Cotton(Gossypium hirsutum)is an important fiber crop worldwide.Insect attack causes cotton yield and quality losses.However,little is known about the mechanism of cotton response to insect attack.We simulated insect f...Cotton(Gossypium hirsutum)is an important fiber crop worldwide.Insect attack causes cotton yield and quality losses.However,little is known about the mechanism of cotton response to insect attack.We simulated insect feeding by applying insect oral secretions(OS)to wounds,and combined transcriptome and metabolome analysis to investigate how OS from two major pest species(Helicoverpa armigera and Spodoptera litura)affect cotton defense responses.We found that respectively 12,668 and 13,379 genes were differentially expressed in comparison with wounding alone.On addition of OS,the jasmonic acid signaling pathway was rapidly and strongly induced,whereas genes involved in salicylic acid biosynthesis were downregulated.On constructing a coexpression gene network,we identified a hub gene encoding a leucine-rich repeat receptor kinase that may play an important role in early signal recognition and transduction.OS from the two insect species altered the abundance of flavonoid-related compounds in different patterns.Gossypol remained in lower concentration after OS application than after wounding alone,suggesting a suppressive effect of OS on cotton defense response.This study illustrated transcriptional and metabolic changes of cotton in responding to OS from two chewing insect species,identified potential key response genes,and revealed evidence for OS inhibition of wounding-induced cotton defense response.展开更多
The use of adipose-derived cells as a treatment for a variety of diseases is becoming increasingly common. These therapies include the use of cultured mesenchymal stem cells (MSCs) and freshly isolated stromal vascula...The use of adipose-derived cells as a treatment for a variety of diseases is becoming increasingly common. These therapies include the use of cultured mesenchymal stem cells (MSCs) and freshly isolated stromal vascular fraction (SVF) alone, or in conjunction with other cells such as adipocytes. There is a substantial amount of literature published on the therapeutic properties of MSCs and their secretions as the main driver of their therapeutic effect. However, there is little data available on the therapeutic potential of secretions from SVF, either with or without adipocytes. We investigated the ability of secretions from human adipose SVF alone and the SVF co-cultured with adipocytes as a proxy for cell therapy, to ameliorate an inflammatory disorder. This ethics approved study involved the treatment of collagen antibody-induced arthritis (CAIA) in mice with secretions from SVF, SVF co-cultured with adipocytes, or a vehicle control via both intravenous (IV) and intramuscular (IM) routes. Treatment outcome was assessed by paw volume, ankle size and clinical arthritis score measurements. Serum samples were obtained following euthanasia and analysed for a panel of 32 mouse cytokines and growth factors. The dose and timing regime used for the IM administration of both human secretion mixtures did not significantly ameliorate arthritis in this model. The IV administration of SVF adipocyte co-culture secretions reduced the paw volume, and significantly reduced the ankle size and clinical arthritis score when compared to the IV vehicle control mice. This was a superior therapeutic effect than treatment with SVF secretions. Furthermore, treatment with SVF adipocyte coculture secretions resulted in a significant reduction in serum levels of key cytokines, IL-2 and VEGF, involved in the pathogenesis of rheumatoid arthritis. Therefore, the SVF cocultured with adipocytes is an attractive therapeutic for inflammatory conditions.展开更多
Objective To investigate the value of BT-H3 in expressed prostatic secretions ( EPS) in differential diagnosis of patients with inflammatory elevation of PSA in t - PSA gray zone ( 4 - 10 ng /ml) . Methods One hundred...Objective To investigate the value of BT-H3 in expressed prostatic secretions ( EPS) in differential diagnosis of patients with inflammatory elevation of PSA in t - PSA gray zone ( 4 - 10 ng /ml) . Methods One hundred and sixteen patients from ages of 19 to 80 years ( mean,40 years) were studied. In the group there展开更多
DEAR EDITOR,Extracellular vesicles(EVs)are important for the transport of biologically active materials and for intercellular communication.As an exposed mucosa,amphibian skin participates in many essential physiologi...DEAR EDITOR,Extracellular vesicles(EVs)are important for the transport of biologically active materials and for intercellular communication.As an exposed mucosa,amphibian skin participates in many essential physiological processes.To date,however,little is known about EVs in amphibian skin.Here,we successfully isolated EVs from the skin secretions of Bombina maxima,and characterized the EVs using nanoparticle tracking,western blotting,and electron microscopy.展开更多
