Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (153)

Search Parameters:
Keywords = aggregate signature

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 3415 KiB  
Article
Dual Fractions Proteomic Analysis of Silica Nanoparticle Interactions with Protein Extracts
by Marion Schvartz, Florent Saudrais, Yves Boulard, Jean-Philippe Renault, Céline Henry, Stéphane Chédin, Serge Pin and Jean-Christophe Aude
Materials 2024, 17(19), 4909; https://doi.org/10.3390/ma17194909 - 7 Oct 2024
Viewed by 809
Abstract
Dual-fraction proteomics reveals a novel class of proteins impacted by nanoparticle exposure. Background: Nanoparticles (NPs) interact with cellular proteomes, altering biological processes. Understanding these interactions requires comprehensive analyses beyond solely characterizing the NP corona. Methods: We utilized a dual-fraction mass spectrometry (MS) approach [...] Read more.
Dual-fraction proteomics reveals a novel class of proteins impacted by nanoparticle exposure. Background: Nanoparticles (NPs) interact with cellular proteomes, altering biological processes. Understanding these interactions requires comprehensive analyses beyond solely characterizing the NP corona. Methods: We utilized a dual-fraction mass spectrometry (MS) approach to analyze both NP-bound and unbound proteins in Saccharomyces cerevisiae sp. protein extracts exposed to silica nanoparticles (SiNPs). We identified unique protein signatures for each fraction and quantified protein abundance changes using spectral counts. Results: Strong correlations were observed between protein profiles in each fraction and non-exposed controls, while minimal correlation existed between the fractions themselves. Linear models demonstrated equal contributions from both fractions in predicting control sample abundance. Combining both fractions revealed a larger proteomic response to SiNP exposure compared to single-fraction analysis. We identified 302/56 proteins bound/unbound to SiNPs and an additional 196 “impacted” proteins demonstrably affected by SiNPs. Conclusion: This dual-fraction MS approach provides a more comprehensive understanding of nanoparticle interactions with cellular proteomes. It reveals a novel class of “impacted” proteins, potentially undergoing conformational changes or aggregation due to NP exposure. Further research is needed to elucidate their biological functions and the mechanisms underlying their impact. Full article
(This article belongs to the Section Materials Chemistry)
Show Figures

Figure 1

Figure 1
<p>Adsorption isotherm of YPE on silica NP (1 g.L<sup>−1</sup>) in phosphate buffer (100 mM, pH7) conducted by depletion. Ten samples at YPE concentration from 2.5 × 10<sup>−2</sup> to 2 g.L<sup>−1</sup> were incubated with silica NP using a ThermoMixer<sup>®</sup> at 20 °C for 3 h (cycles of 15 s at 800 rpm followed by 285 s at rest). Samples were centrifuged at 20 °C, 20,000 rpm for 10 min, and the supernatant concentration (unbound proteins) was determined using the absorbance at 205 nm with an absorption coefficient of 31 L.g<sup>−1</sup>.cm<sup>−1</sup>. Horizontal and vertical error bars represent the standard error of the mean.</p>
Full article ">Figure 2
<p>Calibration curve for the YPE concentration with SDS 1%. Concentration levels are determined using the absorbance at 205 nm with an absorption coefficient of 31 L.g<sup>−1</sup>.cm<sup>−1</sup>. The blue curve depicts the linear regression model fitted to the data points. Horizontal and vertical error bars represent the standard error of the mean.</p>
Full article ">Figure 3
<p>Spectral counts correlation plot between the pellet, supernatant and control fractions. Pearson correlation coefficients between replicates are calculated and depicted as squares wherein the size and color (scale given on the right of the plot) depend on its value. Average correlation coefficient values between fraction pairs are indicated on the lower triangular matrix.</p>
Full article ">Figure 4
<p>Spectral Counts (SCs) linear regression model. This plot depicts the linear regression as a blue line between the cumulated SC of each protein in the pellet and supernatant, with the SC of these proteins in the control (see Equation (2)). Besides the regression line, each dot depicts the related SC in the control (<span class="html-italic">y</span>-axis), cumulated pellet, and supernatant (<span class="html-italic">x</span>-axis). The color of the dot is red when the protein is more abundant in the pellet than in the supernatant, and otherwise, it is blue.</p>
Full article ">Figure 5
<p>Venn diagram of the number of detected proteins in the pellet, supernatant and control fractions. The relative percentage is indicated in parentheses.</p>
Full article ">
16 pages, 1860 KiB  
Article
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
by Ahmad Kabil, Heba Aslan, Marianne A. Azer and Mohamed Rasslan
Cryptography 2024, 8(3), 43; https://doi.org/10.3390/cryptography8030043 - 17 Sep 2024
Viewed by 706
Abstract
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is [...] Read more.
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is essential as it deters malicious actors and allows lawful authorities to identify message senders for accountability. This introduces a challenge: balancing privacy with traceability. Conditional privacy-preserving authentication (CPPA) schemes are designed to mitigate this conflict. CPPA schemes utilize cryptographic protocols, including certificate-based schemes, group signatures, identity-based schemes, and certificateless schemes. Due to the critical time constraints in VANETs, efficient batch verification techniques are crucial. Combining certificateless schemes with batch verification leads to certificateless aggregate signature (CLAS) schemes. In this paper, cryptanalysis of Xiong’s CLAS scheme revealed its vulnerabilities to partial key replacement and identity replacement attacks, alongside mathematical errors in the batch verification process. Our proposed CLAS scheme remedies these issues by incorporating an identity authentication module that leverages chameleon hashing within elliptic curve cryptography (CHAM-CLAS). The signature and verification modules are also redesigned to address the identified vulnerabilities in Xiong’s scheme. Additionally, we implemented the small exponents test within the batch verification module to achieve Type III security. While this enhances security, it introduces a slight performance trade-off. Our scheme has been subjected to formal security and performance analyses to ensure robustness. Full article
Show Figures

Figure 1

Figure 1
<p>Visual diagram of Xiong’s scheme.</p>
Full article ">Figure 2
<p>Attacks on Xiong’s scheme.</p>
Full article ">Figure 3
<p>(<b>A</b>) Visual diagram of our CHAM-HASH-based CLAS scheme; (<b>B</b>) Batch verification component of our CLAS scheme and proof of correctness.</p>
Full article ">Figure 4
<p>Batch verification time (in milliseconds) for different values of n (number of signatures).</p>
Full article ">
24 pages, 5436 KiB  
Article
An Efficient SM9 Aggregate Signature Scheme for IoV Based on FPGA
by Bolin Zhang, Bin Li, Jiaxin Zhang, Yuanxin Wei, Yunfei Yan, Heru Han and Qinglei Zhou
Sensors 2024, 24(18), 6011; https://doi.org/10.3390/s24186011 - 17 Sep 2024
Viewed by 680
Abstract
With the rapid development of the Internet of Vehicles (IoV), the demand for secure and efficient signature verification is becoming increasingly urgent. To meet this need, we propose an efficient SM9 aggregate signature scheme implemented on Field-Programmable Gate Array (FPGA). The scheme includes [...] Read more.
With the rapid development of the Internet of Vehicles (IoV), the demand for secure and efficient signature verification is becoming increasingly urgent. To meet this need, we propose an efficient SM9 aggregate signature scheme implemented on Field-Programmable Gate Array (FPGA). The scheme includes both fault-tolerant and non-fault-tolerant aggregate signature modes, which are designed to address challenges in various network environments. We provide security proofs for these two signature verification modes based on a K-ary Computational Additive Diffie–Hellman (K-CAA) difficult problem. To handle the numerous parallelizable elliptic curve point multiplication operations required during verification, we utilize FPGA’s parallel processing capabilities to design an efficient parallel point multiplication architecture. By the Montgomery point multiplication algorithm and the Barrett modular reduction algorithm, we optimize the single-point multiplication computation unit, achieving a point multiplication speed of 70776 times per second. Finally, the overall scheme was simulated and analyzed on an FPGA platform. The experimental results and analysis indicate that under error-free conditions, the proposed non-fault-tolerant aggregate mode reduces the verification time by up to 97.1% compared to other schemes. In fault-tolerant conditions, the proposed fault-tolerant aggregate mode reduces the verification time by up to 77.2% compared to other schemes. When compared to other fault-tolerant aggregate schemes, its verification time is only 28.9% of their consumption, and even in the non-fault-tolerant aggregate mode, the verification time is reduced by at least 39.1%. Therefore, the proposed scheme demonstrates significant advantages in both error-free and fault-tolerant scenarios. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

