Invited Talk by Dr. Chin Ji Jian on Identification Schemes without
Certificates: Theory and Practice
Date: Friday, 23 July 2021
Time: 2.30pm - 4.00pm
Speaker: Chin
Ji Jian graduated from Campbell University with a Bachelor of Science Majoring
in Computer Science and Computational Mathematics, earning a rank of Magna Cum
Laude. Pursuing his postgraduate studies, he took his Master of Engineering
Science and later on his P.h.D. at Multimedia University, specializing in
cryptography. He earned an early completion for his doctoral studies as well as
a Best Thesis Award in I.T. for his thesis. He currently holds a senior
lecturer position at the Faculty of Engineering and continues to guide and
share his knowledge the eager young minds of tomorrow. He also does the
occasional upskilling programme and corporate training. Furthermore, he has an
international publication portfolio consisting of over 50 peer-reviewed proceedings
and journals. He has given several invited talks at University Putra Malaysia,
Kyushu University and Institute of Systems, Technology and Nanotechnology in
Japan. He served as programme committee and peer reviewer for several
conferences such as Cryptology conference series in Malaysia and ProvSec, WISA
and Asiacrypt conferences. He also served as organizing committee for ProvSec
2010, CANS2010 and MyCrypt 2016.
Research Interest: In
his research, Ji Jian has spent more than a decade researching theoretical
public key cryptography, specializing in entity and message authentication
schemes such as identification and digital signature schemes, with
particular interest in designing schemes that do not require certificates.
Eager to bridge the gap between theoretical cryptography and practical computer
security, Ji Jian currently focuses his research interests on development and
implementation projects such as searchable symmetric encryption and
access-control prototypes using mobile devices.
Abstract: Identification schemes are quite
versatile. They are the instantiation of honest verifier zero-knowledge
protocols. They enable an alternative way of authentication besides the widely
used but strongly debated password systems. They also allow for transformations
into signature schemes through the Fiat-Shamir transform technique, and to
equivalence to commitment schemes using Kurosawa-Heng’s technique. From there,
branches can be made into identity-based identification, identity-based
signatures and other variants such as certificateless identification, security
mediated identification and hierarchical identity-based identification. In this
talk, we look at the evolution of identification schemes and the various
variants derived from it from both the theoretical and practical aspects. We
pay particular attention to identification schemes that do not require public
key certificates, and delve into the difficulties in proofing techniques,
implementations and various open problems.
To attend this virtual talk, please register with the following link:
* Registered participants will be added to a Microsoft Teams Group. For UTAR Students, please register with 1UTAR email address for the reward of USSDC points.