Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros

Base de dados
Ano de publicação
Tipo de documento
País de afiliação
Intervalo de ano de publicação
1.
Mol Cell ; 84(4): 791-801.e6, 2024 Feb 15.
Artigo em Inglês | MEDLINE | ID: mdl-38262410

RESUMO

In S phase, duplicating and assembling the whole genome into chromatin requires upregulation of replicative histone gene expression. Here, we explored how histone chaperones control histone production in human cells to ensure a proper link with chromatin assembly. Depletion of the ASF1 chaperone specifically decreases the pool of replicative histones both at the protein and RNA levels. The decrease in their overall expression, revealed by total RNA sequencing (RNA-seq), contrasted with the increase in nascent/newly synthesized RNAs observed by 4sU-labeled RNA-seq. Further inspection of replicative histone RNAs showed a 3' end processing defect with an increase of pre-mRNAs/unprocessed transcripts likely targeted to degradation. Collectively, these data argue for a production defect of replicative histone RNAs in ASF1-depleted cells. We discuss how this regulation of replicative histone RNA metabolism by ASF1 as a "chaperone checkpoint" fine-tunes the histone dosage to avoid unbalanced situations deleterious for cell survival.


Assuntos
Histonas , Proteínas de Saccharomyces cerevisiae , Humanos , Histonas/genética , Histonas/metabolismo , Chaperonas de Histonas/genética , Proteínas de Ciclo Celular/genética , Proteínas de Ciclo Celular/metabolismo , Replicação do DNA , Chaperonas Moleculares/genética , Chaperonas Moleculares/metabolismo , RNA/genética , Proteínas de Saccharomyces cerevisiae/metabolismo
2.
Opt Express ; 32(9): 15955-15966, 2024 Apr 22.
Artigo em Inglês | MEDLINE | ID: mdl-38859234

RESUMO

A new interactive quantum zero-knowledge protocol for identity authentication implementable in currently available quantum cryptographic devices is proposed and demonstrated. The protocol design involves a verifier and a prover knowing a pre-shared secret, and the acceptance or rejection of the proof is determined by the quantum bit error rate. It has been implemented in modified Quantum Key Distribution devices executing two fundamental cases. In the first case, all players are honest, while in the second case, one of the users is a malicious player. We demonstrate an increase of the quantum bit error rate around 25% in the latter case compared to the case of honesty. The protocol has also been validated for distances from a back-to-back setup to more than 60 km between verifier and prover. The security and robustness of the protocol has been analysed, demonstrating its completeness, soundness and zero-knowledge properties.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA