Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency

    We construct a compact public-key encryption with tight CCA security in the multi-user, multi-challenge setting, where the reduction loss is a constant. Our scheme follows the Hofheinz-Jager framework but is c...

    Puwen Wei, Wei Wang, Bingxin Zhu, Siu Ming Yiu in Information Security and Privacy (2017)

  2. Chapter and Conference Paper

    Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery

    Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...

    Jun Zhang, Meiqi He, Siu-Ming Yiu in Data and Applications Security and Privacy XXXI (2017)

  3. Chapter and Conference Paper

    Semantic Video Carving Using Perceptual Hashing and Optical Flow

    Video files are frequently encountered in digital forensic investigations. However, these files are usually fragmented and are not stored consecutively on physical media. Suspects may logically delete the file...

    Junbin Fang, Si** Li, Guikai **, Zoe Jiang in Advances in Digital Forensics XIII (2017)

  4. No Access

    Chapter and Conference Paper

    Attribute-Based Encryption Resilient to Auxiliary Input

    The auxiliary input model defines a class of computationally uninvertible function families \(\mathcal {F}\) ...

    Zhiwei Wang, Siu Ming Yiu in Provable Security (2015)

  5. Chapter and Conference Paper

    FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS

    Many techniques have been proposed for file recovery, but recovering fragmented files is still a challenge in digital forensics, especially when the files are damaged. This chapter focuses on JPEG files, one o...

    Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics XI (2015)

  6. No Access

    Chapter and Conference Paper

    CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency

    Under the strengthened subgroup indistinguishability assumption, we present a new generic construction of chosen ciphertext attack (CCA) secure public key encryption scheme, achieve resilience to auxiliary inp...

    Zhiwei Wang, Siu Ming Yiu in Information Security (2015)