Volume
@proceedings{AsiaJCIS2025,
title = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
year = {2025}}
Papers
@inproceedings{AsiaJCIS2025:Generic_Zero_Knowledge_Range,
author = {Yuki Sawai and Kyoichi Asano and Yohei Watanabe and Mitsugu Iwamoto},
title = {A Generic Zero-Knowledge Range Argument with Preprocessing},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/xs8k1},
doi = {10.29007/4v7f},
pages = {1-15},
year = {2025}}
@inproceedings{AsiaJCIS2025:Key_Value_Commitments_with,
author = {Towa Tsujimura and Atsuko Miyaji},
title = {Key-Value Commitments with Unlinkability},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/KMNp},
doi = {10.29007/8ssm},
pages = {16-30},
year = {2025}}
@inproceedings{AsiaJCIS2025:Security_Analysis_Public_Key,
author = {Mizuki Hayashi and Keita Emura},
title = {Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/KqwW},
doi = {10.29007/126n},
pages = {31-39},
year = {2025}}
@inproceedings{AsiaJCIS2025:Attack_Ring_LWE_Using,
author = {Kenjiro Hirose and Shinya Okumura and Atsuko Miyaji},
title = {An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/F3qC},
doi = {10.29007/8v1z},
pages = {40-54},
year = {2025}}
@inproceedings{AsiaJCIS2025:Hamming_Metric_Code_Based,
author = {Chik How Tan and Theo Fanuela Prabowo},
title = {Hamming Metric Code-Based Signature Scheme With Restricted Vectors},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/Q3hd},
doi = {10.29007/d743},
pages = {55-69},
year = {2025}}
@inproceedings{AsiaJCIS2025:Circular_Quantum_Secret_Sharing,
author = {Pei-Shiun Tsai and Tzu-Yu Liao and Wei-Rung Chen and Jason Lin and Iuon-Chang Lin},
title = {Circular Quantum Secret Sharing Based on SWAP Gates},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/BjTF},
doi = {10.29007/9lzf},
pages = {70-83},
year = {2025}}
@inproceedings{AsiaJCIS2025:Traceable_Cross_Domain_Anonymous,
author = {Hai Liang and Wenkang Tao and Yujue Wang and Shuo Wang and Yu Xu and Xinyong Peng},
title = {Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/rNZj},
doi = {10.29007/5mk1},
pages = {84-98},
year = {2025}}
@inproceedings{AsiaJCIS2025:Improved_Integral_Cryptanalysis_Reduced,
author = {Naoki Shibayama and Yasutaka Igarashi},
title = {Improved Integral Cryptanalysis on Reduced-Round Piccolo},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/RPLD},
doi = {10.29007/866h},
pages = {99-113},
year = {2025}}
@inproceedings{AsiaJCIS2025:Phishing_Attack_Simulation_Detection,
author = {Yao Yu Lee and Albert Guan},
title = {Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/WK6X},
doi = {10.29007/58hg},
pages = {114-121},
year = {2025}}
@inproceedings{AsiaJCIS2025:Tightly_Secure_Public_Key,
author = {Yi-Fan Tseng and Yi-Jiin Lu and Tien-Lin Tsai and Zi-Yuan Liu},
title = {Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/5zBD},
doi = {10.29007/f9gd},
pages = {122-132},
year = {2025}}
@inproceedings{AsiaJCIS2025:HybridNTT_Lightweight_Learning_Based,
author = {Gunsang You and Yeontae Ji and Heung Youl Youm},
title = {HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/9X6P},
doi = {10.29007/fdll},
pages = {133-143},
year = {2025}}
@inproceedings{AsiaJCIS2025:Smart_Contract_Based_Non,
author = {Hinata Nishino and Kazumasa Omote and Keita Emura},
title = {A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/LbXR},
doi = {10.29007/fbsx},
pages = {144-154},
year = {2025}}
@inproceedings{AsiaJCIS2025:Registered_Key_Policy_Attribute,
author = {Shih-Pei Kao and Yi-Fan Tseng and Tien-Lin Tsai and Yi-Jiin Lu and Jheng-Jia Huang and Guan-Yu Chen and Wei-Hsueh Wang},
title = {Registered Key-Policy Attribute-Based Encryption},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/LzGd},
doi = {10.29007/tjfx},
pages = {155-164},
year = {2025}}
@inproceedings{AsiaJCIS2025:Privacy_Preserving_Attribute_Domain,
author = {Yuto Tsujimoto and Atsuko Miyaji},
title = {Privacy-Preserving Attribute Domain Reconstruction for Machine Learning},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/2SPc},
doi = {10.29007/4l54},
pages = {165-175},
year = {2025}}
@inproceedings{AsiaJCIS2025:AI_Driven_Defense_Mechanism,
author = {Wibby Aldryani Astuti Praditasari and Hyungyeop Kim and Hyejin Yoon and Danang Rimbawa and Okyeon Yi},
title = {AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/rC5W},
doi = {10.29007/qxrb},
pages = {176-186},
year = {2025}}
@inproceedings{AsiaJCIS2025:Comparison_Post_Quantum_Signatures,
author = {Kwangjo Kim},
title = {Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/kvxx},
doi = {10.29007/wh4q},
pages = {187-198},
year = {2025}}
@inproceedings{AsiaJCIS2025:No_Anonymity_Metaverse_VR,
author = {Koki Miura and Hiroaki Kikuchi},
title = {No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/24lC},
doi = {10.29007/l3dj},
pages = {199-209},
year = {2025}}
@inproceedings{AsiaJCIS2025:Lightweight_Accurate_Classification_Framework,
author = {Ayako Sasaki and Takeshi Takahashi and Keisuke Furumoto and Chun-I Fan and Tomohiro Morikawa},
title = {A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method},
booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
editor = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
series = {EPiC Series in Computing},
volume = {106},
publisher = {EasyChair},
bibsource = {EasyChair, https://easychair.org},
issn = {2398-7340},
url = {/publications/paper/zZlP},
doi = {10.29007/s3f6},
pages = {210-220},
year = {2025}}