Yuan Chen

Orcid: 0000-0003-3004-1455

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xidian, China


According to our database1, Yuan Chen authored at least 16 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

2020
Improved Proxy Re-Encryption With Delegatable Verifiability.
IEEE Syst. J., 2020

2019
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms.
J. Univers. Comput. Sci., 2019

Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019

2018
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018

Novel Smooth Hash Proof Systems Based on Lattices.
Comput. J., 2018

Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Natural sd-RCCA Secure Public-Key Encryptions.
Proceedings of the Provable Security, 2017

2015
New method of key-dependent message security for asymmetric encryption.
Secur. Commun. Networks, 2015

Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.
Secur. Commun. Networks, 2015

Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud.
Int. J. Distributed Sens. Networks, 2015

2014
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions.
Secur. Commun. Networks, 2014

More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
Int. J. Grid Util. Comput., 2014

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.
Frontiers Comput. Sci., 2014

2012
DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

RCCA Security for KEM+DEM Style Hybrid Encryptions.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012


  Loading...