Various kinds of biologically active peptides have previously been isolated from the skin secretions of Amolops loloensis frog,such as antimicrobial peptides,bradykinin-like peptides and algesic peptides.A novel insul...Various kinds of biologically active peptides have previously been isolated from the skin secretions of Amolops loloensis frog,such as antimicrobial peptides,bradykinin-like peptides and algesic peptides.A novel insulinotropic peptide named amolopin was identified in A.loloensis frog’s skin secretion.Its primary structure sequence was determined by Edman degradation as:FLPIVGKSLSGLSGKL-NH2.BLAST search indicates that the amino acid sequence of amolopin is quite different from other known insulin secretagogues,including mastoparan,exendins and a-latrotoxin,nor does it like incretins(e.g.glucagons like peptide-1 and glucose-dependent insulinotropic ploypeptide)either.However,amolopin shows certain structural similarity with amphibian antimicrobial temporins and vespid chemotactic peptides isolated from Vespa magnifica.Amolopin can stimulate insulin release in INS-1 cells in a dose-dependent manner.Primary investigation on its action mechanisms reveals that amolopin does not increase the influx of Ca2?.In conclusion,a novel 16-amino acid peptide with insulin-releasing activity is initially discovered from the skin secretion of A.loloensis frog.Further work is necessary to evaluate its potential as novel anti-diabetic candidate.展开更多
The brown planthopper(BPH,Nilaparvata lugens)is a notorious sap-sucking insect pest that damages rice(Oryza sativa)plants throughout Asia.During BPH feeding,saliva enters rice plant tissues,whereas during oviposition ...The brown planthopper(BPH,Nilaparvata lugens)is a notorious sap-sucking insect pest that damages rice(Oryza sativa)plants throughout Asia.During BPH feeding,saliva enters rice plant tissues,whereas during oviposition egg-associated secretions(EAS)are deposited in damaged plant tissue.Dynamic changes in rice to planthopper salivary effectors have been widely reported.However,the effects of EAS from planthopper on rice immunity remains largely unexplored.In this study,we found that both infestation of rice by gravid BPH female adults and treatment with the EAS elicited a strong and rapid accumulation of jasmonic acid(JA),JA-isoleucine,and hydrogen peroxide in rice.EAS enhanced plant defenses not only in rice but also in tobacco,and these impaired the performance of BPH on rice,as well as the performance of aphids and whiteflies on tobacco.High-throughput proteome sequencing of EAS led to 110 proteins being identified and 53 proteins with 2 or more unique peptides being detected.Some proteins from BPH EAS were also found in the salivary proteome from herbivores,suggesting potential evolutionary conservation of effector functions across feeding and oviposition;however,others were only identified in EAS,and these are likely specifically related to oviposition.These findings point to novel proteins affecting interactions between planthoppers and rice during oviposition,providing an additional source of information for effector studies.展开更多
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three...In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.展开更多
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u...In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes...Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.展开更多
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.展开更多
Objective Microcystin-leucine-arginine(MC-LR)exposure induces lipid metabolism disorders in the liver.Secreted frizzled-related protein 5(SFRP5)is a natural antagonist of winglesstype MMTV integration site family,memb...Objective Microcystin-leucine-arginine(MC-LR)exposure induces lipid metabolism disorders in the liver.Secreted frizzled-related protein 5(SFRP5)is a natural antagonist of winglesstype MMTV integration site family,member 5A(Wnt5a)and an anti-inflammatory adipocytokine.In this study,we aimed to investigate whether MC-LR can induce lipid metabolism disorders in hepatocytes and whether SFRP5,which has anti-inflammatory effects,can alleviate the effects of hepatic lipid metabolism by inhibiting the Wnt5a/Jun N-terminal kinase(JNK)pathway.Methods We exposed mice to MC-LR in vivo to induce liver lipid metabolism disorders.Subsequently,mouse hepatocytes that overexpressed SFRP5 or did not express SFRP5 were exposed to MC-LR,and the effects of SFRP5 overexpression on inflammation and Wnt5a/JNK activation by MC-LR were observed.Results MC-LR exposure induced liver lipid metabolism disorders in mice and significantly decreased SFRP5 mRNA and protein levels in a concentration-dependent manner.SFRP5 overexpression in AML12cells suppressed MC-LR-induced inflammation.Overexpression of SFRP5 also inhibited Wnt5a and phosphorylation of JNK.Conclusion MC-LR can induce lipid metabolism disorders in mice,and SFRP5 can attenuate lipid metabolism disorders in the mouse liver by inhibiting Wnt5a/JNK signaling.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan...Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan is the main type of polysaccharide from natural mushroom,which has potential medicinal prospects.Nevertheless,the antidiabetic property of mannogalactoglucan in T1DM has not been fully elucidated.In this study,we obtained the neutral fraction of alkali-soluble Armillaria mellea polysaccharide(AAMP-N) with the structure of mannogalactoglucan from the fruiting body of A.mellea and investigated the potential therapeutic value of AAMP-N in T1DM.We demonstrated that AAMP-N lowered blood glucose and improved diabetes symptoms in T1DM mice.AAMP-N activated unfolded protein response(UPR) signaling pathway to maintain ER protein folding homeostasis and promote insulin secretion in vivo.Besides that,AAMP-N promoted insulin synthesis via upregulating the expression of transcription factors,increased Ca^(2+) signals to stimulate intracellular insulin secretory vesicle transport via activating calcium/calmodulin-dependent kinase Ⅱ(CamkⅡ) and cAMP/PKA signals,and enhanced insulin secretory vesicle fusion with the plasma membrane via vesicle-associated membrane protein 2(VAMP2).Collectively,these studies demonstrated that the therapeutic potential of AAMP-N on pancreatic islets function,indicating that mannogalactoglucan could be natural nutraceutical used for the treatment of T1DM.展开更多
