Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Syh-Yuan Tan is active.

Publication


Featured researches published by Syh-Yuan Tan.


international conference on computational science and its applications | 2010

Java implementation for pairing-based cryptosystems

Syh-Yuan Tan; Swee-Huay Heng; Bok-Min Goi

We present a Java implementation for Tate pairing over the supersingular curve y2=x3+x in


International Conference on U- and E-Service, Science and Technology | 2009

On the Security of an Attribute-Based Signature Scheme

Syh-Yuan Tan; Swee-Huay Heng; Bok-Min Goi

\mathbb{F}_p


Human-centric Computing and Information Sciences | 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage

Iftekhar Salam; Wei-Chuen Yau; Ji-Jian Chin; Swee-Huay Heng; Huo-Chong Ling; Raphael C. W. Phan; Geong Sen Poh; Syh-Yuan Tan; Wun-She Yap

. We show some available optimisations for group operations by manipulating the mathematical equations. Besides, we also show that it is easy to hash a string into a point for our chosen parameters. A variant of Java’s BigInteger data type, namely CpxBigInteger is created to serve equation with complex number and the Java data types are constructed: Curve, Point and Line based on CpxBigInteger. Using these data types and J2SE JDK 1.6.0_02, we implement BLS identity-based identification (IBI) scheme, which is the first rigorously defined pairing-based IBI scheme. The timings show that the Tate pairing took only 133.12 milliseconds.


Multimedia Tools and Applications | 2015

An implementation of enhanced public key infrastructure

Syh-Yuan Tan; Wei-Chuen Yau; Boon-Hock Lim

In ISA 2008, Guo and Zeng proposed an attribute-based signature (ABS) scheme. They claimed that their ABS scheme is existentially unforgeable under adaptive chosen-message attack based on the strong extended Diffe-Hellman (EDH) assumption. In this paper, we show that Guo and Zeng’s attribute-based signature scheme is vulnerable to the partial key replacement attack.


Information Processing Letters | 2016

Cryptanalysis of a CP-ABE scheme with policy in normal forms

Syh-Yuan Tan; Wun-She Yap

Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client side before outsourcing it to the remote cloud storage server. However, once the data is encrypted, it will limit server’s capability for keyword search since the data is encrypted and server simply cannot make a plaintext keyword search on encrypted data. But again we need the keyword search functionality for efficient retrieval of data. To maintain user’s data confidentiality, the keyword search functionality should be able to perform over encrypted cloud data and additionally it should not leak any information about the searched keyword or the retrieved document. This is known as privacy preserving keyword search. This paper aims to study privacy preserving keyword search over encrypted cloud data. Also, we present our implementation of a privacy preserving data storage and retrieval system in cloud computing. For our implementation, we have chosen one of the symmetric key primitives due to its efficiency in mobile environments. The implemented scheme enables a user to store data securely in the cloud by encrypting it before outsourcing and also provides user capability to search over the encrypted data without revealing any information about the data or the query.


provable security | 2015

Reset-Secure Identity-Based Identification Schemes Without Pairings

Ji-Jian Chin; Hiroaki Anada; Syh-Yuan Tan

In this paper, we present the implementation of an enhanced public key infrastructure (PKI) which supports not only conventional public key cryptography (PKC) but also identity-based cryptography (IBC). In addition, we discuss the possible way of placing together IBC and PKI as well as solving the problems of user secret key revocation of PKI and IBC. As a proof of concept, an IBC framework is incorporated into Enterprise Java Bean Certified Authority (EJBCA) and the performance is reported.


international conference on it convergence and security, icitcs | 2015

A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications

Syh-Yuan Tan; Ji-Jian Chin; Geong Sen Poh; Yvonne Kam; Wei-Chuen Yau

In 2013, Rao and Dutta constructed an efficient attribute based access control mechanism for vehicular ad hoc network (VANET) based on a newly proposed ciphertext-policy attribute-based encryption (CP-ABE) scheme. As the CP-ABE scheme views access policy in normal forms, the length of ciphertext is independent against the number of attributes in the policy besides having constant number of pairing operations for both encryption and decryption functions. In this paper, we cryptanalyze Rao and Duttas CP-ABE scheme by mounting a chosen plaintext attack to demonstrate that a registered node in VANET can (eavesdrop the conversation to) decrypt a ciphertext with unsatisfied disjunctive normal form policy. Since the security of Rao and Duttas proposed attribute based access control mechanism for VANET relies on the proposed CP-ABE scheme, our attack indicates that the proposed access control mechanism is insecure. Subsequently, the root cause of the attack and possible solutions are presented to serve as important remarks in designing a secure CP-ABE scheme. We cryptanalyzed Rao and Duttas CP-ABE scheme by mounting a CPA.A registered node in VANET can decrypt a ciphertext with unsatisfied DNF policy.Root cause of the attack exists in all CP-ABE schemes with normal forms policy.We propose a solution to serve as remarks in designing a secure CP-ABE scheme.


Archive | 2015

Implementation of a Conditional Searchable Encryption System for Data Storage

Diego Aulia Rahman; Swee-Huay Heng; Wei-Chuen Yau; Syh-Yuan Tan

Identity-based identification IBI schemes are generally insecure against reset attacks since they are commonly constructed from three-move


Information Processing Letters | 2013

On the security of a modified Beth identity-based identification scheme

Ji-Jian Chin; Syh-Yuan Tan; Swee-Huay Heng; Raphael C.-W. Phan


International Conference on U- and E-Service, Science and Technology | 2009

Fuzzy Identity-Based Identification Scheme

Syh-Yuan Tan; Swee-Huay Heng; Bok-Min Goi; SangJae Moon

\varSigma

Collaboration


Dive into the Syh-Yuan Tan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bok-Min Goi

Universiti Tunku Abdul Rahman

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wun-She Yap

Universiti Tunku Abdul Rahman

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge