![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency
We construct a compact public-key encryption with tight CCA security in the multi-user, multi-challenge setting, where the reduction loss is a constant. Our scheme follows the Hofheinz-Jager framework but is c...
-
Chapter and Conference Paper
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery
Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...
-
Chapter and Conference Paper
Semantic Video Carving Using Perceptual Hashing and Optical Flow
Video files are frequently encountered in digital forensic investigations. However, these files are usually fragmented and are not stored consecutively on physical media. Suspects may logically delete the file...
-
Chapter and Conference Paper
Attribute-Based Encryption Resilient to Auxiliary Input
The auxiliary input model defines a class of computationally uninvertible function families \(\mathcal {F}\) ...
-
Chapter and Conference Paper
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS
Many techniques have been proposed for file recovery, but recovering fragmented files is still a challenge in digital forensics, especially when the files are damaged. This chapter focuses on JPEG files, one o...
-
Chapter and Conference Paper
CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency
Under the strengthened subgroup indistinguishability assumption, we present a new generic construction of chosen ciphertext attack (CCA) secure public key encryption scheme, achieve resilience to auxiliary inp...