1,411 research outputs found
Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries
We propose an efficient framework for enabling secure multi-party numerical
computations in a Peer-to-Peer network. This problem arises in a range of
applications such as collaborative filtering, distributed computation of trust
and reputation, monitoring and other tasks, where the computing nodes is
expected to preserve the privacy of their inputs while performing a joint
computation of a certain function. Although there is a rich literature in the
field of distributed systems security concerning secure multi-party
computation, in practice it is hard to deploy those methods in very large scale
Peer-to-Peer networks. In this work, we try to bridge the gap between
theoretical algorithms in the security domain, and a practical Peer-to-Peer
deployment.
We consider two security models. The first is the semi-honest model where
peers correctly follow the protocol, but try to reveal private information. We
provide three possible schemes for secure multi-party numerical computation for
this model and identify a single light-weight scheme which outperforms the
others. Using extensive simulation results over real Internet topologies, we
demonstrate that our scheme is scalable to very large networks, with up to
millions of nodes. The second model we consider is the malicious peers model,
where peers can behave arbitrarily, deliberately trying to affect the results
of the computation as well as compromising the privacy of other peers. For this
model we provide a fourth scheme to defend the execution of the computation
against the malicious peers. The proposed scheme has a higher complexity
relative to the semi-honest model. Overall, we provide the Peer-to-Peer network
designer a set of tools to choose from, based on the desired level of security.Comment: Submitted to Peer-to-Peer Networking and Applications Journal (PPNA)
200
Heterogeneity in glucose response curves during an oral glucose tolerance test and associated cardiometabolic risk
We aimed to examine heterogeneity in glucose response curves during an oral glucose tolerance test with multiple measurements and to compare cardiometabolic risk profiles between identified glucose response curve groups. We analyzed data from 1,267 individuals without diabetes from five studies in Denmark, the Netherlands and the USA. Each study included between 5 and 11 measurements at different time points during a 2-h oral glucose tolerance test, resulting in 9,602 plasma glucose measurements. Latent class trajectories with a cubic specification for time were fitted to identify different patterns of plasma glucose change during the oral glucose tolerance test. Cardiometabolic risk factor profiles were compared between the identified groups. Using latent class trajectory analysis, five glucose response curves were identified. Despite similar fasting and 2-h values, glucose peaks and peak times varied greatly between groups, ranging from 7-12 mmol/L, and 35-70 min. The group with the lowest and earliest plasma glucose peak had the lowest estimated cardiovascular risk, while the group with the most delayed plasma glucose peak and the highest 2-h value had the highest estimated risk. One group, with normal fasting and 2-h values, exhibited an unusual profile, with the highest glucose peak and the highest proportion of smokers and men. The heterogeneity in glucose response curves and the distinct cardiometabolic risk profiles may reflect different underlying physiologies. Our results warrant more detailed studies to identify the source of the heterogeneity across the different phenotypes and whether these differences play a role in the development of type 2 diabetes and cardiovascular disease
Prevalence of Disorders Recorded in Dogs Attending Primary-Care Veterinary Practices in England
Purebred dog health is thought to be compromised by an increasing occurence of inherited diseases but inadequate prevalence data on common disorders have hampered efforts to prioritise health reforms. Analysis of primary veterinary practice clinical data has been proposed for reliable estimation of disorder prevalence in dogs. Electronic patient record (EPR) data were collected on 148,741 dogs attending 93 clinics across central and south-eastern England. Analysis in detail of a random sample of EPRs relating to 3,884 dogs from 89 clinics identified the most frequently recorded disorders as otitis externa (prevalence 10.2%, 95% CI: 9.1-11.3), periodontal disease (9.3%, 95% CI: 8.3-10.3) and anal sac impaction (7.1%, 95% CI: 6.1-8.1). Using syndromic classification, the most prevalent body location affected was the head-and-neck (32.8%, 95% CI: 30.7-34.9), the most prevalent organ system affected was the integument (36.3%, 95% CI: 33.9-38.6) and the most prevalent pathophysiologic process diagnosed was inflammation (32.1%, 95% CI: 29.8-34.3). Among the twenty most-frequently recorded disorders, purebred dogs had a significantly higher prevalence compared with crossbreds for three: otitis externa (P = 0.001), obesity (P = 0.006) and skin mass lesion (P = 0.033), and popular breeds differed significantly from each other in their prevalence for five: periodontal disease (P = 0.002), overgrown nails (P = 0.004), degenerative joint disease (P = 0.005), obesity (P = 0.001) and lipoma (P = 0.003). These results fill a crucial data gap in disorder prevalence information and assist with disorder prioritisation. The results suggest that, for maximal impact, breeding reforms should target commonly-diagnosed complex disorders that are amenable to genetic improvement and should place special focus on at-risk breeds. Future studies evaluating disorder severity and duration will augment the usefulness of the disorder prevalence information reported herein
