210 research outputs found
BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting
Voting is a means to agree on a collective decision based on available
choices (e.g., candidates), where participants (voters) agree to abide by their
outcome. To improve some features of e-voting, decentralized solutions based on
a blockchain can be employed, where the blockchain represents a public bulletin
board that in contrast to a centralized bulletin board provides
availability and censorship resistance. A blockchain ensures that all entities
in the voting system have the same view of the actions made by others due to
its immutable and append-only log. The existing blockchain-based boardroom
voting solution called Open Voting Network (OVN) provides the privacy of votes
and perfect ballot secrecy, but it supports only two candidates. We present
BBB-Voting, an equivalent blockchain-based approach for decentralized voting
than OVN, but in contrast to it, BBB-Voting supports 1-out-of- choices and
provides a fault tolerance mechanism that enables recovery from stalling
participants. We provide a cost-optimized implementation using Ethereum, which
we compare with OVN and show that our work decreases the costs for voters by
in terms of gas consumption. Next, we outline the extension of our
implementation scaling to magnitudes higher number of participants than in a
boardroom voting, while preserving the costs paid by the authority and
participants -- we made proof-of-concept experiments with up to 1000
participants
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
A major open problem is to protect leveled homomorphic encryption from adaptive attacks that allow an adversary to learn the private key. The only positive results in this area are by Loftus, May, Smart and Vercauteren. They use a notion of valid ciphertexts and obtain an IND-CCA1 scheme under a strong knowledge assumption, but they also show their scheme is not secure under a natural adaptive attack based on a ciphertext validity oracle . However, due to recent cryptanalysis their scheme is no longer considered secure.
The main contribution of this paper is to explore a new approach to achieving this goal, which does not rely on a notion of valid ciphertexts . The idea is to generate a one-time private key every time the decryption algorithm is run, so that even if an attacker can learn some bits of the one-time private key from each decryption query, this does not allow them to compute a valid private key.
This is the full version of the paper. The short version, which appeared in Provsec 2016, presented a variant of the Gentry-Sahai-Waters (GSW) levelled homomorphic encryption scheme. Damien Stehle pointed out an attack on our variant of this scheme that had not been anticipated in the Provsec paper; we explain the attack in this full version. This version of the paper also contains a new dual version of the GSW scheme. We give an explanation of why the known attacks no longer break the system. It remains an open problem to develop a scheme for which one can prove IND-CCA1 security
Dietary l-arginine Supplementation Alleviates the Intestinal Injury and Modulates the Gut Microbiota in Broiler Chickens Challenged by Clostridium perfringens
Our previous reports suggested that Dietary l-arginine supplementation attenuated gut injury of broiler chickens infected with Clostridium perfringens by enhancing intestinal immune responses, absorption and barrier function, but its effect on the gut microbiome of broiler chickens remains unclear. This experiment aimed at evaluating the effects of Dietary l-arginine supplementation on the gut bacterial community composition and function of broiler chickens challenged with C. perfringens. In total, 105 1-day-old male Arbor Acres broiler chickens were assigned to three groups: Control (CTL), C. perfringens-challenged (CP), and C. perfringens-challenged and fed diet supplemented with 0.3% l-arginine (ARGCP) groups. The challenge led to macroscopic and histomorphological gut lesions, decreased villus height and increased the number of Observed species, Shannon, Chao1 and ACE indices of ileal microbiota, whereas l-arginine addition reversed these changes. Moreover, the three treatments harbored distinct microbial communities (ANOSIM, P < 0.05). At the genus level, 24 taxa (e.g., Nitrosomonas spp., Coxiella spp., Ruegeria spp., and Thauera spp.) were significantly more abundant in CP group than in CTL group (P < 0.05), whereas the levels of 23 genera of them were significantly decreased by l-arginine supplementation (P < 0.05). The abundances of only 3 genera were different between CTL and ARGCP groups (P < 0.05). At the species level, the challenge promoted the relative abundance of Nitrospira sp. enrichment culture clone M1-9, Bradyrhizobium elkanii, Nitrospira bacterium SG8-3, and Pseudomonas veronii, which was reversed by l-arginine supplementation (P < 0.05). Furthermore, the challenge decreased the levels of Lactobacillus gasseri (P < 0.05). Predictive functional profiling of microbial communities by PICRUSt showed that compared with CP group, ARGCP group had enriched pathways relating to membrane transport, replication and repair, translation and nucleotide metabolism and suppressed functions corresponding to amino acid and lipid metabolisms (P < 0.05). The relative abundances of KEGG pathways in l-arginine-fed broilers were almost equal to those of the controls. In conclusion, l-arginine alleviated the gut injury and normalized the ileal microbiota of C. perfringens-challenged chickens to resemble that of unchallenged controls in terms of microbial composition and functionality
