression of NGAL was evident in normal IOSE29 and mesenchyme-like OVHS1, PEO.36 and HEY cell lines. NGAL expression was downregulated in ovarian cancer cell lines undergoing epithelio-mesenchymal transition (EMT) induced by epidermal growth factor (EGF). Down-regulation of NGAL expression correlated with the upregulation of vimentin expression, enhanced cell dispersion and downregulation of E-cadherin expression, some of the hallmarks of EMT. EGF-induced EMT phenotypes were inhibited in the presence of AG1478, an inhibitor of EGF receptor tyrosine kinase activity. These data indicate that NGAL may be a good marker to monitor changes of benign to premalignant and malignant ovarian tumors and that the molecule may be involved in the progression of epithelial ovarian malignancies.
Resumo:
Aim To establish the suitability of multiplex tandem polymerase chain reaction (MT-PCR) for rapid identification of oestrogen receptor (ER) and Her-2 status using a single, formalin-fixed, paraffin-embedded (FFPE) breast tumour section. Methods Tissue sections from 29 breast tumours were analysed by immunohistochemistry (IHC) and fluorescence in situ hybridisation (FISH). RNA extracted from 10μm FFPE breast tumour sections from 24 of 29 tumours (14 ER positive and 5 Her-2 positive) was analysed by MT-PCR. After establishing a correlation between IHC and/or FISH and MT-PCR results, the ER/Her-2 status of a further 32 randomly selected, archival breast tumour specimens was established by MT-PCR in a blinded fashion, and compared to IHC/FISH results. Results MT-PCR levels of ER and Her-2 showed good concordance with IHC and FISH results. Furthermore, among the ER positive tumours, MT-PCR provided a quantitative score with a high dynamic range. Threshold values obtained from this data set applied to 32 archival tumour specimens showed that tumours strongly positive for ER and/or Her-2 expression were easily identified by MT-PCR. Conclusion MT-PCR can provide rapid, sensitive and cost-effective analysis of FFPE material and may prove useful as triage to identify patients suited to endocrine or trastuzumab (Herceptin) treatment.
Resumo:
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions
Resumo:
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.
Resumo:
Controlling the electrical resistance of granular thin films is of great importance for many applications, yet a full understanding of electron transport in such films remains a major challenge. We have studied experimentally and by model calculations the temperature dependence of the electrical resistance of ultrathin gold films at temperatures between 2 K and 300 K. Using sputter deposition, the film morphology was varied from a discontinuous film of weakly coupled meandering islands to a continuous film of strongly coupled coalesced islands. In the weak-coupling regime, we compare the regular island array model, the cotunneling model, and the conduction percolation model with our experimental data. We show that the tunnel barriers and the Coulomb blockade energies are important at low temperatures and that the thermal expansion of the substrate and the island resistance affect the resistance at high temperatures. At low temperatures our experimental data show evidence for a transition from electron cotunneling to sequential tunneling but the data can also be interpreted in terms of conduction percolation. The resistivity and temperature coefficient of resistance of the meandering gold islands are found to resemble those of gold nanowires. We derive a simple expression for the temperature at which the resistance changes from non-metal-like behavior into metal-like behavior. In the case of strong island coupling, the total resistance is solely determined by the Ohmic island resistance.
Resumo:
The effect of a SiO2 nanolayer and annealing temperature on the UV/visible room-temperature photoluminescence (PL) from SiNx films synthesized by rf magnetron sputtering is studied. The PL intensity can be maximized when the SiO2 layer is 510 nm thick at 800 °C annealing temperature and only 2 nm at 1000 °C. A compositionstructureproperty analysis reveals that the PL intensity is directly related to both the surface chemical states and the content of the SiO and SiN bonds in the SiNx films. These results are relevant for the development of advanced optoelectronic and photonic emitters and sensors. © 2010 Elsevier B.V. All rights reserved.
Resumo:
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.