The yeast P5 type ATPase, Spf1, regulates manganese transport into the endoplasmic reticulum
The endoplasmic reticulum (ER) is a large, multifunctional and essential organelle. Despite intense research, the function of more than a third of ER proteins remains unknown even in the well-studied model organism Saccharomyces cerevisiae. One such protein is Spf1, which is a highly conserved, ER localized, putative P-type ATPase. Deletion of SPF1 causes a wide variety of phenotypes including severe ER stress suggesting that this protein is essential for the normal function of the ER. The closest homologue of Spf1 is the vacuolar P-type ATPase Ypk9 that influences Mn2+ homeostasis. However in vitro reconstitution assays with Spf1 have not yielded insight into its transport specificity. Here we took an in vivo approach to detect the direct and indirect effects of deleting SPF1. We found a specific reduction in the luminal concentration of Mn2+ in ∆spf1 cells and an increase following it’s overexpression. In agreement with the observed loss of luminal Mn2+ we could observe concurrent reduction in many Mn2+-related process in the ER lumen. Conversely, cytosolic Mn2+-dependent processes were increased. Together, these data support a role for Spf1p in Mn2+ transport in the cell. We also demonstrate that the human sequence homologue, ATP13A1, is a functionally conserved orthologue. Since ATP13A1 is highly expressed in developing neuronal tissues and in the brain, this should help in the study of Mn2+-dependent neurological disorders
Observation of associated near-side and away-side long-range correlations in √sNN=5.02 TeV proton-lead collisions with the ATLAS detector
Two-particle correlations in relative azimuthal angle (Δϕ) and pseudorapidity (Δη) are measured in √sNN=5.02 TeV p+Pb collisions using the ATLAS detector at the LHC. The measurements are performed using approximately 1 μb-1 of data as a function of transverse momentum (pT) and the transverse energy (ΣETPb) summed over 3.1<η<4.9 in the direction of the Pb beam. The correlation function, constructed from charged particles, exhibits a long-range (2<|Δη|<5) “near-side” (Δϕ∼0) correlation that grows rapidly with increasing ΣETPb. A long-range “away-side” (Δϕ∼π) correlation, obtained by subtracting the expected contributions from recoiling dijets and other sources estimated using events with small ΣETPb, is found to match the near-side correlation in magnitude, shape (in Δη and Δϕ) and ΣETPb dependence. The resultant Δϕ correlation is approximately symmetric about π/2, and is consistent with a dominant cos2Δϕ modulation for all ΣETPb ranges and particle pT
Search for new phenomena in final states with an energetic jet and large missing transverse momentum in pp collisions at √ s = 8 TeV with the ATLAS detector
Results of a search for new phenomena in final states with an energetic jet and large missing transverse momentum are reported. The search uses 20.3 fb−1 of √ s = 8 TeV data collected in 2012 with the ATLAS detector at the LHC. Events are required to have at least one jet with pT > 120 GeV and no leptons. Nine signal regions are considered with increasing missing transverse momentum requirements between Emiss T > 150 GeV and Emiss T > 700 GeV. Good agreement is observed between the number of events in data and Standard Model expectations. The results are translated into exclusion limits on models with either large extra spatial dimensions, pair production of weakly interacting dark matter candidates, or production of very light gravitinos in a gauge-mediated supersymmetric model. In addition, limits on the production of an invisibly decaying Higgs-like boson leading to similar topologies in the final state are presente
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
Public Blockchains on their own are, by definition, incapable of keeping data private and disclosing it at a later time. Control over the eventual disclosure of private data must be maintained outside a Blockchain by withholding and later publishing encryption keys, for example. We propose the Atomic Information Disclosure (AID) pattern based on threshold encryption that allows a set of key holders to govern the release of data without having access to it. We motivate this pattern with problems that require independently reproduced solutions. By keeping submissions private until a deadline expires, participants are unable to plagiarise and must therefore generate their own solutions which can then be aggregated and analysed to determine a final answer. We outline the importance of a game-theoretically sound incentive scheme, possible attacks, and other future work
The counselling self-estimate inventory (COSE): Does it work in Chinese counsellors?
Counselling self-efficacy is an important construct for research and evaluation in counsellors' competencies and training effectiveness. Larson et al. developed the Counselling Self-Estimate Inventory (COSE) for counsellors in America and examined its factor structure using exploratory factor analysis. They recommended a five-factor model (microskills, counselling process, difficult client behaviour, cultural competence, and awareness of values) and the use of the COSE for future research. However, little research has investigated the validity of the COSE in the context of counselling Chinese students in schools. In the present study, the factor structure of responses to the Chinese version of the Counselling Self-Estimate Inventory in a sample of 578 Hong Kong secondary school guidance teachers was examined using the EQS approach to confirmatory factor analysis. The results showed that while a five-factor model was fairly able to fit the data, the deletion of items related to the awareness of values factor yielded a better fitting model. The discussion of potential uses and limitations of the C-COSE in the context of preparing and supervising school guidance personnel in student counselling is relevant to counselling psychologists and researchers in Hong Kong and other parts of the world.postprin
Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks
In multi-path routing schemes for payment-channel networks, Alice transfers
funds to Bob by splitting them into partial payments and routing them along
multiple paths. Undisclosed channel balances and mismatched transaction fees
cause delays and failures on some payment paths. For atomic transfer schemes,
these straggling paths stall the whole transfer. We show that the latency of
transfers reduces when redundant payment paths are added. This frees up
liquidity in payment channels and hence increases the throughput of the
network. We devise Boomerang, a generic technique to be used on top of
multi-path routing schemes to construct redundant payment paths free of
counterparty risk. In our experiments, applying Boomerang to a baseline routing
scheme leads to 40% latency reduction and 2x throughput increase. We build on
ideas from publicly verifiable secret sharing, such that Alice learns a secret
of Bob iff Bob overdraws funds from the redundant paths. Funds are forwarded
using Boomerang contracts, which allow Alice to revert the transfer iff she has
learned Bob's secret. We implement the Boomerang contract in Bitcoin Script
The mismeasure of ape social cognition
In his classic analysis, The Mismeasure of Man, Gould (1981) demolished the idea that intelligence was an inherent, genetic trait of different human groups by emphasizing, among other things, (a) its sensitivity to environmental input, (b) the incommensurate pre-test preparation of different human groups, and (c) the inadequacy of the testing contexts, in many cases. According to Gould, the root cause of these oversights was confirmation bias by psychometricians, an unwarranted commitment to the idea that intelligence was a fixed, immutable quality of people. By virtue of a similar, systemic interpretive bias, in the last two decades, numerous contemporary researchers in comparative psychology have claimed human superiority over apes in social intelligence, based on two-group comparisons between postindustrial, Western Europeans and captive apes, where the apes have been isolated from European styles of social interaction, and tested with radically different procedures. Moreover, direct comparisons of humans with apes suffer from pervasive lapses in argumentation: Research designs in wide contemporary use are inherently mute about the underlying psychological causes of overt behavior. Here we analyze these problems and offer a more fruitful approach to the comparative study of social intelligence, which focuses on specific individual learning histories in specific ecological circumstances
- …