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret
Since the formalization of Verifiable Delay Functions (VDF) by Boneh et al. in 2018, VDFs have been adopted for use in blockchain consensus protocols and random beacon implementations. However, the impending threat to VDF-based applications comes in the form of Shor’s algorithm running on quantum computers in the future which can break the discrete logarithm and integer factorization problems that existing VDFs are based on. Clearly, there is a need for quantum-secure VDFs. In this paper, we propose ZKBdf, which makes use of ZKBoo, a zero knowledge proof system for verifiable computation, as the basis for realizing a quantum-secure VDF. We describe the algorithm, provide the security proofs, implement the scheme and measure the execution and size requirements. In addition, as ZKBdf extends the standard VDF with an extra “Prover-secret” feature, new VDF use-cases are also explored
miR-15a-3p and miR-16-1-3p Negatively Regulate Twist1 to Repress Gastric Cancer Cell Invasion and Metastasis
MicroRNAs are a novel class of gene regulators that function as oncogenes or tumor suppressors. In our current study, we investigated the role of miR-15a-3p and miR-16-1-3p in the regulation of Twist1 expression and EMT process. Our bioinformatics analysis suggested that on the 3' UTR of Twist1, there are two conserved miRNA recognition sites for miR-15a-3p and miR-16-1-3p respectively. Interestingly, overexpression of miR-15a-3p and miR-16-1-3p significantly suppressed the activity of luciferase reporter containing Twist1-3' UTR, reduced mRNA and protein level of EMT related genes such as TWIST1, N-cadherin, α-SMA and Fibronectin, and repressed MMP9 and MMP2 activity, as well as cell migration and invasion. Conversely, inhibition of miR-15a-3p and miR-16-1-3p significantly increased TWIST1, N-cadherin, α-SMA and Fibronectin protein expression. In addition, Twist1 co-transfection significantly ameliorated the loss of cell migration and invasion. Moreover, overexpression of miR-15a-3p and miR-16-1-3p dramatically suppressed the ability of BGC823 cells to form colonies in vitro and develop tumors in vivo in nude mice. Finally, qPCR and Western blot analysis showed that miR-15a-3p and miR-16-1-3p were significantly reduced in clinical gastric cancer tissue, whereas Twist1 mRNA and protein were significantly up-regulated, suggesting that this aberrant down-regulation of miR-15a-3p and miR-16-1-3p might be associated with the abnormal regulation of Twist1 and the EMT process in gastric cancer development. Our results help to elucidate a novel and important mechanism for the regulation of Twist1 in the development of cancer
Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds
Threshold ECDSA schemes distribute the capability of issuing signatures to multiple parties. They have been used in practical MPC wallets holding cryptocurrencies. However, most prior protocols are not robust, wherein even one misbehaving or non-responsive party would mandate an abort. Robust schemes have been proposed (Wong et al., NDSS ’23, ’24), but they do not match state-of-the-art number of rounds which is only three (Doerner et al., S&P ’24). In this work, we propose robust threshold ECDSA schemes RompSig-Q and RompSig-L that each take three rounds (two of which are broadcasts). Building on the works of Wong et al. and
further optimized towards saving bandwidth, they respectively take each signer (1.0 + 1.6) KiB and 3.0 KiB outbound broadcast communication, and thus exhibit bandwidth efficiency that is competitive in practical scenarios where broadcasts are natively handled. RompSig-Q preprocesses multiplications and features fast online signing; RompSig-L leverages threshold CL encryption for scalability and dynamic participation
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
Time-based One-Time Password (TOTP) provides a strong second factor for user authentication. In TOTP, a prover authenticates to a verifier by using the current time and a secret key to generate an authentication token (or password) which is valid for a short time period. Our goal is to extend TOTP to the group setting, and to provide both authentication and privacy. To this end, we introduce a new authentication scheme, called Group TOTP (GTOTP), that allows the prover to prove that it is a member of an authenticated group without revealing its identity. We propose a novel construction that transforms any asymmetric TOTP scheme into a GTOTP scheme. Our approach combines Merkle tree and Bloom filter to reduce the verifier\u27s states to constant sizes.