Figure 1
<p>Overall architecture of SM9 algorithm.</p>
Full article ">Figure 2
<p>The overall structure of the efficient SM9 aggregate signature scheme.</p>
Full article ">Figure 3
<p>Hardware acceleration overall structure.</p>
Full article ">Figure 4
<p>The figure of master state machine state transition.</p>
Full article ">Figure 5
<p>The figure of modular addition and subtraction units.</p>
Full article ">Figure 6
<p>Overall architecture of KOA 256 bit algorithm.</p>
Full article ">Figure 7
<p>Efficiency analysis of error free aggregation signature verification.</p>
Full article ">Figure 8
<p>Efficiency analysis of fault-tolerant aggregate signature.</p>
Full article ">
33 pages, 1029 KiB  
Article
GSFedSec: Group Signature-Based Secure Aggregation for Privacy Preservation in Federated Learning
by Sneha Kanchan, Jae Won Jang, Jun Yong Yoon and Bong Jun Choi
Appl. Sci. 2024, 14(17), 7993; https://doi.org/10.3390/app14177993 - 6 Sep 2024
Cited by 1 | Viewed by 774
Abstract
Privacy must be preserved when working with client data in machine learning. Federated learning (FL) provides a way to preserve user data privacy by aggregating locally trained models without sharing the user data. Still, the privacy of user identity is not preserved. Secure [...] Read more.
Privacy must be preserved when working with client data in machine learning. Federated learning (FL) provides a way to preserve user data privacy by aggregating locally trained models without sharing the user data. Still, the privacy of user identity is not preserved. Secure aggregation is a popular technique in FL for aggregating gradients without disclosing individual data. However, it is costly and inaccurate. Therefore, we propose a novel, scalable, cost-effective group signature-based secure aggregation algorithm in FL, called GSFedSec, where secure aggregation helps conceal the user’s update while the group signature helps conceal their identity. Our algorithm preserves the data and their source. Our simulation results show that the proposed algorithm does not suffer from a loss of accuracy, handles increases in network size competently, offers computational and communication efficiency, and is secure against various security attacks. We have compared the results of efficiency and security against existing algorithms in FL. Also, the security of the algorithm is verified using Burrows–Abadi–Needham (BAN) logic and simulated via the Automated Validation of Internet Security Protocols and Applications (AVISPA) protocol. Full article
Show Figures

Figure 1

Figure 1
<p>Federated learning model and privacy breach.</p>
Full article ">Figure 2
<p>(<b>a</b>) Traditional secure aggregation vs. (<b>b</b>) Group signature-based secure aggregation.</p>
Full article ">Figure 3
<p>Original secure aggregation scheme [<a href="#B12-applsci-14-07993" class="html-bibr">12</a>].</p>
Full article ">Figure 4
<p>GSFedSec: Group signature-based secure aggregation for privacy preservation in federated learning.</p>
Full article ">Figure 5
<p>Intruder knowledge.</p>
Full article ">Figure 6
<p>Simulation result: SAFE.</p>
Full article ">Figure 7
<p>Comparison of computation cost of algorithms for a varying number of iterations in an FL session (<math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>50</mn> <mo>,</mo> <mn>100</mn> <mo>,</mo> <mn>150</mn> <mo>,</mo> <mn>1000</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 8
<p>Comparison of communication cost of algorithms.</p>
Full article ">Figure 9
<p>Comparison of signaling cost of algorithms.</p>
Full article ">
40 pages, 1338 KiB  
Review
Unveil Intrahepatic Cholangiocarcinoma Heterogeneity through the Lens of Omics and Multi-Omics Approaches
by Veronica Porreca, Cristina Barbagallo, Eleonora Corbella, Marco Peres, Michele Stella, Giuseppina Mignogna, Bruno Maras, Marco Ragusa and Carmine Mancone
Cancers 2024, 16(16), 2889; https://doi.org/10.3390/cancers16162889 - 20 Aug 2024
Viewed by 1043
Abstract
Intrahepatic cholangiocarcinoma (iCCA) is recognized worldwide as the second leading cause of morbidity and mortality among primary liver cancers, showing a continuously increasing incidence rate in recent years. iCCA aggressiveness is revealed through its rapid and silent intrahepatic expansion and spread through the [...] Read more.
Intrahepatic cholangiocarcinoma (iCCA) is recognized worldwide as the second leading cause of morbidity and mortality among primary liver cancers, showing a continuously increasing incidence rate in recent years. iCCA aggressiveness is revealed through its rapid and silent intrahepatic expansion and spread through the lymphatic system leading to late diagnosis and poor prognoses. Multi-omics studies have aggregated information derived from single-omics data, providing a more comprehensive understanding of the phenomena being studied. These approaches are gradually becoming powerful tools for investigating the intricate pathobiology of iCCA, facilitating the correlation between molecular signature and phenotypic manifestation. Consequently, preliminary stratifications of iCCA patients have been proposed according to their “omics” features opening the possibility of identifying potential biomarkers for early diagnosis and developing new therapies based on personalized medicine (PM). The focus of this review is to provide new and advanced insight into the molecular pathobiology of the iCCA, starting from single- to the latest multi-omics approaches, paving the way for translating new basic research into therapeutic practices. Full article
(This article belongs to the Section Cancer Causes, Screening and Diagnosis)
Show Figures

Figure 1

Figure 1
<p>The multi-omics workflow in cancer. Single-omics datasets from different patients are integrated using bioinformatic tools to generate a patient stratification to enable personalized diagnosis, prognosis, and medical treatments. Inter-tumor heterogeneity of patients is indicated with people with different colors.</p>
Full article ">Figure 2
<p>Prognostic biomarker lists for iCCA based on the multi-omics data. Cellular and molecular factors identified as prognostically relevant in multi-omics studies cited in this review were categorized as “adverse” or “favorable” according to their prognostic impact. Inter-tumor heterogeneity of iCCA patients is indicated with people with different colors.</p>
Full article ">
20 pages, 1904 KiB  
Article
Lightweight Certificate-Less Anonymous Authentication Key Negotiation Scheme in the 5G Internet of Vehicles
by Guoheng Wei, Yanlin Qin, Guangyue Kou and Zhihong Sun
Electronics 2024, 13(16), 3288; https://doi.org/10.3390/electronics13163288 - 19 Aug 2024
Viewed by 637
Abstract
In the current 5G vehicle network system, there are security issues such as wireless intrusion, privacy leakage, and remote control. To address these challenges, an improved lightweight anonymous authentication key negotiation scheme based on certificate-less aggregate signatures is proposed and its security and [...] Read more.
In the current 5G vehicle network system, there are security issues such as wireless intrusion, privacy leakage, and remote control. To address these challenges, an improved lightweight anonymous authentication key negotiation scheme based on certificate-less aggregate signatures is proposed and its security and efficiency are analyzed. The result shows that the scheme can offer security attributes including anonymity, traceability, and revocability, as well as effective identity authentication, and it can resist forgery attacks, man-in-the-middle attacks, tampering attacks, and smart card loss attacks. Moreover, compared with similar schemes, it possesses superior security and more efficient computational efficiency and less communication overhead, thereby being more appropriate for high-speed, large-capacity, low-latency, and resource-constrained 5G vehicle network application scenarios. Full article
(This article belongs to the Special Issue Emerging Distributed/Parallel Computing Systems)
Show Figures

