Influenza A viruses (IAVs), particularly H1N1, H5N1 and H7N9, pose a substantial threat to public health worldwide. Here, we report that MIR2911, a honeysuckle (HS)-encoded atypical microRNA, directly targets IAVs with a broad spectrum. MIR2911 is highly stable in HS decoction, and continuous drinking or gavage feeding of HS decoction leads to a significant elevation of the MIR2911 level in mouse peripheral blood and lung. Bioinformatics prediction and a luciferase reporter assay showed that MIR2911 could target various IAVs, including H1N1, H5N1 and H7N9. Synthetic MIR2911 significantly inhibited H1N1-encoded PB2 and NS1 protein expression, but did not affect mutants in which the MIR2911-binding nucleotide sequences were altered. Synthetic MIR2911, extracted RNA from HS decoction and HS decoction all significantly inhibited H1N1 viral replication and rescued viral infection-induced mouse weight loss, but did not affect infection with a mutant virus in which the MIR2911-binding nucleotide sequences of PB2 and NS1 were altered. Importantly, the inhibitory effect of HS decoction on viral replication was abolished by an anti-MIR2911 antagomir, indicating that the physiological concentration of MIR2911 in HS decoction could directly and sufficiently suppress H1N1 viral replication. MIR2911 also inhibited H5N1 and H7N9 viral replication in vitro and in vivo. Strikingly, administration of MIR2911 or HS decoction dramatically reduced mouse mortality caused by H5N1 infection. Our results demonstrate that MIR2911 is the first active component identified in Traditional Chinese Medicine to directly target various IAVs and may represent a novel type of natural product that effectively suppresses viral infection.
Quantum secure direct communication and deterministic secure quantum communication Abstract In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small level. Moreover, with the one-party quantum error correction, a reation has been established between classical linear codes and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols based on dense coding.Keywords quantum secure direct communication, deterministic secure quantum communication, network, quantum privacy amplification, one-party quantum error correcting codes PACS numbers 03.67.Hk, 03.65.Ud, 42.50.Dv
A scheme for multiparty quantum state sharing of an arbitrary two-particle state is presented with Einstein-Podolsky-Rosen pairs. Any one of the N agents has the access to regenerate the original state with two local unitary operations if he collaborates with the other agents, say the controllers. Moreover, each of the controllers is required to take only a product measurement σx ⊗ σx on his two particles, which makes this scheme more convenient for the agents in the applications on a network than others. As all the quantum source can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. With a new notation for the multipartite entanglement, the sender need only publish two bits of classical information for each measurement, which reduces the information exchanged largely.
We analyzed the security of the secure direct communication protocol based on secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang [Phys. Rev. A 73, 022338 (2006)], and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.
We present two efficient quantum key distribution schemes over two different collective-noise channels. The accepted hypothesis of collective noise is that photons travel inside a time window small compared to the variation of noise. Noiseless subspaces are made up of two Bell states and the spatial degree of freedom is introduced to form two nonorthogonal bases. Although these protocols resort to entangled states for encoding the key bit, the receiver is only required to perform single-particle product measurements and there is no basis mismatch. Moreover, the detection is passive as the receiver does not switch his measurements between two conjugate measurement bases to get the key.Comment: 6 pages, 1 figure; the revised version of the paper published in Phys. Rev. A 78, 022321 (2008). Some negligible errors on the error rates of eavesdropping check are correcte
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.