Objective:To investigate the frequency of exoU and exoY genes in patients with Pseudomonas aeruginosa infection.Methods:In this study,100 clinical isolates of Pseudomonas aeruginosa were collected from patients hospit...Objective:To investigate the frequency of exoU and exoY genes in patients with Pseudomonas aeruginosa infection.Methods:In this study,100 clinical isolates of Pseudomonas aeruginosa were collected from patients hospitalized in educational-therapeutic hospitals and were identified using standard microbiological tests.Then,the antibiotic resistance pattern of the isolates was determined by the disk agar diffusion method.The bacterial DNAs were extracted by the alkaline lysis method.Finally,the presence of exoU and exoY genes was evaluated by the PCR test.Results:In this study,47%,72%,29%,39%,40%,and 44%of the isolates were non-susceptible to piperacillin,aztreonam,ceftazidime,imipenem,tobramycin,and ciprofloxacin,respectively.In addition,95%and 93%of the clinical isolates carried the exoU and exoY genes.Blood and fecal isolates had both virulence genes,while only one wound isolate had neither genes.Meanwhile,all urinary isolates contained the exoY gene and only one isolate lacked the exoU gene.Also,88 isolates simultaneously had both exoU and exoY genes.Conclusions:High prevalence of exoU and exoY genes in this region indicates a significant role of typeⅢsecretion system in pathogenesis of Pseudomonas aeruginosa.The typeⅢsecretion system may be a suitable target to reduce the pathogenicity of this bacterium.展开更多
In the face of increasingly serious environmental pollution,the health of human lung tissues is also facing serious threats.Mogroside IIE(M2E)is the main metabolite of sweetening agents mogrosides from the anti-tussiv...In the face of increasingly serious environmental pollution,the health of human lung tissues is also facing serious threats.Mogroside IIE(M2E)is the main metabolite of sweetening agents mogrosides from the anti-tussive Chinese herbal Siraitia grosvenori.The study elucidated the anti-inflammatory action and molecular mechanism of M2E against acute lung injury(ALI).A lipopolysaccharide(LPS)-induced ALI model was established in mice and MH-S cells were employed to explore the protective mechanism of M2E through the western blotting,co-immunoprecipitation,and quantitative real time-PCR analysis.The results indicated that M2E alleviated LPS-induced lung injury through restraining the activation of secreted phospholipase A2 type IIA(Pla2g2a)-epidermal growth factor receptor(EGFR).The interaction of Pla2g2a and EGFR was identified by co-immunoprecipitation.In addition,M2E protected ALI induced with LPS against inflammatory and damage which were significantly dependent upon the downregulation of AKT and m TOR via the inhibition of Pla2g2a-EGFR.Pla2g2a may represent a potential target for M2E in the improvement of LPS-induced lung injury,which may represent a promising strategy to treat ALI.展开更多
基金supported by the National Key Research and Development Program of China(2016YFD0100203-9)National R&D Project of Transgenic Crops(2016ZX08010001-006)National Natural Science Foundation of China(31371673)。
文摘Cotton(Gossypium hirsutum)is an important fiber crop worldwide.Insect attack causes cotton yield and quality losses.However,little is known about the mechanism of cotton response to insect attack.We simulated insect feeding by applying insect oral secretions(OS)to wounds,and combined transcriptome and metabolome analysis to investigate how OS from two major pest species(Helicoverpa armigera and Spodoptera litura)affect cotton defense responses.We found that respectively 12,668 and 13,379 genes were differentially expressed in comparison with wounding alone.On addition of OS,the jasmonic acid signaling pathway was rapidly and strongly induced,whereas genes involved in salicylic acid biosynthesis were downregulated.On constructing a coexpression gene network,we identified a hub gene encoding a leucine-rich repeat receptor kinase that may play an important role in early signal recognition and transduction.OS from the two insect species altered the abundance of flavonoid-related compounds in different patterns.Gossypol remained in lower concentration after OS application than after wounding alone,suggesting a suppressive effect of OS on cotton defense response.This study illustrated transcriptional and metabolic changes of cotton in responding to OS from two chewing insect species,identified potential key response genes,and revealed evidence for OS inhibition of wounding-induced cotton defense response.
