Dr Ji-Jian Chin
Profiles

Dr Ji-Jian Chin

Lecturer in Computer Science

School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)

Biography

Biography

Chin Ji Jian graduated from Campbell University with a Bachelor of Science Majoring in Computer Science and Computational Mathematics, earning a rank of Magna Cum Laude. Pursuing his postgraduate studies, he took his Master of Engineering Science and later on his P.h.D. at Multimedia University, specializing in cryptography. He earned an early completion for his doctoral studies as well as a Best Thesis Award in I.T. for his thesis.

A passionate teacher, Ji Jian has surpassed a decade of teaching experience. From the humble beginnings of an IGCSE home tutor during college, his last position was as an associate professor at the Faculty of Computing and Informatics, Multimedia University, before embarking on a life-changing adventure to move to the University of Plymouth. As a Lecturer in Computer Science at the University of Plymouth, Ji Jian continues to guide and share his knowledge the eager young minds of tomorrow.

In his research, Ji Jian has spent more than a decade researching theoretical public key cryptography, specializing in entity and message authentication schemes such as identification and digital signature schemes, with particular interest in designing schemes that do not require certificates.

As such, he has an international publication portfolio consisting of over 50 peer-reviewed proceedings and journals. He has given several invited talks at University Putra Malaysia, Kyushu University and Institute of Systems, Technology and Nanotechnology in Japan. He served as programme committee and peer reviewer for several conferences such as Cryptology conference series in Malaysia and ProvSec, WISA and Asiacrypt conferences. He also served as organizing committee for ProvSec 2010, CANS2010 and MyCrypt 2016.

Eager to bridge the gap between theoretical cryptography and practical computer security, Ji Jian currently focuses his research interests on development and implementation projects such as searchable symmetric encryption and access-control prototypes using mobile devices. Not willing to be conformed to the theoretical aspects of security, he recently earned his CISSP in 2019, and concurrently won a trip to Seoul by acing the TOPCIT South Korean Government ICT exam, earning a Band 3 as well as top scorer for Malaysia for the 2nd exam batch. More recently he received additional certifications from EC Council's Certified Ethical Hacker, AWS Certified Cloud Practitioner as well as COMPTIA CySA+ professional certificates. He also holds 140 Coursera Certificates as well as Top 5 in TryHackMe's leaderboard rank in Malaysia, and is currently holding first place.

An eSports hobbyist, Ji Jian once held an Archon 2 rank (~2300 MMR) on Defense of the Ancients, season 2. He plays on occasion with his colleagues and students, usually taking on the role of support/tank which often entails sacrificing a high K/D/A ratio to support his team in winning the match. His favourite hero pick is the Underlord.

Qualifications

Ph.D in I.T.

Master of Engineering Science   

Bachelor of Science (Magna cum Laude)

Professional membership

  1. ISC2 (CISSP, CCSP, CC)
  2. AWS Certified Instructor (AWS-CLF,AWS-SAA,AWS-ML, AWS-DVA)

Teaching

Teaching

Teaching interests

Cybersecurity Fundamentals (2021)

Cybersecurity Theory and Practice (2021)

Database and Cloud Security (2021)

Cryptography (2021)

Network Security

Database Systems (2010-2020)

Object-Oriented Programming with C++ (2015-2017)

Computer Security and Disaster Recovery (2009-2010)

