Follow
Yu-Chi Chen
Yu-Chi Chen
Department of Computer Science and Information Engineering, National Taipei University of Technology
Verified email at ntut.edu.tw - Homepage
Title
Cited by
Cited by
Year
Encrypted signal-based reversible data hiding with public key cryptosystem
YC Chen, CW Shiu, G Horng
Journal of Visual Communication and Image Representation 25 (5), 1164-1170, 2014
2102014
Encrypted image-based reversible data hiding with public key cryptography from difference expansion
CW Shiu, YC Chen, W Hong
Signal Processing: Image Communication 39, 226-233, 2015
1622015
PKE-AET: public key encryption with authorized equality test
K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri
The Computer Journal 58 (10), 2686-2697, 2015
972015
A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms
YC Chen, TH Hung, SH Hsieh, CW Shiu
IEEE Transactions on Information Forensics and Security 14 (12), 3332-3343, 2019
862019
Comment on “cheating prevention in visual cryptography”
YC Chen, G Horng, DS Tsai
IEEE transactions on image processing 21 (7), 3319-3323, 2012
762012
Cryptography for parallel RAM from indistinguishability obfuscation
YC Chen, SSM Chow, KM Chung, RWF Lai, WK Lin, HS Zhou
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
64*2016
A new authentication based cheating prevention scheme in Naor–Shamir’s visual cryptography
YC Chen, DS Tsai, G Horng
Journal of Visual Communication and Image Representation 23 (8), 1225-1233, 2012
612012
SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks
YC Chen
The Computer Journal 58 (4), 922-933, 2015
572015
Certificateless aggregate signature with efficient verification
YC Chen, R Tso, M Mambo, K Huang, G Horng
Security and Communication Networks 8 (13), 2232-2243, 2015
502015
Delegating RAM computations with adaptive soundness and privacy
P Ananth, YC Chen, KM Chung, H Lin, WK Lin
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
492016
Fully incrementing visual cryptography from a succinct non-monotonic structure
YC Chen
IEEE Transactions on Information Forensics and Security 12 (5), 1082-1091, 2016
402016
Visual secret sharing with cheating prevention revisited
YC Chen, DS Tsai, G Horng
Digital Signal Processing 23 (5), 1496-1504, 2013
282013
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption
K Huang, R Tso, YC Chen
Journal of Computer and System Sciences 89, 400-409, 2017
252017
A new public key encryption with equality test
K Huang, R Tso, YC Chen, W Li, HM Sun
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
222014
Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation
ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen
The Computer Journal 65 (10), 2828-2844, 2022
202022
Semantic secure public key encryption with filtered equality test PKE-FET
K Huang, YC Chen, R Tso
2015 12th International Joint Conference on e-Business and …, 2015
202015
Certificateless signatures: structural extensions of security models and new provably secure schemes
YC Chen, R Tso, W Susilo, X Huang, G Horng
Cryptology ePrint Archive, 2013
192013
Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems
ZY Liu, YF Tseng, R Tso, YC Chen, M Mambo
IEEE Systems Journal 16 (3), 4629-4640, 2021
172021
A secure compressive sensing-based data gathering system via cloud assistance
SH Hsieh, TH Hung, CS Lu, YC Chen, SC Pei
IEEE Access 6, 31840-31853, 2018
172018
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
YC Chen, R Tso, G Horng, CI Fan, RH Hsu
J. Inf. Sci. Eng. 31 (1), 297-314, 2015
172015
The system can't perform the operation now. Try again later.
Articles 1–20