Invited Talk by Dr. Chin Ji Jian on Identification Schemes without Certificates: Theory and Practice



Date: Friday, 23 July 2021

Time: 2.30pm - 4.00pm

Speaker: Chin Ji Jian graduated from Campbell University with a Bachelor of Science Majoring in Computer Science and Computational Mathematics, earning a rank of Magna Cum Laude. Pursuing his postgraduate studies, he took his Master of Engineering Science and later on his P.h.D. at Multimedia University, specializing in cryptography. He earned an early completion for his doctoral studies as well as a Best Thesis Award in I.T. for his thesis. He currently holds a senior lecturer position at the Faculty of Engineering and continues to guide and share his knowledge the eager young minds of tomorrow. He also does the occasional upskilling programme and corporate training. Furthermore, he has an international publication portfolio consisting of over 50 peer-reviewed proceedings and journals. He has given several invited talks at University Putra Malaysia, Kyushu University and Institute of Systems, Technology and Nanotechnology in Japan. He served as programme committee and peer reviewer for several conferences such as Cryptology conference series in Malaysia and ProvSec, WISA and Asiacrypt conferences. He also served as organizing committee for ProvSec 2010, CANS2010 and MyCrypt 2016.


Research Interest: In his research, Ji Jian has spent more than a decade researching theoretical public key cryptography, specializing in entity and message authentication schemes such as identification and digital signature schemes, with particular interest in designing schemes that do not require certificates. Eager to bridge the gap between theoretical cryptography and practical computer security, Ji Jian currently focuses his research interests on development and implementation projects such as searchable symmetric encryption and access-control prototypes using mobile devices.


Abstract: Identification schemes are quite versatile. They are the instantiation of honest verifier zero-knowledge protocols. They enable an alternative way of authentication besides the widely used but strongly debated password systems. They also allow for transformations into signature schemes through the Fiat-Shamir transform technique, and to equivalence to commitment schemes using Kurosawa-Heng’s technique. From there, branches can be made into identity-based identification, identity-based signatures and other variants such as certificateless identification, security mediated identification and hierarchical identity-based identification. In this talk, we look at the evolution of identification schemes and the various variants derived from it from both the theoretical and practical aspects. We pay particular attention to identification schemes that do not require public key certificates, and delve into the difficulties in proofing techniques, implementations and various open problems.

To attend this virtual talk, please register with the following link:


* Registered participants will be added to a Microsoft Teams Group. For UTAR Students, please register with 1UTAR email address for the reward of USSDC points.