The thick filaments of mammalian and avian skeletal muscle fibers are disordered at low temperature, but become increasingly ordered into an helical structure as the temperature is raised. Wray and colleagues (Schlichting, I., and J. Wray. 1986. J. Muscle Res. Cell Motil. 7:79; Wray, J., R. S. Goody, and K. Holmes. 1986. Adv. Exp. Med. Biol. 226:49-59) interpreted the transition as reflecting a coupling between nucleotide state and global conformation with M.ATP (disordered) being favored at 0 degrees C and M.ADP.P(i) (ordered) at 20 degrees C. However, hitherto this has been limited to a qualitative correlation and the biochemical state of the myosin heads required to obtain the helical array has not been unequivocally identified. In the present study we have critically tested whether the helical arrangement of the myosin heads requires the M.ADP.P(i) state. X-ray diffraction patterns were recorded from skinned rabbit psoas muscle fiber bundles stretched to non-overlap to avoid complications due to interaction with actin. The effect of temperature on the intensities of the myosin-based layer lines and on the phosphate burst of myosin hydrolyzing ATP in solution were examined under closely matched conditions. The results showed that the fraction of myosin mass in the helix closely followed that of the fraction of myosin in the M.ADP.P(i) state. Similar results were found by using a series of nucleoside triphosphates, including CTP and GTP. In addition, fibers treated by N-phenylmaleimide (Barnett, V. A., A. Ehrlich, and M. Schoenberg. 1992. Biophys. J. 61:358-367) so that the myosin was exclusively in the M.ATP state revealed no helical order. Diffraction patterns from muscle fibers in nucleotide-free and in ADP-containing solutions did not show helical structure. All these confirmed that in the presence of nucleotides, the M.NDP.P(i) state is required for helical order. We also found that the spacing of the third meridional reflection of the thick filament is linked to the helical order. The spacing in the ordered M.NDP.P(i) state is 143.4 A, but in the disordered state, it is 144. 2 A. This may be explained by the different interference functions for the myosin heads and the thick filament backbone.
Low angle x-ray diffraction measurements of myofilament lattice spacing (D(1,0)) and equatorial reflection intensity ratio (I(1,1)/I(1,0)) were made in relaxed skinned cardiac trabeculae from rats. We tested the hypothesis that the degree of weak cross-bridge (Xbr) binding, which has been shown to be obligatory for force generation in skeletal muscle, is modulated by changes in lattice spacing in skinned cardiac muscle. Altered weak Xbr binding was detected both by changes in I(1,1)/I(1,0) and by measurements of chord stiffness (chord K). Both measurements showed that, similar to skeletal muscle, the probability of weak Xbr binding at 170-mM ionic strength was significantly enhanced by lowering temperature to 5 degrees C. The effects of lattice spacing on weak Xbr binding were therefore determined under these conditions. Changes in D(1,0), I(1,1)/I(1,0), and chord K by osmotic compression with dextran T500 were determined at sarcomere lengths (SL) of 2.0 and 2.35 micro m. At each SL increasing [dextran] caused D(1,0) to decrease and both I(1,1)/I(1,0) and chord K to increase, indicating increased weak Xbr binding. The results suggest that in intact cardiac muscle increasing SL and decreasing lattice spacing could lead to increased force by increasing the probability of initial weak Xbr binding.
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and most importantly, the security. There are two tasks of statistical fluctuation in decoy-state BB84 QKD. One is the deviation between expected value and observed value for a given expected value or observed value. The other is the deviation between phase error rate of computational basis and bit error rate of dual basis. Here, we provide the rigorous and optimal analytic formula to solve the above tasks, resulting to higher secret key rate and longer secure transmission distance. Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols. So far, there have existed many kinds of protocols describing how quantum key distribution (QKD) 1,2 works, such as the Bennett-Brassard-1984 (BB84) 3 , Bennett-Brassard-Mermin-1992 4 , Bennett-1992 5 , six-state 6 , continuous variable 7,8 and measurement-device-independent 9-11 protocols. Although different protocols contain different processes, they all serve the same purpose to guarantee that two parties, named Alice and Bob, can share a string of key data through a channel fully controlled by an eavesdropper, named Eve 3. Unlike some computational assumptions, these protocols are all proven to be secure with fundamental physical laws in the recent years 12-18 , which shows the great advantage in information transmitting that QKD holds. BB84 stands out as the most important protocol due to its best overall performance. However, implementations of the BB84 protocol differ from the original theoretical proposal. For an ideal single-photon source is not available yet, in actuality, a weak pulsed laser source is in place of it. Nevertheless, there is a critical flaw in the weak pulsed laser source that an non-negligible part of laser pulses contains more than one photon, which will be exploited by Eve through the photon-number-splitting (PNS) attack 19. To address this drawback with high channel loss, the decoy-state method is introduced 20-22. The source will generate the phase-randomized coherent state in decoy-state method, which can be regarded as the mixed photon number state. The essence of the decoy state idea can be summarized as that the yield (bit error rate) of n-photon in signal state is equal to that in decoy state. However, this equal-yield condition can only be established under the asymptotic-key regime. The expected value of yield (bit error rate) of n-photon in signal state and decoy state are identical while the corresponding observed value cannot be assumed to be the same in the finite-key regime. By exploiting the decoy-state method, one can establish the linear system of equations about the expected values to obtain expected value of yield (bit er...
Quantum secret sharing (QSS) is essential for multiparty quantum communication, which is one of cornerstones in the future quantum internet. However, a linear rate-distance limitation severely constrains the secure key rate and transmission distance of QSS. Here, we present a practical QSS protocol among three participants based on the differential phase shift scheme and twin field ideas for the solution of high-efficiency multiparty communication task. In contrast to formerly proposed differential phase shift QSS protocol, our protocol can break the linear PLOB bound, theoretically improving the secret key rate by three orders of magnitude in a 300-km-long fiber. Furthermore, the new protocol is secure against Trojan horse attacks that cannot be resisted by previous differential phase shift QSS.
A model of cross-bridges binding to actin in the weak binding A*M*ATP state is presented. The modeling was based on the x-ray diffraction patterns from the relaxed skinned rabbit psoas muscle fibers where ATP hydrolysis was inhibited by N-phenylmaleimide treatment (S. Xu, J. Gu, G. Melvin, L. C. Yu. 2002. Biophys. J. 82:2111-2122). Calculations included both the myosin filaments and the actin filaments of the muscle cells, and the binding to actin was assumed to be single headed. To achieve a good fit, considerable flexibility in the orientation of the myosin head and the position of the S1-S2 junction is necessary, such that the myosin head can bind to a nearby actin whereas the tail end was kept in the proximity of the helical track of the myosin filament. Hence, the best-fit model shows that the head binds to actin in a wide range of orientations, and the tail end deviates substantially from its lattice position in the radial direction (approximately 60 A). Surprisingly, the best fit model reveals that the detached head, whose location thus far has remained undetected, seems to be located close to the surface of the myosin filament. Another significant requirement of the best-fit model is that the binding site on actin is near the N terminus of the actin subunit, a position distinct from the putative rigor-binding site. The results support the idea that the essential role played by the weak binding states M*ATP <--> A*M*ATP for force generation lies in its flexibility, because the probability of attachment is greatly increased, compared with the weak binding M*ADP*P(i) <--> A*M*ADP*P(i) states.
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages with information-theoretic security. Current QDS protocols face two major restrictions, including the requirement of the symmetrization step with additional secure classical channels and quadratic scaling of the signature rate with the probability of detection events. Here, we present an efficient QDS protocol to overcome these issues by utilizing the classical post-processing operation called post-matching method. Our protocol does not need the symmetrization step, and the signature rate scales linearly with the probability of detection events. Simulation results show that the signature rate is three orders of magnitude higher than the original protocol in a 100-km-long fiber. This protocol is compatible with existing quantum communication infrastructure, therefore we anticipate that it will play a significant role in providing digital signatures with unconditional security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.