文摘The use of adipose-derived cells as a treatment for a variety of diseases is becoming increasingly common. These therapies include the use of cultured mesenchymal stem cells (MSCs) and freshly isolated stromal vascular fraction (SVF) alone, or in conjunction with other cells such as adipocytes. There is a substantial amount of literature published on the therapeutic properties of MSCs and their secretions as the main driver of their therapeutic effect. However, there is little data available on the therapeutic potential of secretions from SVF, either with or without adipocytes. We investigated the ability of secretions from human adipose SVF alone and the SVF co-cultured with adipocytes as a proxy for cell therapy, to ameliorate an inflammatory disorder. This ethics approved study involved the treatment of collagen antibody-induced arthritis (CAIA) in mice with secretions from SVF, SVF co-cultured with adipocytes, or a vehicle control via both intravenous (IV) and intramuscular (IM) routes. Treatment outcome was assessed by paw volume, ankle size and clinical arthritis score measurements. Serum samples were obtained following euthanasia and analysed for a panel of 32 mouse cytokines and growth factors. The dose and timing regime used for the IM administration of both human secretion mixtures did not significantly ameliorate arthritis in this model. The IV administration of SVF adipocyte co-culture secretions reduced the paw volume, and significantly reduced the ankle size and clinical arthritis score when compared to the IV vehicle control mice. This was a superior therapeutic effect than treatment with SVF secretions. Furthermore, treatment with SVF adipocyte coculture secretions resulted in a significant reduction in serum levels of key cytokines, IL-2 and VEGF, involved in the pathogenesis of rheumatoid arthritis. Therefore, the SVF cocultured with adipocytes is an attractive therapeutic for inflammatory conditions.
文摘Objective To investigate the value of BT-H3 in expressed prostatic secretions ( EPS) in differential diagnosis of patients with inflammatory elevation of PSA in t - PSA gray zone ( 4 - 10 ng /ml) . Methods One hundred and sixteen patients from ages of 19 to 80 years ( mean,40 years) were studied. In the group there
基金supported by the National Natural Science Foundation of China(31572268,U1602225,31872226)Yunling Scholar Program to Y.Z.,and the Basic Research of Yunnan Province(202101AT070292)to X.L.G.
文摘DEAR EDITOR,Extracellular vesicles(EVs)are important for the transport of biologically active materials and for intercellular communication.As an exposed mucosa,amphibian skin participates in many essential physiological processes.To date,however,little is known about EVs in amphibian skin.Here,we successfully isolated EVs from the skin secretions of Bombina maxima,and characterized the EVs using nanoparticle tracking,western blotting,and electron microscopy.
文摘Various kinds of biologically active peptides have previously been isolated from the skin secretions of Amolops loloensis frog,such as antimicrobial peptides,bradykinin-like peptides and algesic peptides.A novel insulinotropic peptide named amolopin was identified in A.loloensis frog’s skin secretion.Its primary structure sequence was determined by Edman degradation as:FLPIVGKSLSGLSGKL-NH2.BLAST search indicates that the amino acid sequence of amolopin is quite different from other known insulin secretagogues,including mastoparan,exendins and a-latrotoxin,nor does it like incretins(e.g.glucagons like peptide-1 and glucose-dependent insulinotropic ploypeptide)either.However,amolopin shows certain structural similarity with amphibian antimicrobial temporins and vespid chemotactic peptides isolated from Vespa magnifica.Amolopin can stimulate insulin release in INS-1 cells in a dose-dependent manner.Primary investigation on its action mechanisms reveals that amolopin does not increase the influx of Ca2?.In conclusion,a novel 16-amino acid peptide with insulin-releasing activity is initially discovered from the skin secretion of A.loloensis frog.Further work is necessary to evaluate its potential as novel anti-diabetic candidate.
