Day 1 – August 12, 2025 (Tue)
Time | Session | Title | Authors |
---|---|---|---|
~ 10:00 | Registration | Registration (offline) | |
10:00 ~ 10:15 | Opening | Opening remark, Prof. Heung Youl Youm Welcoming remarks by Mr. Koji Nakao, Yong Ding, Hung-Min Sun | |
10:15 ~ 10:45 | Keynote | Keynote: Advancing AI Trustworthy: AI-related activities for creating trustworthy AI in TTA and Korea | Seunghyun Son (TTA) |
10:45 ~ 11:00 | Break | Coffee Break | |
11:00 ~ 12:10 | Session 1: Zero-Knowledge, Commitments, and Access Control | [Regular paper] A Generic Zero-Knowledge Range Argument with Preprocessing | Yuki Sawai, Kyoichi Asano, Yohei Watanabe, Mitsugu Iwamoto |
[Regular paper] Key-Value Commitments with Unlinkable Feature | Towa Tsujimura, Atsuko Miyaji | ||
[Short paper] Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | Yi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai, Zi-Yuan Liu | ||
[Short paper] HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | Gunsang You, Yeontae Ji, Heung Youl Youm | ||
12:10 ~ 13:15 | Lunch | Lunch | |
13:15 ~ 14:00 | Invited Talk #1 | TBD | Prof. Ning Xie (Shenzhen University) |
14:00 ~ 14:10 | Break | Break | |
14:10 ~ 15:15 | Session 2: Privacy, Contracts, and Verification | [Regular paper] Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | Mizuki Hayashi, Keita Emura |
[Short paper] A Smart Contract-based Non-Transferable Signature Verification System using Nominative Signatures | Hinata Nishino, Kazumasa Omote, Keita Emura | ||
[Short paper] Registered Key-Policy Attribute-Based Encryption | Shih-Pei Kao, Yi-Fan Tseng, Tien-Lin Tsai, Yi-Jiin Lu | ||
[Short paper] Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | Yuto Tsujimoto, Atsuko Miyaji | ||
15:15 ~ 15:25 | Break | Break | |
15:25 ~ 16:10 | Invited Talk #2 | TBD | Prof. Yin Min Papa (Yokohama National University) |
16:10 ~ 16:20 | Break | Break | |
16:20 ~ 17:30 | Session 3: Post-Quantum Cryptography & Attacks | [Regular paper] An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | Kenjiro Hirose, Shinya Okumura, Atsuko Miyaji |
[Regular paper] Hamming Metric Code-Based Signature Scheme With Restricted Vectors | Chik How Tan, Theo Fanuela Prabowo | ||
[Short paper] AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | Wibby A. Praditasari, Hyungyeop Kim, Hyejin Yoon, Danang Rimbawa, Okyeon Yi | ||
[Short paper] Comparison of Post-Quantum Signatures – FALCON vs SOLMAE with Python | Kwangjo Kim | ||
17:30 ~ 18:00 | Poster Session | Enhancing User Authentication for Online Credit Card Transactions | Jia-Ning Luo, Shu-Chen Yang, Ming-Hour Yang, Ray-Lin Tso |
18:00 ~ 20:00 | Banquet | Banquet |
Day 2 – August 13, 2025 (Wed)
Time | Session | Title | Authors |
---|---|---|---|
~ 9:00 | Registration | Registration (offline) | |
9:00 ~ 9:45 | Invited Talk #3 | The Status of IoT CIC in Korea | SuHyun Park (KISA) |
9:45 ~ 10:00 | Break | Break | |
10:00 ~ 11:00 | Session 4: Applications in Quantum & Vehicular Systems | [Regular paper] Circular Quantum Secret Sharing Based on SWAP Gates | Pei-Shiun Tsai, Tzu-Yu Liao, Wei-Rung Chen, Jason Lin |
[Regular paper] Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Hai Liang, Wenkang Tao, Yujue Wang, Changsong Yang, Shuo Wang, Yu Xu | ||
[Regular paper] Improved Integral Attack on Reduced-Round Piccolo | Naoki Shibayama, Yasutaka Igarashi | ||
11:00 ~ 11:15 | Break | Break | |
11:15 ~ 12:00 | Invited Talk #4 | TBD | Prof. Ming-Hung Wang (National Chung Cheng Univ.) |
12:00 ~ 13:00 | Lunch | Lunch (Steering committee meeting / Offline) | |
13:00 ~ 13:50 | Session 5: Security, Phishing, and Analysis | [Regular paper] Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | Yao Yu Lee, Albert Guan |
[Short paper] No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | Koki Miura, Hiroaki Kikuchi | ||
[Short paper] A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | Ayako Sasaki, Takeshi Takahashi, Keisuke Furumoto, Chun-I Fan, Tomohiro Morikawa | ||
13:50 ~ 14:00 | Break | Break | |
14:00 ~ 14:45 | Invited Talk #5 | The progress direction of Next-generation Cyber Security Research in Korea Networks | Chang-oh Kim (MSIT) |
14:45 ~ 14:50 | Awards | Best Paper Award Ceremony | |
14:50 ~ 15:00 | Closing | Closing Remarks |