Molecular Characterization of the oxalate oxidase involved in the response of Barley to the Powdery Mildew fungus

Fasong Zhou, Ziguo Zhang, Per Gregersen, Jørn Dalgaard Mikkelsen, Eigil de Nedergaard, David B. Colling, Hans Thordal-Christensen

Research output: Contribution to journalJournal articleResearchpeer-review

Abstract

Previously we reported that oxalate oxidase activity increases in extracts of barley (Hordeum vulgare) leaves in response to the powdery mildew fungus (Blumeria [syn. Erysiphe] graminis f.sp. hordei) and proposed this as a source of H2O2 during plant-pathogen interactions. In this paper we show that the N terminus of the major pathogen-response oxalate oxidase has a high degree of sequence identity to previously characterized germin-like oxalate oxidases. Two cDNAs were isolated, pHvOxOa, which represents this major enzyme, and pHvOxOb', representing a closely related enzyme. Our data suggest the presence of only two oxalate oxidase genes in the barley genome, i.e. a gene encoding HvOxOa, which possibly exists in several copies, and a single-copy gene encoding HvOxOb. The use of 3' end gene-specific probes has allowed us to demonstrate that the HvOxOa transcript accumulates to 6 times the level of the HvOxOb transcript in response to the powdery mildew fungus. The transcripts were detected in both compatible and incompatible interactions with a similar accumulation pattern. The oxalate oxidase is found exclusively in the leaf mesophyll, where it is cell wall located. A model for a signal transduction pathway in which oxalate oxidase plays a central role is proposed for the regulation of the hypersensitive response.
Original languageEnglish
JournalPlant Physiology
Volume117
Issue number1
Pages (from-to)33-41
ISSN0032-0889
DOIs
Publication statusPublished - 1998
Externally publishedYes

Fingerprint

Dive into the research topics of 'Molecular Characterization of the oxalate oxidase involved in the response of Barley to the Powdery Mildew fungus'. Together they form a unique fingerprint.

Cite this