Figure 1

Figure 1
<p>Design of the lightweight authentication key negotiation protocol based on certificate-less aggregate signature in 5G Internet of Vehicles.</p>
Full article ">Figure 2
<p>Key negotiation stage.</p>
Full article ">Figure 3
<p>Outline of proof of Theorem 1.</p>
Full article ">Figure 4
<p>Operation time comparison [<a href="#B15-electronics-13-03288" class="html-bibr">15</a>,<a href="#B16-electronics-13-03288" class="html-bibr">16</a>,<a href="#B17-electronics-13-03288" class="html-bibr">17</a>,<a href="#B18-electronics-13-03288" class="html-bibr">18</a>].</p>
Full article ">Figure 5
<p>Communication overhead comparison [<a href="#B15-electronics-13-03288" class="html-bibr">15</a>,<a href="#B16-electronics-13-03288" class="html-bibr">16</a>,<a href="#B17-electronics-13-03288" class="html-bibr">17</a>,<a href="#B18-electronics-13-03288" class="html-bibr">18</a>].</p>
Full article ">
21 pages, 1325 KiB  
Article
EVFL: Towards Efficient Verifiable Federated Learning via Parameter Reuse and Adaptive Sparsification
by Jianping Wu, Chunming Wu, Chaochao Chen, Jiahe Jin and Chuan Zhou
Mathematics 2024, 12(16), 2479; https://doi.org/10.3390/math12162479 - 10 Aug 2024
Viewed by 732
Abstract
Federated learning (FL) demonstrates significant potential in Industrial Internet of Things (IIoT) settings, as it allows multiple institutions to jointly construct a shared learning model by exchanging model parameters or gradient updates without the need to transmit raw data. However, FL faces risks [...] Read more.
Federated learning (FL) demonstrates significant potential in Industrial Internet of Things (IIoT) settings, as it allows multiple institutions to jointly construct a shared learning model by exchanging model parameters or gradient updates without the need to transmit raw data. However, FL faces risks related to data poisoning and model poisoning. To address these issues, we propose an efficient verifiable federated learning (EVFL) method, which integrates adaptive gradient sparsification (AdaGS), Boneh–Lynn–Shacham (BLS) signatures, and fully homomorphic encryption (FHE). The combination of BLS signatures and the AdaGS algorithm is used to build a secure aggregation protocol. These protocols verify the integrity of parameters uploaded by industrial agents and the consistency of the server’s aggregation results. Simulation experiments demonstrate that the AdaGS algorithm significantly reduces verification overhead through parameter sparsification and reuse. Our proposed algorithm achieves better verification efficiency compared to existing solutions. Full article
Show Figures

Figure 1

Figure 1
<p>The FL system model.</p>
Full article ">Figure 2
<p>Addictive homomorphism.</p>
Full article ">Figure 3
<p>Multiplicative homomorphism.</p>
Full article ">Figure 4
<p>The workflow of the EVFL.</p>
Full article ">Figure 5
<p>Curves of the different models; (<b>a</b>–<b>c</b>) were trained on Fashion-MNIST; (<b>d</b>–<b>f</b>) were trained on KDD CUP 99.</p>
Full article ">Figure 6
<p>Time required to generate proofs and validations with different numbers of parameters, with 10 agents and 60% of the parameters used; (<b>a</b>,<b>e</b>) Time required for the parameter integrity proof generation; (<b>b</b>,<b>f</b>) Time required for the parameter integrity verification; (<b>c</b>,<b>g</b>) Time required for the aggregated results’ correctness proof generation; (<b>d</b>,<b>h</b>) Time required for the aggregated results’ correctness verification; (<b>a</b>–<b>d</b>) were tested on Fashion- MNIST; (<b>e</b>–<b>h</b>) were tested on KDD CUP 99.</p>
Full article ">Figure 7
<p>Time required to generate proofs and validations with different numbers of agents, with 60% of the parameters used; (<b>a</b>,<b>e</b>) Time required for the parameter integrity proof generation; (<b>b</b>,<b>f</b>) Time required for the parameter integrity verification; (<b>c</b>,<b>g</b>) Time required for the aggregated results’ correctness proof generation; (<b>d</b>,<b>h</b>) Time required for the aggregated results’ correctness verification; (<b>a</b>–<b>d</b>) were tested on Fashion-MNIST; (<b>e</b>–<b>h</b>) were tested on KDD CUP 99.</p>
Full article ">
26 pages, 1229 KiB  
Review
The Brain–Gut Axis, an Important Player in Alzheimer and Parkinson Disease: A Narrative Review
by Eugenio Caradonna, Raffaello Nemni, Angelo Bifone, Patrizia Gandolfo, Lucy Costantino, Luca Giordano, Elisabetta Mormone, Anna Macula, Mariarosa Cuomo, Rossana Difruscolo, Camilla Vanoli, Emilio Vanoli and Fulvio Ferrara
J. Clin. Med. 2024, 13(14), 4130; https://doi.org/10.3390/jcm13144130 - 15 Jul 2024
Cited by 4 | Viewed by 3267
Abstract
Neurodegenerative diseases, such as Alzheimer’s disease (AD) and Parkinson’s disease (PD), are severe age-related disorders with complex and multifactorial causes. Recent research suggests a critical link between neurodegeneration and the gut microbiome, via the gut–brain communication pathway. This review examines the role of [...] Read more.
Neurodegenerative diseases, such as Alzheimer’s disease (AD) and Parkinson’s disease (PD), are severe age-related disorders with complex and multifactorial causes. Recent research suggests a critical link between neurodegeneration and the gut microbiome, via the gut–brain communication pathway. This review examines the role of trimethylamine N-oxide (TMAO), a gut microbiota-derived metabolite, in the development of AD and PD, and investigates its interaction with microRNAs (miRNAs) along this bidirectional pathway. TMAO, which is produced from dietary metabolites like choline and carnitine, has been linked to increased neuroinflammation, protein misfolding, and cognitive decline. In AD, elevated TMAO levels are associated with amyloid-beta and tau pathologies, blood–brain barrier disruption, and neuronal death. TMAO can cross the blood–brain barrier and promote the aggregation of amyloid and tau proteins. Similarly, TMAO affects alpha-synuclein conformation and aggregation, a hallmark of PD. TMAO also activates pro-inflammatory pathways such as NF-kB signaling, exacerbating neuroinflammation further. Moreover, TMAO modulates the expression of various miRNAs that are involved in neurodegenerative processes. Thus, the gut microbiome–miRNA–brain axis represents a newly discovered mechanistic link between gut dysbiosis and neurodegeneration. MiRNAs regulate the key pathways involved in neuroinflammation, oxidative stress, and neuronal death, contributing to disease progression. As a direct consequence, specific miRNA signatures may serve as potential biomarkers for the early detection and monitoring of AD and PD progression. This review aims to elucidate the complex interrelationships between the gut microbiota, trimethylamine-N-oxide (TMAO), microRNAs (miRNAs), and the central nervous system, and the implications of these connections in neurodegenerative diseases. In this context, an overview of the current neuroradiology techniques available for studying neuroinflammation and of the animal models used to investigate these intricate pathologies will also be provided. In summary, a bulk of evidence supports the concept that modulating the gut–brain communication pathway through dietary changes, the manipulation of the microbiome, and/or miRNA-based therapies may offer novel approaches for implementing the treatment of debilitating neurological disorders. Full article
(This article belongs to the Section Epidemiology & Public Health)
Show Figures

Figure 1

Figure 1
<p>TMAO action to induce Alzheimer’s Disease.</p>
Full article ">Figure 2
<p>miRNA complex player between the gut and the brain.</p>
Full article ">
25 pages, 5648 KiB  
Perspective
What Can Be Learned from the Partitioning Behavior of Proteins in Aqueous Two-Phase Systems?
by Vladimir N. Uversky, Pedro P. Madeira and Boris Y. Zaslavsky
Int. J. Mol. Sci. 2024, 25(12), 6339; https://doi.org/10.3390/ijms25126339 - 7 Jun 2024
Cited by 1 | Viewed by 958
Abstract
This review covers the analytical applications of protein partitioning in aqueous two-phase systems (ATPSs). We review the advancements in the analytical application of protein partitioning in ATPSs that have been achieved over the last two decades. Multiple examples of different applications, such as [...] Read more.
This review covers the analytical applications of protein partitioning in aqueous two-phase systems (ATPSs). We review the advancements in the analytical application of protein partitioning in ATPSs that have been achieved over the last two decades. Multiple examples of different applications, such as the quality control of recombinant proteins, analysis of protein misfolding, characterization of structural changes as small as a single-point mutation, conformational changes upon binding of different ligands, detection of protein–protein interactions, and analysis of structurally different isoforms of a protein are presented. The new approach to discovering new drugs for a known target (e.g., a receptor) is described when one or more previous drugs are already available with well-characterized biological efficacy profiles. Full article
(This article belongs to the Section Molecular Biophysics)
Show Figures

Figure 1

Figure 1
<p>The concentration of a protein in the top phase is plotted against the concentration of the protein in the bottom phase (concentration is represented by the analytical signal, in this case, fluorescence in the o-phthalaldehyde (OPA) assay). Deviation of the plotted curve from the linearity indicates protein aggregation. Data for this plot are taken from [<a href="#B85-ijms-25-06339" class="html-bibr">85</a>]. Circles represent the partitioning of monomeric protein, while squares represent the partitioning of aggregated protein (refer to the text for details). White symbols represent data from known samples. The black and white circle is from a “blind” sample, confirming it is not in the aggregated form.</p>
Full article ">Figure 2
<p>The effect of aggregation on Rebif’s partition behavior. The plots were built using data reported by L. Mikheeva et al. [<a href="#B86-ijms-25-06339" class="html-bibr">86</a>]. Figure (<b>A</b>) shows the partitioning of a non-aggregated Rebif formulation, while Figure (<b>B</b>) shows an aggregated one.</p>
Full article ">Figure 3
<p>Schematic representation of the use of the structural signature technology in the analysis of protein aggregation.</p>
Full article ">Figure 4
<p>The interrelationship between the logarithms of partition coefficients for proteins in dextran-75–PEG-8000–0.8 M CsCl–0.01 M NaPB, logarithms of partition coefficients for the same proteins in PEG-8000–0.33 M NaCl–0.1 M UB, and logarithms of partition coefficients for the same proteins in PEG-600–0.4 M NaSCN–0.17 M K/NaPB ATPSs. Plot was built using data reported by L.A. Ferreira et al. [<a href="#B89-ijms-25-06339" class="html-bibr">89</a>]. The colors refer to different proteins.</p>
Full article ">Figure 5
<p>(<b>A</b>) Partition coefficients of albumin, β-lactoglobulin A, and α-chymotrypsinogen A in Dextran-75-PEG-600 ATPS as functions of trimethylamine N-oxide (TMAO) concentration. (<b>B</b>) Partition coefficients of α-chymotrypsinogen A, ribonuclease B, and β-lactoglobulin A in Ficoll-70-PEG-8000 ATPS as functions of trimethylamine N-oxide (TMAO) concentration. Plot was built using data reported in the literature [<a href="#B90-ijms-25-06339" class="html-bibr">90</a>].</p>
Full article ">Figure 6
<p>Distribution of various mutants of Staphylococcal nuclease in three different aqueous two-phase systems. The colors identify the systems used in the analysis. Plot was built using data reported by L. Mikheeva et al. [<a href="#B86-ijms-25-06339" class="html-bibr">86</a>].</p>
Full article ">Figure 7
<p>The biological potency of different batches of human growth hormones plotted against their behavior in various aqueous two-phase systems. The diamond symbols show the range of signature values for different batches of the product with 100% potency. Plot was built using data reported elsewhere [<a href="#B101-ijms-25-06339" class="html-bibr">101</a>].</p>
Full article ">Figure 8
<p>Effect of excipients on protein X conformation as revealed by it partition in different ATPSs. Plot was built using data reported by L. Mikheeva et al. [<a href="#B86-ijms-25-06339" class="html-bibr">86</a>].</p>
Full article ">Figure 9
<p>Effect of different treatments on the structural signatures of several proteins. <span class="html-italic">X</span>-axis indicates the number of the ATPS, with each “dimension” representing a different ATPS. Therefore each color represents a distinct structural signature. Plots were built using data reported elsewhere [<a href="#B86-ijms-25-06339" class="html-bibr">86</a>].</p>
Full article ">Figure 10
<p>Relationships between the overall partition coefficient, <span class="html-italic">K</span><sub>Σ</sub>, for mixtures of hen egg white lysozyme and human hemoglobin and the content ratio of lysozyme, <span class="html-italic">R<sub>lysozyme</sub></span>, defined by Equation (4). Experiments were conducted in the PEG-600-phosphate buffer, pH 6.5 ATPS. The blue circles with error bars show the experimental data points. The solid blue line represents the theoretical curve calculated using Equation (5). The gray shaded area reflects the 95% confidence interval around the theoretical curve. Plots were built using data reported by Zaslavsky et al. [<a href="#B103-ijms-25-06339" class="html-bibr">103</a>].</p>
Full article ">Figure 11
<p>(<b>A</b>). Relationships between the overall partition coefficient K<sub>Σ</sub> for mixtures of human transferrin and carbohydrate-deficient transferrin (CDT) in the aqueous PEG-600-phosphate buffer, pH 6.95, two-phase system, and the transferrin content ratio. Red circles represent the data for the calibration mixtures; blue circles represent the test mixtures. (<b>B</b>). The logarithm of partition coefficient, ln<span class="html-italic">K</span>, values for all-L- and all-D-enantiomers of Cecropin A(1-13)-Melittin(1-13) (red and blue diamonds, respectively) as a function of the peptide concentration in the aqueous Dex–PEG two-phase system containing 0.15 M NaCl in 0.01 M sodium phosphate buffer, pH 7.3. Plots were built using data reported in the literature [<a href="#B103-ijms-25-06339" class="html-bibr">103</a>].</p>
Full article ">Figure 12
<p>The partition coefficient of free PSA (<span class="html-italic">K<sub>fPSA</sub></span>) as a function of the indicated protein concentration. The plot was built using data reported by O. Fedotoff et al. [<a href="#B108-ijms-25-06339" class="html-bibr">108</a>].</p>
Full article ">Figure 13
<p>(<b>A</b>) Overall calculated and experimental distribution behavior of the mixtures of protein A and human IgG in the aqueous Dex-Ficoll two-phase system containing 0.15 M NaCl in 0.01 M sodium phosphate buffer, pH 7.3. The solid line represents the <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>K</mi> </mrow> <mrow> <mi mathvariant="sans-serif">Σ</mi> </mrow> </msub> </mrow> </semantics></math> values calculated under the assumption of the lack of protein–protein interactions. The circles denote the experimental points. (<b>B</b>) The overall calculated and experimental <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>K</mi> </mrow> <mrow> <mi mathvariant="sans-serif">Σ</mi> </mrow> </msub> </mrow> </semantics></math> values for mixtures of all-L- and all-D-enantiomers of Cecropin A(1-13)-Melittin(1-13) in the ratios of 1:3, 1:1, and 3:1 as a function of the ratio of peptide concentrations in the mixture in the aqueous Dex–PEG two-phase system containing 0.15 M NaCl in 0.01 M sodium phosphate buffer, pH 7.3. The solid line represents the K<sub>Σ</sub> values calculated with the assumption of the lack of peptide–peptide interactions. The circles represent the experimental data points. Plots were built using data reported elsewhere [<a href="#B103-ijms-25-06339" class="html-bibr">103</a>].</p>
Full article ">Figure 14
<p>Euclidean distances for the 1:1 complexes of lysozyme with carbohydrates (data for concanavalin A were used as a reference point). Plot was built using data reported elsewhere [<a href="#B30-ijms-25-06339" class="html-bibr">30</a>].</p>
Full article ">Figure 15
<p>A visual representation of the signatures, using normalized bar graphs, whose numerical values are listed in <a href="#ijms-25-06339-t005" class="html-table">Table 5</a>. The values 1–4 on the abscissa refer to PEG-phosphate, DEX-Ficoll, Dex-Ficoll-NaSCN, and Dex-PEG systems, respectively. The height of each bar is equal, and the relative contribution of each system to each bar height is denoted by its vertical extent. Also, the signature of each structural state is understood as the pattern obtained for the four cases (shown on the abscissa) by the assembly of bars, wherein the height of each Sub-section corresponding to the normalized K value at a different aqueous system.</p>
Full article ">
11 pages, 8664 KiB  
Article
Optical Characteristics of Directly Deposited Gold Nanoparticle Films
by Jordi Sancho Parramon, Tilen Švarc, Peter Majerič, Žiga Jelen and Rebeka Rudolf
Surfaces 2024, 7(2), 369-379; https://doi.org/10.3390/surfaces7020023 - 27 May 2024
Viewed by 873
Abstract
The manuscript presents the optical properties of directly deposited films of gold nanoparticles (AuNPs) prepared by the Ultrasonic Spray Pyrolysis (USP) technology. Four samples were produced, with AuNP deposition times on the glass substrate of 15 min, 30 min, 1 h and 4 [...] Read more.
The manuscript presents the optical properties of directly deposited films of gold nanoparticles (AuNPs) prepared by the Ultrasonic Spray Pyrolysis (USP) technology. Four samples were produced, with AuNP deposition times on the glass substrate of 15 min, 30 min, 1 h and 4 h. The morphological characterisation of the deposited films showed that the size of the first deposited AuNPs was between 10 and 30 nm, while, with a longer duration of the deposition process, larger clusters of AuNPs grew by coalescence and aggregation. The prepared layers were characterised optically with Ultraviolet–visible spectroscopy (UV–vis) and ellipsometry. The ellipsometric measurements showed an increasingly denser and thicker effective thickness of the AuNP layers. The extinction spectra displayed a clear local surface plasmonic resonance (LSPR) signature (peak 520–540 nm), indicating the presence of isolated particles in all the samples. For all AuNP layers, the imaginary part of the parallel and perpendicular components of the anisotropic dielectric function was dominated by a central peak at around 2.2 eV, corresponding to the LSPR of isolated particles, and a high-energy shoulder due to Au interband transitions. It was shown that, as the density of particles increased, the extinction cross-section grew over the whole spectral range where measurements are taken. Thus, the response can be explained with an enhanced electromagnetic response between the AuNPs that can be connected to the increase in particle density, but also by the formation of clusters and irregular structures. Full article
Show Figures

