Encrypted signal-based reversible data hiding with public key cryptosystem YC Chen, CW Shiu, G Horng Journal of Visual Communication and Image Representation 25 (5), 1164-1170, 2014 | 216 | 2014 |
Encrypted image-based reversible data hiding with public key cryptography from difference expansion CW Shiu, YC Chen, W Hong Signal Processing: Image Communication 39, 226-233, 2015 | 168 | 2015 |
PKE-AET: public key encryption with authorized equality test K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri The Computer Journal 58 (10), 2686-2697, 2015 | 105 | 2015 |
A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms YC Chen, TH Hung, SH Hsieh, CW Shiu IEEE Transactions on Information Forensics and Security 14 (12), 3332-3343, 2019 | 94 | 2019 |
Comment on “cheating prevention in visual cryptography” YC Chen, G Horng, DS Tsai IEEE transactions on image processing 21 (7), 3319-3323, 2012 | 79 | 2012 |
Cryptography for parallel RAM from indistinguishability obfuscation YC Chen, SSM Chow, KM Chung, RWF Lai, WK Lin, HS Zhou Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 66* | 2016 |
A new authentication based cheating prevention scheme in Naor–Shamir’s visual cryptography YC Chen, DS Tsai, G Horng Journal of Visual Communication and Image Representation 23 (8), 1225-1233, 2012 | 61 | 2012 |
SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks YC Chen The Computer Journal 58 (4), 922-933, 2015 | 59 | 2015 |
Certificateless aggregate signature with efficient verification YC Chen, R Tso, M Mambo, K Huang, G Horng Security and Communication Networks 8 (13), 2232-2243, 2015 | 50 | 2015 |
Delegating RAM computations with adaptive soundness and privacy P Ananth, YC Chen, KM Chung, H Lin, WK Lin Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 49 | 2016 |
Fully incrementing visual cryptography from a succinct non-monotonic structure YC Chen IEEE Transactions on Information Forensics and Security 12 (5), 1082-1091, 2016 | 46 | 2016 |
Visual secret sharing with cheating prevention revisited YC Chen, DS Tsai, G Horng Digital Signal Processing 23 (5), 1496-1504, 2013 | 28 | 2013 |
Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen The Computer Journal 65 (10), 2828-2844, 2022 | 26 | 2022 |
Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems ZY Liu, YF Tseng, R Tso, YC Chen, M Mambo IEEE Systems Journal 16 (3), 4629-4640, 2021 | 25 | 2021 |
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption K Huang, R Tso, YC Chen Journal of Computer and System Sciences 89, 400-409, 2017 | 25 | 2017 |
A new public key encryption with equality test K Huang, R Tso, YC Chen, W Li, HM Sun Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 23 | 2014 |
Semantic secure public key encryption with filtered equality test PKE-FET K Huang, YC Chen, R Tso 2015 12th International Joint Conference on e-Business and …, 2015 | 21 | 2015 |
Certificateless signatures: structural extensions of security models and new provably secure schemes YC Chen, R Tso, W Susilo, X Huang, G Horng Cryptology ePrint Archive, 2013 | 19 | 2013 |
A secure compressive sensing-based data gathering system via cloud assistance SH Hsieh, TH Hung, CS Lu, YC Chen, SC Pei IEEE Access 6, 31840-31853, 2018 | 18 | 2018 |
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. YC Chen, R Tso, G Horng, CI Fan, RH Hsu J. Inf. Sci. Eng. 31 (1), 297-314, 2015 | 17 | 2015 |