Day 1 – August 12, 2025 (Tue)
Time | Session | Title | Authors |
---|---|---|---|
~ 10:00 | Registration | On-site Registration | |
10:00 ~ 10:15 | Opening remark | Opening remark, Prof. Heung Youl Youm Welcoming remarks by Mr. Koji Nakao, Yong Ding, Hung-Min Sun | |
10:15 ~ 10:45 | Keynote (Session Chair: Heung Youl Youm (Soonchunhyang University)) | Keynote: Advancing Trustworthy AI, our approach and cutting-edge research | Seunghyun Son (TTA) |
10:45 ~ 11:00 | Break | Coffee Break | |
11:00 ~ 12:10 | Session 1 Zero-Knowledge, Commitments, and Access Control (Session Chair: Jun Lee (Korea Institute of Science and Technology Information)) | [Regular paper] A Generic Zero-Knowledge Range Argument with Preprocessing | Yuki Sawai, Kyoichi Asano, Yohei Watanabe, Mitsugu Iwamoto |
[Regular paper] Key-Value Commitments with Unlinkable Feature | Towa Tsujimura, Atsuko Miyaji | ||
[Short paper] Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | Yi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai, Zi-Yuan Liu | ||
[Regular paper] Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Hai Liang, Wenkang Tao, Yujue Wang, Yu Xu, Xinyong Peng | ||
12:10 ~ 13:15 | Lunch | Lunch | |
13:15 ~ 14:00 | Invited Talk #1 (Session Chair: Zhenwei Guo (Hangzhou Innovation Institute of Beilhang University)) | Invited Talk #1: Physical Layer Security Technologies: Innovations and Future Outlook | Prof. Ning Xie (Shenzhen University) |
14:00 ~ 14:10 | Break | Break | |
14:10 ~ 15:15 | Session 2 Privacy, Contracts, and Verification (Session Chair: Taewoong Kwon (Korea Institute of Science and Technology Information)) | [Regular paper] Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | Mizuki Hayashi, Keita Emura |
[Short paper] A Smart Contract-based Non-Transferable Signature Verification System using Nominative Signatures | Hinata Nishino, Kazumasa Omote, Keita Emura | ||
[Short paper] Registered Key-Policy Attribute-Based Encryption | Shih-Pei Kao, Yi-Fan Tseng, Tien-Lin Tsai, Yi-Jiin Lu, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang | ||
[Short paper] Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | Yuto Tsujimoto, Atsuko Miyaji | ||
15:15 ~ 15:25 | Break | Break | |
15:25 ~ 16:10 | Invited Talk #2 (Session Chair: Akira Fujita (NICT)) | Invited Talk #2: AI Meets Cybercrime: From Simulation to Structured Intelligence of Cybercrime Ecosystems | Prof. Yin Minn Pa Pa (Yokohama National University) |
16:10 ~ 16:20 | Break | Break | |
16:20 ~ 17:30 | Session 3 Post-Quantum Cryptography & Attacks (Session Chair: Junhyung Park (Soonchunhyang University)) | [Regular paper] An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | Kenjiro Hirose, Shinya Okumura, Atsuko Miyaji |
[Regular paper] Hamming Metric Code-Based Signature Scheme With Restricted Vectors | Chik How Tan, Theo Fanuela Prabowo | ||
[Short paper] AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | Wibby A. A. Praditasari, Hyungyeop Kim, Hyejin Yoon, Danang Rimbawa, Okyeon Yi | ||
[Short paper] Comparison of Post-Quantum Signatures – FALCON vs SOLMAE with Python | Kwangjo Kim | ||
17:30 ~ 18:00 | Poster Session (On-site, Session Chair: TBD) | Accepted Poster | |
18:00 ~ 20:00 | Banquet | Banquet |
Day 2 – August 13, 2025 (Wed)
Time | Session | Title | Authors |
---|---|---|---|
~ 9:00 | Registration | On-site Registration | |
9:00 ~ 9:45 | Invited Talk #3 (Session Chair: Hayoung Seong (Korea Institue of Science and Technology Information)) | Invited Talk #3: The Status of IoT CIC in Korea | SuHyun Park (KISA, Senior Researcher) |
9:45 ~ 10:00 | Break | Break | |
10:00 ~ 11:00 | Session 4 Applications in Quantum & Vehicular Systems (Session Chair: Ming-Hung Wang (National Chung Cheng University)) | [Regular paper] Circular Quantum Secret Sharing Based on SWAP Gates | Pei-Shiun Tsai, Tzu-Yu Liao, Wei-Rung Chen, Jason Lin, Luon-Chang Lin |
[Short paper] HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | Gunsang You, Yeontae Ji, Heung Youl Youm | ||
[Regular paper] Improved Integral Attack on Reduced-Round Piccolo | Naoki Shibayama, Yasutaka Igarashi | ||
11:00 ~ 11:15 | Break | Break | |
11:15 ~ 12:00 | Invited Talk #4 (Session Chair: Rui Tanabe (Juntendo University)) | Invited Talk #4:Computational Social Security: Uncovering Threats and Influence on Social Media | Prof. Ming-Hung Wang (National Chung Cheng Univ.) |
12:00 ~ 13:00 | Lunch | Lunch (Steering committee meeting / Offline) | |
13:00 ~ 13:50 | Session 5 AI in Security - Phishing, Detection and Threat Analysis (Session Chair: Akira Yamada (Kobe University)) | [Regular paper] Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | Yao Yu Lee, Albert Guan |
[Short paper] No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | Koki Miura, Hiroaki Kikuchi | ||
[Short paper] A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | Ayako Sasaki, Takeshi Takahashi, Keisuke Furumoto, Chun-I Fan, Tomohiro Morikawa | ||
13:50 ~ 14:00 | Break | Break | |
14:00 ~ 14:45 | Invited Talk #5 (Session Chair: Jun Lee(Korea Institute of Science and Technology Information)) | Invited Talk #5: The progress direction of Next-generation Cyber Security Research in Korea Networks | Chang-oh Kim (MSIT) |
14:45 ~ 14:50 | Awards | Best Paper Award Ceremony | |
14:50 ~ 15:00 | Closing | Closing Remarks |