Figure 1

Figure 1
<p>Deposition of AuNPs on the glass substrate with the USP process.</p>
Full article ">Figure 2
<p>Low magnification SEM images of the samples with USP deposition of AuNPs for (<b>i</b>) 15 min, (<b>ii</b>) 30 min, (<b>iii</b>) 1 h and (<b>iv</b>) 4 h, showing the nanoparticle coverage on the glass substrate.</p>
Full article ">Figure 3
<p>High magnification SEM images of the samples with USP deposition of AuNPs for (<b>i</b>) 15 min, (<b>ii</b>) 30 min, (<b>iii</b>) 1 h and (<b>iv</b>) 4 h, showing the nanoparticles’ morphology. Particle size histograms are included for each deposition time, with calculated mean, Standard Deviation, minimum and maximum values from the SEM image measurements.</p>
Full article ">Figure 4
<p>EDX analysis and particle size measurements for the sample with 1 h of AuNP deposition.</p>
Full article ">Figure 5
<p>Extinction spectra calculated from the transmittance of the bare (T<sub>0</sub>) and coated (T) substrate for different deposition times.</p>
Full article ">Figure 6
<p>Top panel: Fits of the ellipsometric angles Δ (<b>i</b>), Ψ (<b>ii</b>) and transmittance (<b>iii</b>) spectra for the sample deposited for 30 min. The experimental data are shown by the dots and the fit by the solid lines. The annotated numbers in the Δ and Ψ spectra indicate the angle of incidence. Bottom panel: The real (εr) and imaginary (εi) parts of the effective dielectric function of the AuNP layer deposited for 15 min (<b>iv</b>), 30 min (<b>v</b>) and 1 h (<b>vi</b>), for both in-plane (ε//) and out of plane (ε⏊) components, i.e., for light polarised parallel and perpendicular to the sample plane.</p>
Full article ">Figure 7
<p>(<b>left</b>) Random planar distribution of 25 (<b>top</b>), 45 (<b>middle</b>) and 65 Au nanoparticles in a 500 nm × 500 nm region. (<b>right</b>) Extinction spectra at a normal incidence for the simulated distribution of nanoparticles.</p>
Full article ">
16 pages, 2128 KiB  
Article
A Charging and Discharging Data Privacy Protection Scheme for V2G Networks Based on Cloud–Fog-End
by Baoyi Wang, Ziyan Shi and Shaomin Zhang
Appl. Sci. 2024, 14(10), 4096; https://doi.org/10.3390/app14104096 - 11 May 2024
Cited by 1 | Viewed by 1257
Abstract
Due to the openness of the vehicle-to-grid (V2G) network, the upload of charging and discharging data faces severe security challenges such as eavesdropping, tampering, and forgery. These challenges can lead to privacy breaches, transmission delays, and service quality degradation. To address these issues, [...] Read more.
Due to the openness of the vehicle-to-grid (V2G) network, the upload of charging and discharging data faces severe security challenges such as eavesdropping, tampering, and forgery. These challenges can lead to privacy breaches, transmission delays, and service quality degradation. To address these issues, a V2G network architecture based on cloud–fog-end is designed, and a charging and discharging data privacy protection scheme is proposed. We employ a pseudonym mechanism to achieve the conditional privacy protection of electric vehicle (EV) users. We design a certificateless aggregate signcryption (CLASC) algorithm to guarantee the security of uploading the charging and discharging privacy data. The algorithm solves certificate management and key escrow issues, utilizes aggregate signature operations to save network bandwidth, and avoids complex computations like bilinear pairings and exponents. Additionally, the scheme delegates the aggregate verification process to the fog layer, thereby alleviating the computational burden on the cloud layer, decreasing transmission delays, and enhancing the efficiency and reliability of the V2G network. The analysis results indicate that the scheme not only meets the required security objectives, but also has lower computational and communication overheads, making it suitable for scenarios involving the charging and discharging of large-scale EVs in V2G networks. Full article
Show Figures

