New identity-based identification and signature schemes in the standard model

SY Tan, SH Heng - Proceedings of the 18th International Conference on …, 2023 - dl.acm.org
In this paper, we propose an efficient identity-based identification (IBI) scheme provably
secure against impersonation under active and concurrent attacks in the standard model …

[HTML][HTML] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures

J Chia, JJ Chin, SC Yip - Symmetry, 2021 - mdpi.com
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …

Pluggable Authentication Module Meets Identity-Based Identification

J Chia, JJ Chin, SC Yip - Advances in Cyber Security: Third International …, 2021 - Springer
Pluggable authentication modules (PAMs) primarily provide authentication services to
system software on a machine. PAM simplifies the job for both software developers and …

OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss

J Chia, JJ Chin, SC Yip - … , ProvSec 2021, Guangzhou, China, November 5 …, 2021 - Springer
Tightening the security reduction of a cryptosystem involves reducing the advantage of an
adversary breaking the cryptosystem to a security assumption as closely as possible. Tighter …

Evaluating pairing-free identity-based identification using curve25519

J Chia, JJ Chin, SC Yip - Advances in Cyber Security: Second International …, 2021 - Springer
Identification schemes are cryptographic primitives that enable strong authentication for
access control mechanisms that are critical to the security of computerized systems. To …

Strategies Security Managers Used to Prevent Security Breaches in SCADA Systems' Networks

O Ogunmesa - 2021 - search.proquest.com
Abstract Supervisory Control and Data Acquisition (SCADA) systems monitor and control
physical processes in critical infrastructure. The impact of successful attacks on the SCADA …

[PDF][PDF] Group Identity-Based Identification: Definitions, Construction and Implementation

AK Vangujar, TS Ng, J Chia, JJ Chin… - Malaysian Journal of …, 2021 - mjms.upm.edu.my
As an extension of identification schemes in multiparty setting, we propose the first
definitions and construction for a Group Identity-Based Identification (Group-IBI) scheme …

[PDF][PDF] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures. Symmetry 2021, 13, 1330

J Chia, JJ Chin, SC Yip - 2021 - academia.edu
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …