AsiaJCIS 2025 Program

AsiaJCIS 2025

Day 1 – August 12, 2025 (Tue)

TimeSessionTitleAuthors
~ 10:00RegistrationRegistration (offline)
10:00 ~ 10:15OpeningOpening remark, Prof. Heung Youl Youm
Welcoming remarks by Mr. Koji Nakao, Yong Ding, Hung-Min Sun
10:15 ~ 10:45KeynoteKeynote:
Advancing AI Trustworthy: AI-related activities for creating trustworthy AI in TTA and Korea
Seunghyun Son (TTA)
10:45 ~ 11:00BreakCoffee Break
11:00 ~ 12:10 Session 1: Zero-Knowledge, Commitments, and Access Control [Regular paper] A Generic Zero-Knowledge Range Argument with Preprocessing Yuki Sawai, Kyoichi Asano, Yohei Watanabe, Mitsugu Iwamoto
[Regular paper] Key-Value Commitments with Unlinkable FeatureTowa Tsujimura, Atsuko Miyaji
[Short paper] Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard ModelYi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai, Zi-Yuan Liu
[Short paper] HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic TransformGunsang You, Yeontae Ji, Heung Youl Youm
12:10 ~ 13:15LunchLunch
13:15 ~ 14:00Invited Talk #1TBDProf. Ning Xie (Shenzhen University)
14:00 ~ 14:10BreakBreak
14:10 ~ 15:15 Session 2: Privacy, Contracts, and Verification [Regular paper] Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester Mizuki Hayashi, Keita Emura
[Short paper] A Smart Contract-based Non-Transferable Signature Verification System using Nominative SignaturesHinata Nishino, Kazumasa Omote, Keita Emura
[Short paper] Registered Key-Policy Attribute-Based EncryptionShih-Pei Kao, Yi-Fan Tseng, Tien-Lin Tsai, Yi-Jiin Lu
[Short paper] Privacy-Preserving Attribute Domain Reconstruction for Machine LearningYuto Tsujimoto, Atsuko Miyaji
15:15 ~ 15:25BreakBreak
15:25 ~ 16:10Invited Talk #2TBDProf. Yin Min Papa (Yokohama National University)
16:10 ~ 16:20BreakBreak
16:20 ~ 17:30 Session 3: Post-Quantum Cryptography & Attacks [Regular paper] An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm Kenjiro Hirose, Shinya Okumura, Atsuko Miyaji
[Regular paper] Hamming Metric Code-Based Signature Scheme With Restricted VectorsChik How Tan, Theo Fanuela Prabowo
[Short paper] AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel AttacksWibby A. Praditasari, Hyungyeop Kim, Hyejin Yoon, Danang Rimbawa, Okyeon Yi
[Short paper] Comparison of Post-Quantum Signatures – FALCON vs SOLMAE with PythonKwangjo Kim
17:30 ~ 18:00Poster SessionEnhancing User Authentication for Online Credit Card TransactionsJia-Ning Luo, Shu-Chen Yang, Ming-Hour Yang, Ray-Lin Tso
18:00 ~ 20:00BanquetBanquet

Day 2 – August 13, 2025 (Wed)

TimeSessionTitleAuthors
~ 9:00RegistrationRegistration (offline)
9:00 ~ 9:45Invited Talk #3The Status of IoT CIC in KoreaSuHyun Park (KISA)
9:45 ~ 10:00BreakBreak
10:00 ~ 11:00 Session 4: Applications in Quantum & Vehicular Systems [Regular paper] Circular Quantum Secret Sharing Based on SWAP Gates Pei-Shiun Tsai, Tzu-Yu Liao, Wei-Rung Chen, Jason Lin
[Regular paper] Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing ServicesHai Liang, Wenkang Tao, Yujue Wang, Changsong Yang, Shuo Wang, Yu Xu
[Regular paper] Improved Integral Attack on Reduced-Round PiccoloNaoki Shibayama, Yasutaka Igarashi
11:00 ~ 11:15BreakBreak
11:15 ~ 12:00Invited Talk #4TBDProf. Ming-Hung Wang (National Chung Cheng Univ.)
12:00 ~ 13:00LunchLunch (Steering committee meeting / Offline)
13:00 ~ 13:50 Session 5: Security, Phishing, and Analysis [Regular paper] Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform Yao Yu Lee, Albert Guan
[Short paper] No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms MotionsKoki Miura, Hiroaki Kikuchi
[Short paper] A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation MethodAyako Sasaki, Takeshi Takahashi, Keisuke Furumoto, Chun-I Fan, Tomohiro Morikawa
13:50 ~ 14:00BreakBreak
14:00 ~ 14:45Invited Talk #5The progress direction of Next-generation Cyber Security Research in Korea NetworksChang-oh Kim (MSIT)
14:45 ~ 14:50AwardsBest Paper Award Ceremony
14:50 ~ 15:00ClosingClosing Remarks