基金supported by the Jiangsu Agricultural Science and Technology Independent Innovation Fund[CX(22)3018]the National Natural Science Foundation of China(32302320)the National Key Basic Research Program of China(2021YFD1401100).
文摘The brown planthopper(BPH,Nilaparvata lugens)is a notorious sap-sucking insect pest that damages rice(Oryza sativa)plants throughout Asia.During BPH feeding,saliva enters rice plant tissues,whereas during oviposition egg-associated secretions(EAS)are deposited in damaged plant tissue.Dynamic changes in rice to planthopper salivary effectors have been widely reported.However,the effects of EAS from planthopper on rice immunity remains largely unexplored.In this study,we found that both infestation of rice by gravid BPH female adults and treatment with the EAS elicited a strong and rapid accumulation of jasmonic acid(JA),JA-isoleucine,and hydrogen peroxide in rice.EAS enhanced plant defenses not only in rice but also in tobacco,and these impaired the performance of BPH on rice,as well as the performance of aphids and whiteflies on tobacco.High-throughput proteome sequencing of EAS led to 110 proteins being identified and 53 proteins with 2 or more unique peptides being detected.Some proteins from BPH EAS were also found in the salivary proteome from herbivores,suggesting potential evolutionary conservation of effector functions across feeding and oviposition;however,others were only identified in EAS,and these are likely specifically related to oviposition.These findings point to novel proteins affecting interactions between planthoppers and rice during oviposition,providing an additional source of information for effector studies.
基金Project supported by the Offline Course Program of“Experiment of College Physics”in the 2022-year Anhui Provincial Quality Engineering Program (Grant No.2022xxkc134)the Program for Academic Leader Reserve Candidates in Tongling University (Grant Nos.2020tlxyxs43 and 2014tlxyxs30)+1 种基金the Talent Scientific Research Foundation of Tongling University (Grant No.2015tlxyrc01)the 2014 year Program for Excellent Youth Talents in University of Anhui Province。
文摘In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.
文摘In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010+4 种基金in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017in part by the Research Project of Guizhou University for Talent Introduction underGrant[2020]61in part by theCultivation Project of Guizhou University under Grant[2019]56in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01]the Science and Technology Program of Guizhou Province(No.[2023]371).
文摘Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
基金supported in part by the national natural science foundation of China (NSFC) under Grant61871193in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001in part by the Guangzhou Key Field R&D Program under Grant 202206030005
文摘Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金supported in part by the National Key R&D Program of China(No.2022YFB2902202)in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034)+2 种基金in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144)in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160)in part by the Southeast University Startup Fund(No.4009012301)。
文摘Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.
基金supported by the Natural Science Research Project of colleges and Universities in Anhui Province[2022AH052336]High Level Talent Research Initiation Fund Of Anhui Medical College[2023RC004]。
文摘Objective Microcystin-leucine-arginine(MC-LR)exposure induces lipid metabolism disorders in the liver.Secreted frizzled-related protein 5(SFRP5)is a natural antagonist of winglesstype MMTV integration site family,member 5A(Wnt5a)and an anti-inflammatory adipocytokine.In this study,we aimed to investigate whether MC-LR can induce lipid metabolism disorders in hepatocytes and whether SFRP5,which has anti-inflammatory effects,can alleviate the effects of hepatic lipid metabolism by inhibiting the Wnt5a/Jun N-terminal kinase(JNK)pathway.Methods We exposed mice to MC-LR in vivo to induce liver lipid metabolism disorders.Subsequently,mouse hepatocytes that overexpressed SFRP5 or did not express SFRP5 were exposed to MC-LR,and the effects of SFRP5 overexpression on inflammation and Wnt5a/JNK activation by MC-LR were observed.Results MC-LR exposure induced liver lipid metabolism disorders in mice and significantly decreased SFRP5 mRNA and protein levels in a concentration-dependent manner.SFRP5 overexpression in AML12cells suppressed MC-LR-induced inflammation.Overexpression of SFRP5 also inhibited Wnt5a and phosphorylation of JNK.Conclusion MC-LR can induce lipid metabolism disorders in mice,and SFRP5 can attenuate lipid metabolism disorders in the mouse liver by inhibiting Wnt5a/JNK signaling.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
基金funded by the National Natural Science Foundation of China (32371341,31872674)the Scientific and Technologic Foundation of Jilin Province (20230202050NC)the Fundamental Research Funds for the Central Universities (CGZH202206)。
文摘Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan is the main type of polysaccharide from natural mushroom,which has potential medicinal prospects.Nevertheless,the antidiabetic property of mannogalactoglucan in T1DM has not been fully elucidated.In this study,we obtained the neutral fraction of alkali-soluble Armillaria mellea polysaccharide(AAMP-N) with the structure of mannogalactoglucan from the fruiting body of A.mellea and investigated the potential therapeutic value of AAMP-N in T1DM.We demonstrated that AAMP-N lowered blood glucose and improved diabetes symptoms in T1DM mice.AAMP-N activated unfolded protein response(UPR) signaling pathway to maintain ER protein folding homeostasis and promote insulin secretion in vivo.Besides that,AAMP-N promoted insulin synthesis via upregulating the expression of transcription factors,increased Ca^(2+) signals to stimulate intracellular insulin secretory vesicle transport via activating calcium/calmodulin-dependent kinase Ⅱ(CamkⅡ) and cAMP/PKA signals,and enhanced insulin secretory vesicle fusion with the plasma membrane via vesicle-associated membrane protein 2(VAMP2).Collectively,these studies demonstrated that the therapeutic potential of AAMP-N on pancreatic islets function,indicating that mannogalactoglucan could be natural nutraceutical used for the treatment of T1DM.
文摘Objective:To investigate the frequency of exoU and exoY genes in patients with Pseudomonas aeruginosa infection.Methods:In this study,100 clinical isolates of Pseudomonas aeruginosa were collected from patients hospitalized in educational-therapeutic hospitals and were identified using standard microbiological tests.Then,the antibiotic resistance pattern of the isolates was determined by the disk agar diffusion method.The bacterial DNAs were extracted by the alkaline lysis method.Finally,the presence of exoU and exoY genes was evaluated by the PCR test.Results:In this study,47%,72%,29%,39%,40%,and 44%of the isolates were non-susceptible to piperacillin,aztreonam,ceftazidime,imipenem,tobramycin,and ciprofloxacin,respectively.In addition,95%and 93%of the clinical isolates carried the exoU and exoY genes.Blood and fecal isolates had both virulence genes,while only one wound isolate had neither genes.Meanwhile,all urinary isolates contained the exoY gene and only one isolate lacked the exoU gene.Also,88 isolates simultaneously had both exoU and exoY genes.Conclusions:High prevalence of exoU and exoY genes in this region indicates a significant role of typeⅢsecretion system in pathogenesis of Pseudomonas aeruginosa.The typeⅢsecretion system may be a suitable target to reduce the pathogenicity of this bacterium.
基金the National Natural Science Foundation(81773982,82003937)Youth Academic leaders of the Qinglan Project in Jiangsu province for financial support。
文摘In the face of increasingly serious environmental pollution,the health of human lung tissues is also facing serious threats.Mogroside IIE(M2E)is the main metabolite of sweetening agents mogrosides from the anti-tussive Chinese herbal Siraitia grosvenori.The study elucidated the anti-inflammatory action and molecular mechanism of M2E against acute lung injury(ALI).A lipopolysaccharide(LPS)-induced ALI model was established in mice and MH-S cells were employed to explore the protective mechanism of M2E through the western blotting,co-immunoprecipitation,and quantitative real time-PCR analysis.The results indicated that M2E alleviated LPS-induced lung injury through restraining the activation of secreted phospholipase A2 type IIA(Pla2g2a)-epidermal growth factor receptor(EGFR).The interaction of Pla2g2a and EGFR was identified by co-immunoprecipitation.In addition,M2E protected ALI induced with LPS against inflammatory and damage which were significantly dependent upon the downregulation of AKT and m TOR via the inhibition of Pla2g2a-EGFR.Pla2g2a may represent a potential target for M2E in the improvement of LPS-induced lung injury,which may represent a promising strategy to treat ALI.