Ji-Jian Chin
Ji-Jian Chin
Verified email at - Homepage
Cited by
Cited by
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice†…, 2008
Simple and scalable blockchain with privacy
WK Chan, JJ Chin, VT Goh
Journal of Information Security and Applications 58, 102700, 2021
A review of cryptographic electronic voting
YX Kho, SH Heng, JJ Chin
Symmetry 14 (5), 858, 2022
Searchable Symmetric Encryption Over Multiple Servers
P Geong-Sen, M Soeheila Moesfa, C Ji-Jian
ArcticCrypt 2016, 2016
Twin‐Schnorr: A Security Upgrade for the Schnorr Identity‐Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015 (1), 237514, 2015
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
Security Technology: International Conference, SecTech 2009, Held as Part of†…, 2009
IBI-mobile authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94, 127-144, 2017
ECQV-IBI: Identity-based identification with implicit certification
A Braeken, JJ Chin, SY Tan
Journal of Information Security and Applications 63, 103027, 2021
Digital signature schemes with strong existential unforgeability
J Chia, JJ Chin, SC Yip
F1000Research 10, 2021
An identity based-identification scheme with tight security against active and concurrent adversaries
J Chia, JJ Chin
IEEE Access 8, 61711-61725, 2020
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model
C Ji-Jian, H Swee-Huay
Malaysian Journal of Mathematical Science 7, 73-85, 2013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology†…, 2017
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
An efficient and provably secure certificateless identification scheme
JJ Chin, RCW Phan, R Behnia, SH Heng
2013 international conference on security and cryptography (SECRYPT), 1-8, 2013
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism
CG Koa, SH Heng, JJ Chin
Symmetry 13 (9), 1640, 2021
The system can't perform the operation now. Try again later.
Articles 1–20