Ji-Jian Chin

Orcid: 0000-0001-9809-6976

According to our database1, Ji-Jian Chin authored at least 41 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
New code-based cryptosystems via the IKKR framework.
J. Inf. Secur. Appl., August, 2023

2022
A Review of Cryptographic Electronic Voting.
Symmetry, 2022

2021
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism.
Symmetry, 2021

An Implementation Suite for a Hybrid Public Key Infrastructure.
Symmetry, 2021

A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures.
Symmetry, 2021

Simple and scalable blockchain with privacy.
J. Inf. Secur. Appl., 2021

ECQV-IBI: Identity-based identification with implicit certification.
J. Inf. Secur. Appl., 2021

Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings.
IACR Cryptol. ePrint Arch., 2021

Digital signature schemes with strong existential unforgeability.
F1000Research, 2021

OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss.
Proceedings of the Provable and Practical Security, 2021

2020
An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries.
IEEE Access, 2020

Improved Indistinguishability for Searchable Symmetric Encryption.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Easy Simple Factoring-based Digital Signature Scheme.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Evolution of Bitcoin Addresses from Security Perspectives.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Evaluating Pairing-Free Identity-Based Identification Using Curve25519.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Improving Signature Schemes with Tight Security Reductions.
Proceedings of the Information Security Practice and Experience, 2019

Vulnerabilities in Online Food Ordering Website.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

Proof of Bid as Alternative to Proof of Work.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Searchable symmetric encryption over multiple servers.
Cryptogr. Commun., 2018

2017
IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices.
Wirel. Pers. Commun., 2017

Searchable Symmetric Encryption: Designs and Challenges.
ACM Comput. Surv., 2017

Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage.
Algorithms, 2017

A Variant of BLS Signature Scheme with Tight Security Reduction.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A variant of Schnorr signature scheme with tight security reduction.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2016
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Cryptogr. Commun., 2016

On the security advantages of block-based multiserver searchable symmetric encryption.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Cryptanalysis of a certificateless identification scheme.
Secur. Commun. Networks, 2015

A provable secure pairing-free certificateless identification scheme.
Int. J. Comput. Math., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

Reset-Secure Identity-Based Identification Schemes Without Pairings.
Proceedings of the Provable Security, 2015

Simulation of a pairing-based identity-based identification scheme in IOS.
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015

A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2014

2013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2013

On the security of a modified Beth identity-based identification scheme.
Inf. Process. Lett., 2013

An Efficient and Provably Secure Certificateless Identification Scheme.
Proceedings of the SECRYPT 2013, 2013

An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2009
Hierarchical Identity-Based Identification Schemes.
Proceedings of the Security Technology, 2009

2008
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.
Proceedings of the Public Key Infrastructure, 2008


  Loading...