Figure 1

Figure 1
<p>The communication architecture in the V2G network.</p>
Full article ">Figure 2
<p>The process of the proposed scheme.</p>
Full article ">Figure 3
<p>Comparison of computation costs for signcryption (CP) [<a href="#B24-applsci-14-04096" class="html-bibr">24</a>,<a href="#B25-applsci-14-04096" class="html-bibr">25</a>,<a href="#B27-applsci-14-04096" class="html-bibr">27</a>,<a href="#B28-applsci-14-04096" class="html-bibr">28</a>].</p>
Full article ">Figure 4
<p>Comparison of computation costs for verification (FN) [<a href="#B25-applsci-14-04096" class="html-bibr">25</a>,<a href="#B27-applsci-14-04096" class="html-bibr">27</a>,<a href="#B28-applsci-14-04096" class="html-bibr">28</a>].</p>
Full article ">Figure 5
<p>Computation cost of the CSO in this scheme.</p>
Full article ">Figure 6
<p>Comparison of computation costs for the CSO [<a href="#B24-applsci-14-04096" class="html-bibr">24</a>,<a href="#B25-applsci-14-04096" class="html-bibr">25</a>,<a href="#B27-applsci-14-04096" class="html-bibr">27</a>,<a href="#B28-applsci-14-04096" class="html-bibr">28</a>].</p>
Full article ">
15 pages, 949 KiB  
Article
SARS-CoV-2-Induced Type I Interferon Signaling Dysregulation in Olfactory Networks Implications for Alzheimer’s Disease
by George D. Vavougios, Theodoros Mavridis, Triantafyllos Doskas, Olga Papaggeli, Pelagia Foka and Georgios Hadjigeorgiou
Curr. Issues Mol. Biol. 2024, 46(5), 4565-4579; https://doi.org/10.3390/cimb46050277 - 10 May 2024
Cited by 2 | Viewed by 2503
Abstract
Type I interferon signaling (IFN-I) perturbations are major drivers of COVID-19. Dysregulated IFN-I in the brain, however, has been linked to both reduced cognitive resilience and neurodegenerative diseases such as Alzheimer’s. Previous works from our group have proposed a model where peripheral induction [...] Read more.
Type I interferon signaling (IFN-I) perturbations are major drivers of COVID-19. Dysregulated IFN-I in the brain, however, has been linked to both reduced cognitive resilience and neurodegenerative diseases such as Alzheimer’s. Previous works from our group have proposed a model where peripheral induction of IFN-I may be relayed to the CNS, even in the absence of fulminant infection. The aim of our study was to identify significantly enriched IFN-I signatures and genes along the transolfactory route, utilizing published datasets of the nasal mucosa and olfactory bulb amygdala transcriptomes of COVID-19 patients. We furthermore sought to identify these IFN-I signature gene networks associated with Alzheimer’s disease pathology and risk. Gene expression data involving the nasal epithelium, olfactory bulb, and amygdala of COVID-19 patients and transcriptomic data from Alzheimer’s disease patients were scrutinized for enriched Type I interferon pathways. Gene set enrichment analyses and gene–Venn approaches were used to determine genes in IFN-I enriched signatures. The Agora web resource was used to identify genes in IFN-I signatures associated with Alzheimer’s disease risk based on its aggregated multi-omic data. For all analyses, false discovery rates (FDR) <0.05 were considered statistically significant. Pathways associated with type I interferon signaling were found in all samples tested. Each type I interferon signature was enriched by IFITM and OAS family genes. A 14-gene signature was associated with COVID-19 CNS and the response to Alzheimer’s disease pathology, whereas nine genes were associated with increased risk for Alzheimer’s disease based on Agora. Our study provides further support to a type I interferon signaling dysregulation along the extended olfactory network as reconstructed herein, ranging from the nasal epithelium and extending to the amygdala. We furthermore identify the 14 genes implicated in this dysregulated pathway with Alzheimer’s disease pathology, among which HLA-C, HLA-B, HLA-A, PSMB8, IFITM3, HLA-E, IFITM1, OAS2, and MX1 as genes with associated conferring increased risk for the latter. Further research into its druggability by IFNb therapeutics may be warranted. Full article
(This article belongs to the Special Issue Advanced Research in Neuroinflammation)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Venn diagram of genes overlapping between all COVID-19 transcriptomes (nasal ciliated cells, olfactory bulb, amygdala) and the Alzheimer’s disease pathology dataset. AD: Alzheimer’s Disease; OB: Olfactory bulb.</p>
Full article ">Figure 2
<p>Network view of the 14-gene signature overlapping between COVID-19 tissues and Alzheimer’s disease pathology. Each node represents a protein, whereas edges represent protein–protein interactions. Each line represents the synthesis of several lines of evidence denoting either known or predicted interactions, i.e., from curated databases, experimentally determined gene fusions, gene co-occurrence, text-mining, co-expression, and protein homology. Line thickness repres ents the strength of association (normalized within a 0–1 range). Red corresponds to genes significantly enriching the Type I interferon gene signature.</p>
Full article ">
26 pages, 5343 KiB  
Systematic Review
A Systematic Review and Meta-Analysis of microRNA Profiling Studies in Chronic Kidney Diseases
by Gantsetseg Garmaa, Stefania Bunduc, Tamás Kói, Péter Hegyi, Dezső Csupor, Dariimaa Ganbat, Fanni Dembrovszky, Fanni Adél Meznerics, Ailar Nasirzadeh, Cristina Barbagallo and Gábor Kökény
Non-Coding RNA 2024, 10(3), 30; https://doi.org/10.3390/ncrna10030030 - 3 May 2024
Cited by 4 | Viewed by 2357
Abstract
Chronic kidney disease (CKD) represents an increasing health burden. Evidence suggests the importance of miRNA in diagnosing CKD, yet the reports are inconsistent. This study aimed to determine novel miRNA biomarkers and potential therapeutic targets from hypothesis-free miRNA profiling studies in human and [...] Read more.
Chronic kidney disease (CKD) represents an increasing health burden. Evidence suggests the importance of miRNA in diagnosing CKD, yet the reports are inconsistent. This study aimed to determine novel miRNA biomarkers and potential therapeutic targets from hypothesis-free miRNA profiling studies in human and murine CKDs. Comprehensive literature searches were conducted on five databases. Subgroup analyses of kidney diseases, sample types, disease stages, and species were conducted. A total of 38 human and 12 murine eligible studies were analyzed using Robust Rank Aggregation (RRA) and vote-counting analyses. Gene set enrichment analyses of miRNA signatures in each kidney disease were conducted using DIANA-miRPath v4.0 and MIENTURNET. As a result, top target genes, Gene Ontology terms, the interaction network between miRNA and target genes, and molecular pathways in each kidney disease were identified. According to vote-counting analysis, 145 miRNAs were dysregulated in human kidney diseases, and 32 were dysregulated in murine CKD models. By RRA, miR-26a-5p was significantly reduced in the kidney tissue of Lupus nephritis (LN), while miR-107 was decreased in LN patients’ blood samples. In both species, epithelial-mesenchymal transition, Notch, mTOR signaling, apoptosis, G2/M checkpoint, and hypoxia were the most enriched pathways. These miRNA signatures and their target genes must be validated in large patient cohort studies. Full article
Show Figures