Publications

Publications

Key publications

Key publications are highlighted

Journals
Articles
Yusof SN, Kamel Ariffin MR, Yip S-C, Lau TSC, Mahad Z, Chin J-J & Ting C-Y (2024) 'A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem' Heliyon 10, (4) , DOI Open access
Chin J-J, Prithvi C & Mohamad SM (2024) 'An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution' Journal of Informatics and Web Engineering 3, (1) , DOI Open access
Lau TSC, Kamel Ariffin MR, Yip S-C, Chin J-J & Ting C-Y (2024) 'Cryptanalysis of the SHMW signature scheme' Heliyon 10, (2) e24185-e24185 , DOI
Chin J-J, Kannan R, Goh V-T & Yip S-C (2023) 'A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity' Malaysian Journal of Mathematical Sciences 17, (4) 19-31 Publisher Site , DOI Open access
Koa C-G, Heng S-H & Chin J-J (2023) 'ETHERSTWEB – An Ethereum-Based Distributed Application for User Information Trustworthiness Verification' International Journal of Membrane Science and Technology 10, (1) 389-400 , DOI Open access
Cheng Y-Q, Mansor S, Chin J-J, Rahman MM, Abdul Karim H & Ban KW (2023) 'Modelling and Evaluation of Driving Simulator for Driving Education in Malaysia' Journal of Logistics, Informatics and Service Science 10, (3) 211-220 Publisher Site , DOI Open access
Lau TSC, Ivanov F, Ariffin MRK, Chin J-J & Yap TTV (2023) 'New code-based cryptosystems via the IKKR framework' Journal of Information Security and Applications 76, , DOI Open access
Nagaraja V, Ariffin MRK, Lau TSC, Adenan NNH, Chin J-J, Yip S-C & Yap TTV (2023) 'Rank AGS Identification Scheme and Signature Scheme' Mathematics 11, (5) , DOI Open access
(2022) 'Comparison of Label Encoding and Evidence Counting for Malware Classification' Journal of System and Management Sciences , DOI
Kho Y-X, Heng S-H & Chin J-J (2022) 'A Review of Cryptographic Electronic Voting' Symmetry 14, (5) 858-858 , DOI
Kannan R & Chin J-J (2022) 'Backup Automation Using Power Automate for Malaysian Vaccination Centres' Journal of Informatics and Web Engineering 1, (1) 23-34 , DOI
Tee ZL, Kam YHS & Chin JJ (2022) 'Earphones-free Alternative for Shoulder Surfing Safe Login Method' Journal of Logistics, Informatics and Service Science 9, (3) 172-190 , DOI
Braeken A, Chin J-J & Tan S-Y (2021) 'ECQV-IBI: Identity-based identification with implicit certification' Journal of Information Security and Applications 63, 103027-103027 , DOI
Chia J, Chin J-J & Yip S-C (2021) 'Digital signature schemes with strong existential unforgeability' F1000Research 10, 931-931 , DOI
Koa C-G, Heng S-H & Chin J-J (2021) 'ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism' Symmetry 13, (9) 1640-1640 , DOI
Chia J, Heng S-H, Chin J-J, Tan S-Y & Yau W-C (2021) 'An Implementation Suite for a Hybrid Public Key Infrastructure' Symmetry 13, (8) 1535-1535 , DOI
Chia J, Chin J-J & Yip S-C (2021) 'A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures' Symmetry 13, (8) 1330-1330 , DOI
Chan WK, Chin J-J & Goh VT (2021) 'Simple and scalable blockchain with privacy' Journal of Information Security and Applications 58, 102700-102700 , DOI
Chan WK, Chin J-J & Goh VT (2021) 'Bitcoin Addresses. Scaling, Migration and Payment Perspectives' International Journal for Information Security Research 11, (1) 979-984 , DOI
Yap EYY, Chin JJ & Goh A (2021) 'A Chronological Review of Key Establishment Models and Protocols' MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES 15, 39-61
Vangujar AK, Ng TS, Chia J, Chin JJ & Yip SC (2021) 'Group Identity-Based Identification: Definitions, Construction and Implementation' MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES 15, 123-139
Yau WC, Yap WS & Chin JJ (2021) 'On the Security of a Non-Interactive Authenticated Key Agreement over Mobile Communication Networks' MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES 15, 77-89
Chia J & Chin J-J (2020) 'An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries' IEEE Access 8, 61711-61725 , DOI
(2019) 'Seamless Personnel Authentication using Facial Recognition and Identity-Based Identification on Mobile Devices' International Journal of Recent Technology and Engineering 8, (3S) 41-46 , DOI
Vangujar AK, Chin JJ, Tan SY & Ng TS (2019) 'A Hierarchical Identity-Based Identification Scheme Without Pairing' MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES 13, 93-109
Mohamad MS, Tan SY & Chin JJ (2019) 'Searchable Symmetric Encryption Security Definitions' MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES 13, 31-47
Poh GS, Mohamad MS & Chin J-J (2017) 'Searchable symmetric encryption over multiple servers' Cryptography and Communications 10, (1) 139-158 , DOI
Poh GS, Chin J-J, Yau W-C, Choo K-KR & Mohamad MS (2017) 'Searchable Symmetric Encryption' ACM Computing Surveys 50, (3) 1-37 , DOI
Poh G, Baskaran V, Chin J-J, Mohamad M, Lee KW, Maniam D & Z’aba M (2017) 'Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage' Algorithms 10, (2) 52-52 , DOI
Mohamad MS, Poh GS & Chin JJ (2017) 'Protection of Data on Multiple Storage Providers' MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES 11, 89-102
Teh T-Y, Lee Y-S, Cheah Z-Y & Chin J-J (2016) 'IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices' Wireless Personal Communications 94, (1) 127-144 , DOI
Chin J-J, Tan S-Y, Heng S-H & Phan RC-W (2015) 'Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme' Cryptography and Communications 8, (4) 579-591 , DOI
Salam MI, Yau W-C, Chin J-J, Heng S-H, Ling H-C, Phan RC-W, Poh GS, Tan S-Y & Yap W-S (2015) 'Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage' Human-centric Computing and Information Sciences 5, (1) , DOI
Chin J-J, Tan S-Y, Heng S-H & Phan RC-W (2015) 'Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme' The Scientific World Journal 2015, 1-9 , DOI
Chin J-J, Tan S-Y, Heng S-H, Phan RC-W & Behnia R (2014) 'A provable secure pairing-free certificateless identification scheme' International Journal of Computer Mathematics 92, (8) 1520-1535 , DOI
(2014) 'An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model' KSII Transactions on Internet and Information Systems 8, (7) , DOI
Chin J, Behnia R, Heng S & Phan RC (2014) 'Cryptanalysis of a certificateless identification scheme' Security and Communication Networks 8, (2) 122-125 , DOI
Chin JJ & Heng SH (2014) 'An adaptive-secure k-resilient identity-based identification scheme in the standard model' Information (Japan) 17, (1) 197-207
Chin J-J, Tan S-Y, Heng S-H & Phan RC-W (2014) 'Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes' The Scientific World Journal 2014, 1-14 , DOI
Tea BC, Ariffin MRK & Chin JJ (2013) 'An efficient identification scheme in standard model based on the diophantine equation hard problem' Malaysian Journal of Mathematical Sciences 7, (SUPPL.1) 87-99
Chin JJ & Heng SH (2013) 'Security upgrade for a K-resilient identity-based identification scheme in the standard model' Malaysian Journal of Mathematical Sciences 7, (SUPPL.1) 73-85
Chin J-J, Tan S-Y, Heng S-H & Phan RC-W (2013) 'On the security of a modified Beth identity-based identification scheme' Information Processing Letters 113, (14-16) 580-583 , DOI
(2013) 'An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model' KSII Transactions on Internet and Information Systems 7, (4) 910-922 , DOI
Conference Papers
Chan WK, Chin J-J & Goh VT (2022) 'CoinChain: Effective Coin Mixing Tool for Anonymous CryptoCurrency' Springer Singapore 647-659 , DOI
Yap E-Y, Chin J-J, Chia J & Goh A (2022) 'Efficient Implementations of MQV-Based Protocols on Client-Server Architectures' Springer Singapore 195-206 , DOI
Chia J, Chin J-J & Yip S-C (2021) 'Evaluating Pairing-Free Identity-Based Identification Using Curve25519' Springer Singapore 179-193 , DOI
Selvarajah D, Selvarajah V & Chin J-J (2021) 'JKalvi: An E-Learning Game Approach' Springer Singapore 527-535 , DOI
Kannan R, Jian CJ & Guo X (2020) 'Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API' 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20202-/-1/2020IEEE , DOI
Hue S-Y, Sarmin NH, Ismail ES & Chin J-J (2020) 'Easy Simple Factoring-based Digital Signature Scheme' 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20202-/-1/2020IEEE , DOI
Chan WK, Chin J-J & Goh VT (2020) 'Evolution of Bitcoin Addresses from Security Perspectives' 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20202-/-1/2020IEEE , DOI
Mohamad MS & Chin J-J (2020) 'Improved Indistinguishability for Searchable Symmetric Encryption' Springer International Publishing 190-212 , DOI
Koa CG, Heng SH, Tan SY & Chin JJ (2020) 'Review of blockchain-based public key infrastructure' 20-31
Chin JJ & Mohamad MS (2020) 'Security of Rabin-P key encapsulation mechanism' 1-9
Vangujar AK, Chin JJ, Tan SY & Ng TS (2018) 'Hierarchical twin-schnorr identity-based identification scheme' 64-75
Mohamad MS, Tan SY & Chin JJ (2018) 'Searchable symmetric encryption: Defining strength against query recovery attacks' 85-93
Ng T-S, Tan S-Y & Chin J-J (2017) 'A variant of Schnorr signature scheme with tight security reduction' 2017 International Conference on Information and Communication Technology Convergence (ICTC) 0-/-1/20170-/-1/2017IEEE , DOI
Mohamad MS, Chin J-J & Poh GS (2016) 'On the security advantages of block-based multiserver searchable symmetric encryption' 2016 14th Annual Conference on Privacy, Security and Trust (PST) 2-/-1/20162-/-1/2016IEEE , DOI
Mohamad MS, Poh GS & Chin JJ (2016) 'Securing data on outsourced multistorage repository' 111-119
Wong WC, Ng TS & Chin JJ (2016) 'Implementation of a pairing-based identity-based signature on iPhones' 166-174
Tan S-Y, Chin J-J & Behnia R (2015) 'Cryptanalysis of Two Identification Schemes' 2015 2nd International Conference on Information Science and Security (ICISS) 2-/-1/20152-/-1/2015IEEE , DOI
Cheah Z-Y, Lee Y-S, The T-Y & Chin J-J (2015) 'Simulation of a pairing-based identity-based identification scheme in IOS' 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA) 0-/-1/20150-/-1/2015IEEE , DOI
Tan S-Y, Chin J-J, Poh G-S, Kam YHS & Yau W-C (2015) 'A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications' 2015 5th International Conference on IT Convergence and Security (ICITCS) 8-/-0/20158-/-0/2015IEEE , DOI
Teh T-Y, Lee Y-S, Cheah Z-Y & Chin J-J (2015) 'A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices' 2015 5th International Conference on IT Convergence and Security (ICITCS) 8-/-0/20158-/-0/2015IEEE , DOI
Chin JJ, Tan SY, Kam YHS & Leong CH (2014) 'Implementation of identity-based and certificateless identification on android platform' 57-64
Chin JJ, Anada H, Arita S, Sakurai K, Heng SH & Phan R (2014) 'Survey and new idea for attribute-based identification scheme secure against reset attacks' 39-47
Meesa-ard E & Pattaramalai S (2014) 'The impact of mobile velocity on performance of LTE-advanced cooperative downlink' International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014 - Malaysia) Institution of Engineering and Technology , DOI
Chin J-J, Behnia R, Heng S-H & Phan RC-W (2013) 'An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme' 2013 Eighth Asia Joint Conference on Information Security (ASIA JCIS) 7-/-0/20137-/-0/2013IEEE , DOI
Chin J-J, Phan RC-W, Behnia R & Heng S-H (2013) 'An Efficient and Provably Secure Certificateless Identification Scheme' 371-378
Heng SH & Chin JJ (2010) 'A K-resilient identity-based identification scheme in the standard model' 9-15
Mohd Hanafi MFFB & Chin JJ (2010) 'A survey on identity based signature schemes' 176-182
Reports

1.  Report on the Phase I Evaluation of Existing Cryptographic Algorithms (AKSA) Considered for MySEAL v1.1, Muhd. Reza Zaba, Shekh Faizal Abd Latip, Norziana Jamil, Chin Ji Jian, Rezal Ariffin, Cybersecurity Malaysia MySEAL, 2017

2.  Malaysian Digital Signature Algorithm Proposal: TNC Signature Scheme, Tan Syh Yuan, Ng Tiong Sik, Chin Ji Jian, Multimedia University, Newcastle University, 2019

Chapters
Cheng Y-Q, Mansor S, Chin J-J, Karim HA & Kar-Weng B (2023) 'Exploration and Showcase of FSMs and HFSMs Traffic in Low-Cost Educational Driving Simulator' Lecture Notes in Electrical Engineering Springer Nature Singapore 465-475 , DOI Open access
Cheng Y-Q, Mansor S, Chin J-J, Karim HA & Kar-Weng B (2023) 'Enhancement of Prototype Driving Simulator Using Available AI-Based Game Technology' Proceedings of Eighth International Congress on Information and Communication Technology Springer Nature Singapore 569-579 , DOI
Cheng Y-Q, Mansor S, Chin J-J & Karim HA (2022) 'Driving Simulator for Drivers Education with Artificial Intelligence Traffic and Virtual Reality: a Review' Lecture Notes in Electrical Engineering Springer Singapore 483-494 , DOI
Maran P, Yap TTV, Chin JJ, Ng H, Goh VT & Kuek TY (2022) 'Comparison of Machine Learning Models for IoT Malware Classification' Proceedings of the International Conference on Computer, Information Technology and Intelligent Computing (CITIC 2022) Atlantis Press International BV 15-28 , DOI
Chia J, Chin J-J & Yip S-C (2021) 'OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss' Provable and Practical Security Springer International Publishing 116-135 , DOI
Chia J, Chin J-J & Yip S-C (2021) 'Pluggable Authentication Module Meets Identity-Based Identification' Communications in Computer and Information Science Springer Singapore 155-175 , DOI
Yap E-Y, Chin J-J & Goh A (2021) 'Verifying MQV-Based Protocols Using ProVerif' Lecture Notes in Electrical Engineering Springer Singapore 55-63 , DOI
Chan WK, Chin J-J & Goh VT (2020) 'Proof of Bid as Alternative to Proof of Work' Communications in Computer and Information Science Springer Singapore 60-73 , DOI
Chin J-J, Kam YH-S & Goh VT (2020) 'Vulnerabilities in Online Food Ordering Website' Communications in Computer and Information Science Springer Singapore 350-357 , DOI
Ng T-S, Tan S-Y & Chin J-J (2019) 'Improving Signature Schemes with Tight Security Reductions' Information Security Practice and Experience Springer International Publishing 273-292 , DOI
Ng T-S, Tan S-Y & Chin J-J (2018) 'A Variant of BLS Signature Scheme with Tight Security Reduction' Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer International Publishing 150-163 , DOI
Chin J-J, Anada H & Tan S-Y (2015) 'Reset-Secure Identity-Based Identification Schemes Without Pairings' Provable Security Springer International Publishing 227-246 , DOI
Chin J-J, Heng S-H & Goi B-M (2009) 'Hierarchical Identity-Based Identification Schemes' Security Technology Springer Berlin Heidelberg 93-99 , DOI
Chin J-J, Heng S-H & Goi B-M 'An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model' Public Key Infrastructure Springer Berlin Heidelberg 60-73 , DOI
Presentations and posters
Kam YHS & Chin JJ Kam YHS & Chin JJ 'Authentication Methods that use Haptic and Audio: A Review'
Vangujar AK, Ng TS, Chin JJ & Yip SC Vangujar AK, Ng TS, Chin JJ & Yip SC 'Group identity-based identification: Definitions and construction'
Personal

Personal

Conferences organised

Programme Committee

1.   3PGCIC-2014

2.   Cryptology 2014

3.   3PGCIC-2015

4.   ICGHIT 2018

5.   ICGHIT 2019

6.   CITIC2021 (Deputy Technical Chair)

7.   CITIC2022 (Technical Committee)

 

GENERAL Committee

1. provsec2010

2. cans2010

3. cryptology 2014

4. mycrypt2016

5. ispec2019

6. DIFCON2021

7. DIFCON2022

 

Peer Reviewer

1.  KSII Transactions of Internet and Information Systems

2.  Journal of Systems and Software

3.  Security and Communication Networks

4.  IEEE Access

5.  Designs, Codes and Cryptography

6.  International Journal of Communication Systems

7.  IET Information Security

8.  Journal of Information Security and Applications

9.  PLOS One

10. Cryptology 2012,2014

11. IWSEC 2013

12. Asiacrypt 2014, 2020, 2021

13. ProvSec 2014

14. ICISC 2014

15. ICSIPA 2015

16. WISA 2015

17. ACISP 2017

18. ISPEC 2019

19. CITIC 2021

20. CITIC 2022

Links

Online verifiable public profiles