997 resultados para LATTICE-GAS
Resumo:
Gas-phase transformation of synthetic phosphatidylcholine (PC) monocations to structurally informative anions is demonstrated via ion/ion reactions with doubly deprotonated 1,4-phenylenedipropionic acid (PDPA). Two synthetic PC isomers, 1-palmitoyl-2-oleoyl-sn-glycero-3-phosphocholine (PC16:0/18:1) and 1-oleoyl-2-palmitoyl-sn-glycero-3-phosphocholine (PC18:1/16:0), were subjected to this ion/ion chemistry. The product of the ion/ion reaction is a negatively charged complex, \[PC + PDPA - H](-). Collisional activation of the long-lived complex causes transfer of a proton and methyl cation to PDPA, generating \[PC - CH3](-). Subsequent collisional activation of the demethylated PC anions produces abundant fatty acid carboxylate anions and low-abundance acyl neutral losses as free acids and ketenes. Product ion spectra of \[PC - CH3](-) suggest favorable cleavage at the sn-2 position over the sn-1 due to distinct differences in the relative abundances. In contrast, collisional activation of PC cations is absent of abundant fatty acid chain-related product ions and typically indicates only the lipid class via formation of the phosphocholine cation. A solution phase method to produce the gas-phase adducted PC anion is also demonstrated. Product ion spectra derived from the solution phase method are similar to the results generated via ion/ion chemistry. This work demonstrates a gas-phase means to increase structural characterization of phosphatidylcholines via ion/ion chemistry. Grant Number ARC/CE0561607, ARC/DP120102922
Resumo:
Proton-bound dimers consisting of two glycerophospholipids with different headgroups were prepared using negative ion electrospray ionization and dissociated in a triple quadrupole mass spectrometer. Analysis of the tandem mass spectra of the dimers using the kinetic method provides, for the first time, an order of acidity for the phospholipid classes in the gas phase of PE < PA << PG < PS < PI. Hybrid density functional calculations on model phospholipids were used to predict the absolute deprotonation enthalpies of the phospholipid classes from isodesmic proton transfer reactions with phosphoric acid. The computational data largely support the experimental acidity trend, with the exception of the relative acidity ranking of the two most acidic phospholipid species. Possible causes of the discrepancy between experiment and theory are discussed and the experimental trend is recommended. The sequence of gas phase acidities for the phospholipid headgroups is found to (1) have little correlation with the relative ionization efficiencies of the phospholipid classes observed in the negative ion electrospray process, and (2) correlate well with fragmentation trends observed upon collisional activation of phospholipid \[M - H](-) anions. (c) 2005 American Society for Mass Spectrometry.
Resumo:
Introduction The admission to the Intensive Care Unit with a diagnosis of sepsis and/or septic shock is not uncommon. The aim of this article is to present a nursing case review of a patient admitted to the intensive care unit with a diagnosis of septic shock and the use of bedside acid–base formulae to inform clinical decision making. Method We chose to use a case review. This method is useful in reporting unusual or rare cases and is typically seen more in medicine than in nursing. Discussion The gentleman in question was a self-presentation with a short history of fever and worsening shortness of breath. His condition worsened where he required admission to the intensive care unit. The use of ‘advanced’ acid–base interpretation to guide his nursing care provided a platform from which to advance a deeper understanding of the intricacies the critically ill patient often presents. Conclusion The use of case review is enlightening in understanding the disease process and the decision-making that accompanies this. The lessons learnt are applicable to a wider nursing audience because understanding acid–base physiology is beneficial in supporting and advancing critical care nursing practice.
Resumo:
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchical identity-based encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based HIBEs and in some cases result in shorter ciphertexts and private keys. We prove security from classic lattice hardness assumptions.
Resumo:
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in the construction is a family of lattices for which there are two distinct trapdoors for finding short vectors. One trapdoor enables the real system to generate short vectors in all lattices in the family. The other trapdoor enables the simulator to generate short vectors for all lattices in the family except for one. We extend this basic technique to an adaptively-secure IBE and a Hierarchical IBE.
