Displaying all 4 publications

Abstract:
Sort:
  1. Chia J, Chin JJ, Yip SC
    F1000Res, 2021;10:931.
    PMID: 36798451 DOI: 10.12688/f1000research.72910.1
    Digital signature schemes (DSS) are ubiquitously used for public authentication in the infrastructure of the internet, in addition to their use as a cryptographic tool to construct even more sophisticated schemes such as those that are identity-based. The security of DSS is analyzed through the existential unforgeability under chosen message attack (EUF-CMA) experiment which promises unforgeability of signatures on new messages even when the attacker has access to an arbitrary set of messages and their corresponding signatures. However, the EUF-CMA model does not account for attacks such as an attacker forging a different signature on an existing message, even though the attack could be devastating in the real world and constitutes a severe breach of the security system. Nonetheless, most of the DSS are not analyzed in this security model, which possibly makes them vulnerable to such an attack. In contrast, a better security notion known as strong EUF-CMA (sEUF-CMA) is designed to be resistant to such attacks. This review aims to identify DSS in the literature that are secure in the sEUF-CMA model. In addition, the article discusses the challenges and future directions of DSS. In our review, we consider the security of existing DSS that fit our criterion in the sEUF-CMA model; our criterion is simple as we only require the DSS to be at least secure against the minimum of existential forgery. Our findings are categorized into two classes: the direct and indirect classes of sEUF-CMA. The former is inherently sEUF-CMA without any modification while the latter requires some transformation. Our comprehensive  review contributes to the security and cryptographic research community by discussing the efficiency and security of DSS that are sEUF-CMA, which aids in selecting robust DSS in future design considerations.
  2. Lau TSC, Kamel Ariffin MR, Yip SC, Chin JJ, Ting CY
    Heliyon, 2024 Jan 30;10(2):e24185.
    PMID: 38298683 DOI: 10.1016/j.heliyon.2024.e24185
    In recent research, Durandal, a signature scheme based on rank metrics following Schnorr's approach, was introduced to conceal secret key information by selectively manipulating the vector subspace of signatures. Later, an enhancement, namely the SHMW signature scheme, with smaller keys and signatures while maintaining EUF-CMA security, was proposed. Both Durandal and SHMW require adversaries to solve hard problems (i.e., Rank Support Learning, Rank Syndrome Decoding, and Affine Rank Syndrome Decoding) for secret key retrieval, in which the parameters are designed to withstand at least 128-bit computational complexity. The authors claimed that the security of the SHMW scheme is deemed superior to that of the original Durandal scheme. In this paper, we introduce a novel approach to identifying weak keys within the Durandal framework to prove the superiority of the SHMW scheme. This approach exploits the extra information in the signature to compute an intersection space that contains the secret key. Consequently, a cryptanalysis of the SHMW signature scheme was carried out to demonstrate the insecurity of the selected keys within the SHWM scheme. In particular, we proposed an algorithm to recover an extended support that contains the secret key used in the signature schemes. Applying our approach to the SHMW scheme, we can recover its secret key with only 97-bit complexity, although it was claimed that the proposed parameters achieve a 128-bit security level. The results of our proposed approaches show that the security level of the SHMW signature scheme is inferior compared to that of the original Durandal scheme.
  3. Maharajan MK, Yong YJ, Yip HY, Woon SS, Yeap KM, Yap KY, et al.
    J Anesth, 2020 02;34(1):95-103.
    PMID: 31535218 DOI: 10.1007/s00540-019-02680-y
    Globally, chronic pain is a major therapeutic challenge and affects more than 15% of the population. As patients with painful terminal diseases may face unbearable pain, there is a need for more potent analgesics. Although opioid-based therapeutic agents received attention to manage severe pain, their adverse drug effects and mortality rate associated with opioids overdose are the major concerns. Evidences from clinical trials showed therapeutic benefits of cannabis, especially delta-9-tetrahydrocannabinol and cannabinoids reduced neuropathic pain intensity in various conditions. Also, there are reports on using combination cannabinoid therapies for chronic pain management. The association of cannabis dependence and addiction has been discussed much and the reports mentioned that it can be comparatively lower than other substances such as nicotine and alcohol. More countries have decided to legalise the medicinal use of cannabis and marijuana. Healthcare professionals should keep themselves updated with the changing state of medical cannabis and its applications. The pharmacokinetics and safety of medical cannabis need to be studied by conducting clinical research. The complex and variable chemically active contents of herbal cannabis and methodological limitations in the administration of cannabis to study participants, make the clinical research difficult.
  4. Yusof SN, Kamel Ariffin MR, Yip SC, Lau TSC, Mahad Z, Chin JJ, et al.
    Heliyon, 2024 Feb 29;10(4):e25470.
    PMID: 38370193 DOI: 10.1016/j.heliyon.2024.e25470
    In 1999, the Polynomial Reconstruction Problem (PRP) was put forward as a new hard mathematics problem. A univariate PRP scheme by Augot and Finiasz was introduced at Eurocrypt in 2003, and this cryptosystem was fully cryptanalyzed in 2004. In 2013, a bivariate PRP cryptosystem was developed, which is a modified version of Augot and Finiasz's original work. This study describes a decryption failure that can occur in both cryptosystems. We demonstrate that when the error has a weight greater than the number of monomials in a secret polynomial, p, decryption failure can occur. The result of this study also determines the upper bound that should be applied to avoid decryption failure.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links