Figure 1

Figure 1
<p>The flow of study selection.</p>
Full article ">Figure 2
<p>Dysregulated miRNAs reported in two or more profiling studies in kidney diseases. The diagram shows that dysregulated miRNAs have been reported in two or more profiling studies in kidney diseases. The findings were obtained through a vote-counting analysis (subgroup analysis of disease and sample type). Two criteria were used to list miRNAs. The first criterion was applied to all kidney diseases reported in two or more studies, where dysregulated miRNAs had LogFC &gt; 2, FC &gt; 4, and <span class="html-italic">p</span> &lt; 0.1. The second criterion was applied to lupus nephritis reported in three or more studies, where dysregulated miRNAs had LogFC &gt; 2, FC &gt; 4, and <span class="html-italic">p</span> &lt; 0.1. The detailed results can be found in <a href="#app1-ncrna-10-00030" class="html-app">Tables S1–S11</a>. Abbreviations: *: represents criteria for vote-counting as LogFC &gt; 2, FC &gt; 4, and <span class="html-italic">p</span> &lt; 0.1; down: downregulated, up: upregulated; CKD: chronic kidney disease; GN: glomerulonephritis; IgAN: IgA nephropathy; DN: diabetic nephropathy; MCD: minimal change disease; LN: lupus nephritis.</p>
Full article ">Figure 3
<p>Dysregulated miRNAs reported in two or more murine profiling studies. The diagram shows that dysregulated miRNAs have been reported in two or more profiling studies in murine kidney disease models. The findings were obtained through a vote-counting analysis (subgroup analysis of the disease model). Two criteria were used to list miRNAs. The first criterion was applied to the diabetic kidney disease (DKD) model reported in two or more studies, where dysregulated miRNAs had LogFC &gt; 2, FC &gt; 4, and <span class="html-italic">p</span> &lt; 0.1. The second criterion was applied to UUO and DKD models reported in three or more studies, where dysregulated miRNAs had LogFC &gt; 2, FC &gt; 4, and <span class="html-italic">p</span> &lt; 0.1. The blue miRNAs indicate an overlap between human CKD and murine CKD models. The detailed results can be found in <a href="#app1-ncrna-10-00030" class="html-app">Tables S13 and S14</a>. Abbreviations: *: represents criteria for vote-counting as LogFC &gt; 2, FC &gt; 4, and <span class="html-italic">p</span> &lt; 0.1; down: downregulated, up: upregulated; UUO: unilateral ureteral obstruction; DKD—diabetic kidney disease.</p>
Full article ">Figure 4
<p>Summary of gene set enrichment analysis of dysregulated miRNAs in diabetic nephropathy (miRNA–DN). (<b>A</b>) DIANA–miRPath v4.0 analysis for the pathway union of MSigDB hallmark gene sets of significantly dysregulated miRNA signatures. MSigDB pathway union represents well-defined biological states or processes from the MSigDB 2023.2 release. (<b>B</b>) The most strongly enriched 20 GO biological processes related to miRNA–DN from the MIENTURNET web tool. (<b>C</b>) Interaction network between miRNAs and target genes from an experimentally validated tool, miRTarBase v8; blue dots represent miRNAs, and yellow dots represent target genes (the raw data are available in <a href="#app1-ncrna-10-00030" class="html-app">Table S15</a>). (<b>D</b>) Bar plot with the top 10 target genes on the Y–axis and the number of miRNAs targeting them are shown on the X–axis. The plot is color-coded by increasing the FDR value from red to blue. Abbreviation: DN: diabetic nephropathy.</p>
Full article ">Figure 5
<p>Summary of gene set enrichment analysis of dysregulated miRNAs in murine UUO model (miRNA–UUO). (<b>A</b>) DIANA–miRPath v4.0 analysis for the pathway union of MSigDB hallmark gene sets of significantly dysregulated miRNA signatures. MSigDB pathway union represents well-defined biological states or processes from MSigDB 2023.2 release. (<b>B</b>) The most strongly enriched 20 GO biological processes related to miRNA–DN from the MIENTURNET web tool. (<b>C</b>) Interaction network between miRNAs and target genes from an experimentally validated tool, miRTarBase v8; blue dots represent miRNAs, and yellow dots represent target genes (the raw data are available in <a href="#app1-ncrna-10-00030" class="html-app">Table S22</a>). (<b>D</b>) Bar plot with the top 10 target genes on the Y–axis and the number of miRNAs targeting them are shown on the X–axis. The plot is color-coded by increasing the FDR value from red to blue. Abbreviation: UUO: unilateral ureteral obstruction.</p>
Full article ">
22 pages, 479 KiB  
Article
A Quantum Approach to News Verification from the Perspective of a News Aggregator
by Theodore Andronikos and Alla Sirokofskich
Information 2024, 15(4), 207; https://doi.org/10.3390/info15040207 - 6 Apr 2024
Viewed by 1317
Abstract
In the dynamic landscape of digital information, the rise of misinformation and fake news presents a pressing challenge. This paper takes a completely new approach to verifying news, inspired by how quantum actors can reach agreement even when they are spatially spread out. [...] Read more.
In the dynamic landscape of digital information, the rise of misinformation and fake news presents a pressing challenge. This paper takes a completely new approach to verifying news, inspired by how quantum actors can reach agreement even when they are spatially spread out. We propose a radically new—to the best of our knowledge—algorithm that uses quantum “entanglement” (think of it as a special connection) to help news aggregators “sniff out” bad actors, whether they are other news sources or even fact-checkers trying to spread misinformation. This algorithm does not rely on quantum signatures; it merely uses basic quantum technology which we already have, in particular, special pairs of particles called “EPR pairs” that are much easier to create than other options. More elaborate entangled states are like juggling too many balls—they are difficult to make and slow things down, especially when many players are involved. So, we adhere to Bell states, the simplest form of entanglement, which are easy to generate no matter how many players are involved. This means that our algorithm is faster to set up, works for any number of participants, and is more practical for real-world use. Additionally, as a “bonus point”, it finishes in a fixed number of steps, regardless of how many players are involved, making it even more scalable. This new approach may lead to a powerful and efficient way to fight misinformation in the digital age, using the weird and wonderful world of quantum mechanics. Full article
(This article belongs to the Special Issue Quantum Information Processing and Machine Learning)
Show Figures

Figure 1

Figure 1
<p>The above figure illustrates the fact that <math display="inline"><semantics> <msub> <mi>Alice</mi> <mi>i</mi> </msub> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>≤</mo> <mi>i</mi> <mo>≤</mo> <mi>m</mi> </mrow> </semantics></math>, sends the verification outcome <math display="inline"><semantics> <msubsup> <mi>c</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math> and the proof sequence <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">p</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math> to every <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>≤</mo> <mi>k</mi> <mo>≤</mo> <msub> <mi>n</mi> <mi>i</mi> </msub> </mrow> </semantics></math>, in her active network.</p>
Full article ">Figure 2
<p>The above figure illustrates the fact that all news aggregators with the same coordinator <math display="inline"><semantics> <msub> <mi>Alice</mi> <mi>i</mi> </msub> </semantics></math>, i.e., <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mn>1</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math>, <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mn>2</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math>, …, <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> </mrow> <mi>i</mi> </msubsup> </semantics></math>, can exchange the verification outcomes and the proof sequences they received from <math display="inline"><semantics> <msub> <mi>Alice</mi> <mi>i</mi> </msub> </semantics></math> through pairwise authenticated classical channels.</p>
Full article ">Figure 3
<p>This figure visualizes the entangled sequences of qubits that are distributed to Alice and the news aggregators in her active network. The convention behind this depiction is to draw qubits that belong to the same <math display="inline"><semantics> <mrow> <mrow> <mo stretchy="false">|</mo> </mrow> <msup> <mo>Φ</mo> <mo>+</mo> </msup> <mrow> <mo>〉</mo> </mrow> </mrow> </semantics></math> pair using the same color. For instance, the EPR pairs shared between <math display="inline"><semantics> <msub> <mi>Alice</mi> <mi>i</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mn>1</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math>, which occupy position 1 in each <math display="inline"><semantics> <msub> <mi>n</mi> <mi>i</mi> </msub> </semantics></math>-tuple of the <math display="inline"><semantics> <msup> <mi mathvariant="bold">q</mi> <mi>i</mi> </msup> </semantics></math> and <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">r</mi> <mrow> <mn>1</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math> sequences, are drawn in blue. The <math display="inline"><semantics> <mrow> <mrow> <mo stretchy="false">|</mo> </mrow> <msup> <mo>Φ</mo> <mo>+</mo> </msup> <mrow> <mo>〉</mo> </mrow> </mrow> </semantics></math> pairs shared between <math display="inline"><semantics> <msub> <mi>Alice</mi> <mi>i</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mn>2</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math>, occupying position 2 in each <math display="inline"><semantics> <msub> <mi>n</mi> <mi>i</mi> </msub> </semantics></math>-tuple of the <math display="inline"><semantics> <msup> <mi mathvariant="bold">q</mi> <mi>i</mi> </msup> </semantics></math> and <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">r</mi> <mrow> <mn>2</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math> sequences, are drawn in green. Following this pattern, the EPR pairs linking <math display="inline"><semantics> <msub> <mi>Alice</mi> <mi>i</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> </mrow> <mi>i</mi> </msubsup> </semantics></math> are shown in red. All other positions of the sequences <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">r</mi> <mrow> <mn>1</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math>, <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">r</mi> <mrow> <mn>2</mn> </mrow> <mi>i</mi> </msubsup> </semantics></math>, …, <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">r</mi> <mrow> <msub> <mi>n</mi> <mi>i</mi> </msub> </mrow> <mi>i</mi> </msubsup> </semantics></math> contain qubits in the <math display="inline"><semantics> <mrow> <mo stretchy="false">|</mo> <mo>+</mo> <mo>〉</mo> </mrow> </semantics></math> state, which are drawn in silver.</p>
Full article ">Figure 4
<p>This figure shows the classical bit sequences that result after Alice and the news aggregators measure their quantum sequences. The correlations among pairs of bits in these sequences are visualized by drawing correlated pairs with the same color.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math> uses the above algorithm to check if the proof sequence <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">p</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math> is consistent with the verification outcome <math display="inline"><semantics> <msubsup> <mi>c</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math>.</p>
Full article ">Figure 6
<p>This auxiliary algorithm is invoked by <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math> to ascertain whether property (<a href="#FD20-information-15-00207" class="html-disp-formula">20</a>) of Proposition 1 holds.</p>
Full article ">Figure 7
<p><math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> </semantics></math> uses the above algorithm to check if <math display="inline"><semantics> <msubsup> <mi mathvariant="bold">p</mi> <mrow> <msup> <mi>k</mi> <mo>′</mo> </msup> </mrow> <mi>i</mi> </msubsup> </semantics></math> is consistent with <math display="inline"><semantics> <mover> <msubsup> <mi>c</mi> <mrow> <mi>k</mi> </mrow> <mi>i</mi> </msubsup> <mo>¯</mo> </mover> </semantics></math> that <math display="inline"><semantics> <msubsup> <mi>Bob</mi> <mrow> <msup> <mi>k</mi> <mo>′</mo> </msup> </mrow> <mi>i</mi> </msubsup> </semantics></math> claims to have received from <math display="inline"><semantics> <msub> <mi>Alice</mi> <mi>i</mi> </msub> </semantics></math>.</p>
Full article ">
27 pages, 3597 KiB  
Article
A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks
by Ronghao Ma, Jianhong Zhou and Maode Ma
Sensors 2024, 24(7), 2331; https://doi.org/10.3390/s24072331 - 6 Apr 2024
Cited by 2 | Viewed by 1610
Abstract
In the realm of the fifth-generation (5G) wireless cellular networks, renowned for their dense connectivity, there lies a substantial facilitation of a myriad of Internet of Things (IoT) applications, which can be supported by the massive machine-type communication (MTC) technique, a fundamental communication [...] Read more.
In the realm of the fifth-generation (5G) wireless cellular networks, renowned for their dense connectivity, there lies a substantial facilitation of a myriad of Internet of Things (IoT) applications, which can be supported by the massive machine-type communication (MTC) technique, a fundamental communication framework. In some scenarios, a large number of machine-type communication devices (MTCD) may simultaneously enter the communication coverage of a target base station. However, the current handover mechanism specified by the 3rd Generation Partnership Project (3GPP) Release 16 incurs high signaling overhead within the access and core networks, which may have negative impacts on network efficiency. Additionally, other existing solutions are vulnerable to malicious attacks such as Denial of Service (DoS), Distributed Denial of Service (DDoS) attacks, and the failure of Key Forward Secrecy (KFS). To address this challenge, this paper proposes an efficient and secure handover authentication protocol for a group of MTCDs supported by blockchain technology. This protocol leverages the decentralized nature of blockchain technology and combines it with certificateless aggregate signatures to mutually authenticate the identity of a base station and a group of MTCDs. This approach can reduce signaling overhead and avoid key escrow while significantly lowering the risk associated with single points of failure. Additionally, the protocol protects device anonymity by encrypting device identities with temporary anonymous identity markers with the Elliptic Curve Diffie–Hellman (ECDH) to abandon serial numbers to prevent linkage attacks. The resilience of the proposed protocol against predominant malicious attacks has been rigorously validated through the application of the BAN logic and Scyther tool, underscoring its robust security attributes. Furthermore, compared to the existing solutions, the proposed protocol significantly reduces the authentication cost for a group of MTCDs during handover, while ensuring security, demonstrating commendable efficiency. Full article
(This article belongs to the Special Issue Feature Papers in Communications Section 2023)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Initial registration.</p>
Full article ">Figure 3
<p>Handover preparation.</p>
Full article ">Figure 4
<p>First MTCD handover authentication.</p>
Full article ">Figure 5
<p>Group handover authentication.</p>
Full article ">Figure 6
<p>Results of formal verification.</p>
Full article ">Figure 7
<p>Comparison of communication cost.</p>
Full article ">Figure 8
<p>Comparison of the authentication cost.</p>
Full article ">Figure 9
<p>Comparison of the authentication cost for 30 MTCDs with unknown attacks.</p>
Full article ">Figure 10
<p>Comparison of the energy consumption.</p>
Full article ">
Back to TopTop