Resumo:
We propose a framework for adaptive security from hard random lattices in the standard model. Our approach borrows from the recent Agrawal-Boneh-Boyen families of lattices, which can admit reliable and punctured trapdoors, respectively used in reality and in simulation. We extend this idea to make the simulation trapdoors cancel not for a specific forgery but on a non-negligible subset of the possible challenges. Conceptually, we build a compactly representable, large family of input-dependent “mixture” lattices, set up with trapdoors that “vanish” for a secret subset which we hope the forger will target. Technically, we tweak the lattice structure to achieve “naturally nice” distributions for arbitrary choices of subset size. The framework is very general. Here we obtain fully secure signatures, and also IBE, that are compact, simple, and elegant.
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
The invention of asymmetric encryption back in the seventies was a conceptual leap that vastly increased the expressive power of encryption of the times. For the first time, it allowed the sender of a message to designate the intended recipient in an cryptographic way, expressed as a “public key” that was related to but distinct from the “private key” that, alone, embodied the ability to decrypt. This made large-scale encryption a practical and scalable endeavour, and more than anything else—save the internet itself—led to the advent of electronic commerce as we know and practice it today.
Resumo:
Different amounts of Ru were implanted into thermally evaporated WO3 thin films by ion implantation. The films were subsequently annealed at 600oC for 2 hours in air to remove defects generated during the ion implantation. The Ru concentrations of four samples have been quantified by Rutherford Backscattering Spectrometry as 0.8, 5.5, 9 and 11.5 at%. The un-implanted WO3 films were highly porous but the porosity decreased significantly after ion implantation as observed by Transmission Electron Microscopy and Scanning Electron Microscopy. The thickness of the films also decreased with increasing Ru-ion dose, which is mainly due to densification of the porous films during ion implantation. From Raman spectroscopy two peaks at 408 and 451 cm-1 (in addition to the typical vibrational peaks of the monoclinic WO3 phase) associated with Ru were observed. Their intensity increased with increasing Ru concentration. X-Ray Photoelectron Spectroscopy showed a metallic state of Ru with binding energy of Ru 3d5/2 at 280.1 eV. This peak position remained almost unchanged with increasing Ru concentration. The resistances of the Ru-implanted films were found to increase in the presence of NO2 and NO with higher sensor response to NO2. The effect of Ru concentration on the sensing performance of the films was not explicitly observed due to reduced film thickness and porosity with increasing Ru concentration. However, the results indicate that the implantation of Ru into WO3 films with sufficient film porosity and film thickness can be beneficial for NO2 sensing at temperatures in the range of 250°C to 350°C.
Resumo:
alpha-Carboxylate radical anions are potential reactive intermediates in the free radical oxidation of biological molecules (e. g., fatty acids, peptides and proteins). We have synthesised well-defined alpha-carboxylate radical anions in the gas phase by UV laser photolysis of halogenated precursors in an ion-trap mass spectrometer. Reactions of isolated acetate ((center dot)CH(2)CO(2)) and 1-carboxylatobutyl (CH(3)CH(2)CH(2)(center dot)CHCO(2)(-)) radical anions with dioxygen yield carbonate (CO(3)(center dot-)) radical anions and this chemistry is shown to be a hallmark of oxidation in simple and alkyl-substituted cross-conjugated species. Previous solution phase studies have shown that C(alpha)-radicals in peptides, formed from free radical damage, combine with dioxygen to form peroxyl radicals that subsequently decompose into imine and keto acid products. Here, we demonstrate that a novel alternative pathway exists for two alpha-carboxylate C(alpha)-radical anions: the acetylglycinate radical anion (CH(3)C(O)NH(center dot)CHCO(2)(-)) and the model peptide radical anion, YGGFG(center dot-). Reaction of these radical anions with dioxygen results in concerted loss of carbon dioxide and hydroxyl radical. The reaction of the acetylglycinate radical anion with dioxygen reveals a two-stage process involving a slow, followed by a fast kinetic regime. Computational modelling suggests the reversible formation of the C(alpha) peroxyl radical facilitates proton transfer from the amide to the carboxylate group, a process reminiscent of, but distinctive from, classical proton-transfer catalysis. Interestingly, inclusion of this isomerization step in the RRKM/ME modelling of a G3SX level potential energy surface enables recapitulation of the experimentally observed two-stage kinetics.
