AsiaJCIS 2025 Program

AsiaJCIS 2025

Day 1 – August 12, 2025 (Tue)

TimeSessionTitleAuthors
~ 10:00RegistrationOn-site Registration
10:00 ~ 10:15Opening remarkOpening remark, Prof. Heung Youl Youm
Welcoming remarks by Mr. Koji Nakao, Yong Ding, Hung-Min Sun
10:15 ~ 10:45Keynote (Session Chair: Heung Youl Youm (Soonchunhyang University))Keynote:
Advancing Trustworthy AI, our approach and cutting-edge research
Seunghyun Son (TTA)
10:45 ~ 11:00BreakCoffee Break
11:00 ~ 12:10 Session 1 Zero-Knowledge, Commitments, and Access Control (Session Chair: Jun Lee (Korea Institute of Science and Technology Information)) [Regular paper] A Generic Zero-Knowledge Range Argument with Preprocessing Yuki Sawai, Kyoichi Asano, Yohei Watanabe, Mitsugu Iwamoto
[Regular paper] Key-Value Commitments with Unlinkable FeatureTowa Tsujimura, Atsuko Miyaji
[Short paper] Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard ModelYi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai, Zi-Yuan Liu
[Regular paper] Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing ServicesHai Liang, Wenkang Tao, Yujue Wang, Yu Xu, Xinyong Peng
12:10 ~ 13:15LunchLunch
13:15 ~ 14:00Invited Talk #1 (Session Chair: Zhenwei Guo (Hangzhou Innovation Institute of Beilhang University)) Invited Talk #1:
Physical Layer Security Technologies: Innovations and Future Outlook
Prof. Ning Xie (Shenzhen University)
14:00 ~ 14:10BreakBreak
14:10 ~ 15:15 Session 2 Privacy, Contracts, and Verification (Session Chair: Taewoong Kwon (Korea Institute of Science and Technology Information)) [Regular paper] Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester Mizuki Hayashi, Keita Emura
[Short paper] A Smart Contract-based Non-Transferable Signature Verification System using Nominative SignaturesHinata Nishino, Kazumasa Omote, Keita Emura
[Short paper] Registered Key-Policy Attribute-Based EncryptionShih-Pei Kao, Yi-Fan Tseng, Tien-Lin Tsai, Yi-Jiin Lu, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang
[Short paper] Privacy-Preserving Attribute Domain Reconstruction for Machine LearningYuto Tsujimoto, Atsuko Miyaji
15:15 ~ 15:25BreakBreak
15:25 ~ 16:10Invited Talk #2 (Session Chair: Akira Fujita (NICT)) Invited Talk #2:
AI Meets Cybercrime: From Simulation to Structured Intelligence of Cybercrime Ecosystems
Prof. Yin Minn Pa Pa (Yokohama National University)
16:10 ~ 16:20BreakBreak
16:20 ~ 17:30 Session 3 Post-Quantum Cryptography & Attacks (Session Chair: Junhyung Park (Soonchunhyang University)) [Regular paper] An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm Kenjiro Hirose, Shinya Okumura, Atsuko Miyaji
[Regular paper] Hamming Metric Code-Based Signature Scheme With Restricted VectorsChik How Tan, Theo Fanuela Prabowo
[Short paper] AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel AttacksWibby A. A. Praditasari, Hyungyeop Kim, Hyejin Yoon, Danang Rimbawa, Okyeon Yi
[Short paper] Comparison of Post-Quantum Signatures – FALCON vs SOLMAE with PythonKwangjo Kim
17:30 ~ 18:00Poster Session (On-site, Session Chair: TBD) Accepted Poster
18:00 ~ 20:00BanquetBanquet

Day 2 – August 13, 2025 (Wed)

TimeSessionTitleAuthors
~ 9:00RegistrationOn-site Registration
9:00 ~ 9:45Invited Talk #3 (Session Chair: Hayoung Seong (Korea Institue of Science and Technology Information)) Invited Talk #3:
The Status of IoT CIC in Korea
SuHyun Park (KISA, Senior Researcher)
9:45 ~ 10:00BreakBreak
10:00 ~ 11:00 Session 4 Applications in Quantum & Vehicular Systems (Session Chair: Ming-Hung Wang (National Chung Cheng University)) [Regular paper] Circular Quantum Secret Sharing Based on SWAP Gates Pei-Shiun Tsai, Tzu-Yu Liao, Wei-Rung Chen, Jason Lin, Luon-Chang Lin
[Short paper] HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic TransformGunsang You, Yeontae Ji, Heung Youl Youm
[Regular paper] Improved Integral Attack on Reduced-Round PiccoloNaoki Shibayama, Yasutaka Igarashi
11:00 ~ 11:15BreakBreak
11:15 ~ 12:00Invited Talk #4 (Session Chair: Rui Tanabe (Juntendo University)) Invited Talk #4:Computational Social Security: Uncovering Threats and Influence on Social MediaProf. Ming-Hung Wang (National Chung Cheng Univ.)
12:00 ~ 13:00LunchLunch (Steering committee meeting / Offline)
13:00 ~ 13:50 Session 5 AI in Security - Phishing, Detection and Threat Analysis (Session Chair: Akira Yamada (Kobe University)) [Regular paper] Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform Yao Yu Lee, Albert Guan
[Short paper] No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms MotionsKoki Miura, Hiroaki Kikuchi
[Short paper] A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation MethodAyako Sasaki, Takeshi Takahashi, Keisuke Furumoto, Chun-I Fan, Tomohiro Morikawa
13:50 ~ 14:00BreakBreak
14:00 ~ 14:45Invited Talk #5 (Session Chair: Jun Lee(Korea Institute of Science and Technology Information)) Invited Talk #5:
The progress direction of Next-generation Cyber Security Research in Korea Networks
Chang-oh Kim (MSIT)
14:45 ~ 14:50AwardsBest Paper Award Ceremony
14:50 ~ 15:00ClosingClosing Remarks