As a promising application of GTOTP, we show that GTOTP can be used to construct an efficient privacy-preserving Proof of Location (PoL) scheme. We utilize a commitment protocol, a privacy-preserving location proximity scheme, and our GTOTP scheme to build the PoL scheme, in which GTOTP is used not only for user authentication but also as a tool to glue up other building blocks. In the PoL scheme, with the help of some witnesses, a user can prove its location to a verifier, while ensuring the identity and location privacy of both the prover and witnesses. Our PoL scheme outperforms the alternatives based on group digital signatures. We evaluate our schemes on Raspberry Pi hardware, and demonstrate that they achieve practical performance. In particular, the password generation and verification time are in the order of microseconds and milliseconds, respectively, while the computation time of proof generation is less than second
Group Time-based One-Time Passwords and its application to efficient privacy-preserving Proof of Location
Time-based One-Time Password (TOTP) provides a strong second factor for user authentication. In TOTP, a prover authenticates to a verifier by using the current time and a secret key to generate an authentication token (or password) which is valid for a short time period. Our goal is to extend TOTP to the group setting, and to provide both authentication and privacy. To this end, we introduce a new authentication scheme, called Group TOTP (GTOTP), that allows the prover to prove that it is a member of an authenticated group without revealing its identity. We propose a novel construction that transforms any asymmetric TOTP scheme into a GTOTP scheme. Our approach combines Merkle tree and Bloom filter to reduce the verifier’s states to constant sizes.
As a promising application of GTOTP, we show that GTOTP can be used to construct an efficient privacy-preserving Proof of Location (PoL) scheme. We utilize a commitment protocol, a privacy-preserving location proximity scheme, and our GTOTP scheme to build the PoL scheme, in which GTOTP is used not only for user authentication but also as a tool to glue up other building blocks. In the PoL scheme, with the help of some witnesses, a user can prove its location to a verifier, while ensuring the identity and location privacy of both the prover and witnesses. Our PoL scheme outperforms the alternatives based on group digital signatures. We evaluate our schemes on Raspberry Pi hardware, and demonstrate that they achieve practical performance. In particular, the password generation and verification time are in the order of microseconds and milliseconds, respectively, while the computation time of proof generation is less than 1 second
Radiation-induced miR-208a increases the proliferation and radioresistance by targeting p21 in human lung cancer cells
BACKGROUND: Lung cancer has long been the most dangerous malignant tumor among males in both well developed and poorly developed countries. Radiotherapy plays a critical role in the curative management of inoperable non-small cell lung cancer (NSCLC) and is also used as a post-surgical treatment in lung cancer patients. Radioresistance is an important factor that limits the efficacy of radiotherapy for NSCLC patients. Increasing evidence suggests that microRNAs (miRNAs) possess diverse cellular regulatory roles in radiation responses. METHODS: In this study, we used miRNA microarray technology to identify serum miRNAs that were differentially expressed before and after radiotherapy in lung cancer patients. We further examined the biological function of miR-208a on cell viability, apoptotic death and cell cycle distribution in human lung cancer cells and explored the probable mechanism. RESULTS: Nine miRNAs, including miR-29b-3p, miR-200a-3p, and miR-126-3p were significantly down-regulated, whereas miR-208a was the only miRNA that was up-regulated in the serum of the patients after radiation treatment (P < 0.05). The expression of miR-208a could be induced by X-ray irradiation in lung cancer cells. Forced expression of miR-208a promoted cell proliferation and induced radioresistance via targeting p21 with a corresponding activation of the AKT/mTOR pathway in lung cancer cells, whereas down-regulation of miR-208a resulted in the opposite effects. In addition, down-regulation of miR-208a increased the percentage of cells undergoing apoptosis and inhibited the G1 phase arrest in NSCLC cells. Moreover, miR-208a from the serum exosome fraction of lung cancer patients could shuttle to A549 cells in a time-dependent manner, which was likely to contribute to the subsequent biological effects. CONCLUSIONS: The present study provides evidence that miR-208a can affect the proliferation and radiosensitivity of human lung cancer cells by targeting p21 and can be transported by exosomes. Thus, miR-208a may serve as a potential therapeutic target for lung cancer patients. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (doi:10.1186/s13046-016-0285-3) contains supplementary material, which is available to authorized users
- …