Resumo:
Aromatic radicals form in a variety of reacting gas-phase systems, where their molecular weight growth reactions with unsaturated hydrocarbons are of considerable importance. We have investigated the ion-molecule reaction of the aromatic distonic N-methyl-pyridinium-4-yl (NMP) radical cation with 2-butyne (CH3C CCH3) using ion trap mass spectrometry. Comparison is made to high-level ab initio energy surfaces for the reaction of NMP and for the neutral phenyl radical system. The NMP radical cation reacts rapidly with 2-butyne at ambient temperature, due to the apparent absence of any barrier. The activated vinyl radical adduct predominantly dissociates via loss of a H atom, with lesser amounts of CH3 loss. High-resolution Fourier transform ion cyclotron resonance (FT-ICR) mass spectrometry allows us to identify small quantities of the collisionally deactivated reaction adduct. Statistical reaction rate theory calculations (master equation/RRKM theory) on the NMP + 2-butyne system support our experimental findings, and indicate a mechanism that predominantly involves an allylic resonance-stabilized radical formed via H atom shuttling between the aromatic ring and the C-4 side-chain, followed by cyclization and/or low-energy H atom beta-scission reactions. A similar mechanism is demonstrated for the neutral phenyl radical (Ph center dot)+2-butyne reaction, forming products that include 3-methylindene. The collisionally deactivated reaction adduct is predicted to be quenched in the form of a resonance-stabilized methylphenylallyl radical. Experiments using a 2,5-dichloro substituted methyl-pyridiniumyl radical cation revealed that in this case CH3 loss from the 2-butyne adduct is favoured over H atom loss, verifying the key role of ortho H atoms, and the shuttling mechanism, in the reactions of aromatic radicals with alkynes. As well as being useful phenyl radical analogues, pyridiniumyl radical cations may form in the ionosphere of Titan, where they could undergo rapid molecular weight growth reactions to yield polycyclic aromatic nitrogen hydrocarbons (PANHs).
Resumo:
The phenylperoxyl radical has long been accepted as a critical intermediate in the oxidation of benzene and an archetype for arylperoxyl radicals in combustion and atmospheric chemistry. Despite being central to many contemporary mechanisms underpinning these chemistries, reports of the direct detection or isolation of phenylperoxyl radicals are rare and there is little experimental evidence connecting this intermediate with expected product channels. We have prepared and isolated two charge-tagged phenyl radical models in the gas phase [i.e., 4-(N,N,N-trimethylammonium) phenyl radical cation and 4-carboxylatophenyl radical anion] and observed their reactions with dioxygen by ion-trap mass spectrometry. Measured reaction rates show good agreement with prior reports for the neutral system (k(2)[(Me3N+)C6H4 center dot + O-2] = 2.8 x 10(-11) cm(3) molecule(-1) s(-1), Phi = 4.9%; k(2)[(-O2C)C6H4 center dot + O-2] = 5.4 x 10(-1)1 cm(3) molecule(-1) s(-1), Phi = 9.2%) and the resulting mass spectra provide unequivocal evidence for the formation of phenylperoxyl radicals. Collisional activation of isolated phenylperoxyl radicals reveals unimolecular decomposition by three pathways: (i) loss of dioxygen to reform the initial phenyl radical; (ii) loss of atomic oxygen yielding a phenoxyl radical; and (iii) ejection of the formyl radical to give cyclopentadienone. Stable isotope labeling confirms these assignments. Quantum chemical calculations for both charge-tagged and neutral phenylperoxyl radicals confirm that loss of formyl radical is accessible both thermodynamically and entropically and competitive with direct loss of both hydrogen atom and carbon dioxide.
Resumo:
The ion (C6CH2)(.-) is formed in the gas phase by the process -C=C-C=C-C=CH2OEt --> (C6CH2)(.-) + EtO., and charge stripping of the product radical anion yields the carbenoid neutral C6CH2; this can be either a singlet (the ground state), which is best represented as the carbene :C=C=C=C=C=C=CH2, or a triplet; the adiabatic electron affinity and the dipole moment of the carbenoid neutral are calculated to be 2.82 eV and 7.33 D respectively.