30th Australasian Conference on Information Security and Privacy
14 - 16 July 2025, Wollongong, Australia

Accepted Papers

FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity

Yang Yang (Beihang University, China), Bingyu Li (Beihang University, China), Zhenyang Ding (Beihang University, China), Qianhong Wu (Beihang University, China), Bo Qin (Renmin University of China, China), Qin Wang (The University of New South Wales, Australia)

Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy

She Sun (Zhejiang Laboratory, China), Jiafei Wu (Zhejiang Laboratory, China), Jian Yang (Northwest University, China), Li Zhou (Zhejiang Laboratory, China), Huiwen Wu (Zhejiang Laboratory, China)

Towards Quantum Security of Hirose Compression Function and Romulus-H

Shaoxuan Zhang (Shandong University, China), Chun Guo (Shandong University; Shandong Research Institute of Industrial Technology; Quan Cheng Laboratory, China), Meiqin Wang (Shandong University, Quan Cheng Laboratory, China)

Efficient Multi-instance Vector Commitment and Application to Post-quantum Signatures

Dung Bui (Université Paris Cité, France)

Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium

Dixiao Du (Nanjing University of Science and Technology, China), Yuejun Liu (Nanjing University of Science and Technology, China), Yiwen Gao (Nanjing University of Science and Technology, China), Jingdian Ming (Nanjing University of Science and Technology, China), Hao Yuan (Nanjing University of Science and Technology, China), Yongbin Zhou (Nanjing University of Science and Technology, China; Chinese Academy of Sciences, China)

Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities

Jingzi Meng (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yuewu Wang (University of Chinese Academy of Sciences, China), Lingguang Lei (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Chunjing Kou (University of Chinese Academy of Sciences, China), Peng Wang (University of Chinese Academy of Sciences, China), Huawei Lu (Unicom Digital Technology Co., Ltd., China)

Ideal Transformations for Public Key Encryption

Yao Cheng (Chinese Academy of Sciences, China), Xianhui Lu (Chinese Academy of Sciences, China), Ziyi Li (Chinese Academy of Sciences, China)

Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning

Sheldon C. Ebron (University of Memphis, USA), Meiying Zhang (University of Memphis, USA), Kan Yang (University of Memphis, USA)

Forgery Attacks on SipHash

Kosuke Sasaki (University of Hyogo, Japan), Rikuto Kurahara (University of Hyogo, Japan), Kosei Sakamoto (Mitsubishi Electric Corporation, Japan), Takanori Isobe (University of Hyogo, Japan)

Efficient Revocable Identity-Based Encryption from Middle-Product LWE

Takumi Nishimura (The University of Tokyo, Japan), Atsushi Takayasu (The University of Tokyo, Japan; National Institute of Advanced Industrial Science and Technology, Japan)

Code-based Fully Dynamic Accountable Ring Signatures and Group Signatures using the Helper Methodology

Rishiraj Bhattacharyya (University of Birmingham, UK), Sreehari Kollath (University of Birmingham, UK), Christophe Petit (University of Birmingham, UK; Université Libre de Bruxelles, Belgium)

Compact Lifting for NTT-unfriendly Modulus

Ying Liu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Xianhui Lu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yu Zhang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Ruida Wang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Ziyao Liu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Kunpeng Wang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

Compressed Sigma Protocols: New Model and Aggregation Techniques

Yuxi Xue (The Hong Kong Polytechnic University, Hong Kong), Tianyu Zheng (The Hong Kong Polytechnic University, Hong Kong), Shang Gao (The Hong Kong Polytechnic University, Hong Kong), Bin Xiao (The Hong Kong Polytechnic University, Hong Kong), Man Ho Au (The Hong Kong Polytechnic University, Hong Kong)

Partial Key Exposure Attacks on UOV and Its Variants

Yuki Seto (The University of Tokyo, Japan), Hiroki Furue (NTT Social Informatics Laboratories, Japan), Atsushi Takayasu (The University of Tokyo, Japan; National Institute of Advanced Industrial Science and Technology, Japan)

Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities

Subhadeep Banik (Università della Svizzera Italiana, Switzerland), Hailun Yan (University of Chinese Academy of Sciences, China; State Key Laboratory of Cryptology, China)

Strong Federated Authentication with Password-based Credential against Identity Server Corruption

Changsong Jiang (University of Electronic Science and Technology of China, China; Singapore Management University, Singapore), Chunxiang Xu (University of Electronic Science and Technology of China, China; Yangtze Delta Region Institute, University of Electronic Science and Technology of China, China), Guomin Yang (Singapore Management University, Singapore), Li Duan (Paderborn University, Germany), Jing Wang (Huazhong University of Science and Technology, China)

Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug&Charge for Shared Vehicles

Kyosuke Hatsugai (The University of Electro-Communications, Japan), Kyoichi Asano (The University of Electro-Communications, Japan), Yuki Sawai (The University of Electro-Communications, Japan; DENSO CORPORATION, Japan), Yohei Watanabe (The University of Electro-Communications, Japan), Mitsugu Iwamoto (The University of Electro-Communications, Japan)

EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing

Hua Shen (Hubei University of Technology, China; Hubei Key Laboratory of Green Intelligent Computing Power Network, China), Xinjie Li (Hubei University of Technology, China; Hubei Key Laboratory of Green Intelligent Computing Power Network, China), Zhen Fan (Wuhan Maritime Communication Research Institute, China), Ge Wu (Southeast University, China), Mingwu Zhang (Hubei University of Technology, China; Hubei Key Laboratory of Green Intelligent Computing Power Network, China)

Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis

Akito Yamamoto (The University of Tokyo, Japan), Tetsuo Shibuya (The University of Tokyo, Japan)

Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics

Arash Mahboubi (Charles Sturt University, Australia), Hamed Aboutorab (University of New South Wales, Australia), Seyit Camtepe (CSIRO Data 61, Australia), Hang Thanh Bui (University of New South Wales, Australia), Khanh Luong (Queensland University of Technology, Australia), Keyvan Ansari (Murdoch University, Australia), Shenlu Wang (CSIRO Data 61, Australia), Bazara Barry (Cyber Security NSW – NSW Department of Customer Service, Australia)

Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks

Bingqing Li (Shandong University, China), Ling Sun (Shandong University, China; Quan Cheng Shandong Laboratory, China)

RAGLeak: Membership Inference Attacks on RAG-based Large Language Models

Kaiyue Feng (University of Technology Sydney, Australia), Guangsheng Zhang (University of Technology Sydney, Australia), Huan Tian (University of Technology Sydney, Australia), Heng Xu (University of Technology Sydney, Australia), Yanjun Zhang (University of Technology Sydney, Australia), Tianqing Zhu (City University of Macau, China), Ming Ding (CSIRO, Australia), Bo Liu (University of Technology Sydney, Australia)

DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning

Zhenzhu Chen (Southwestern University of Finance and Economics, China; Nanjing University of Science and Technology, China), Yansong Gao (University of Western Australia, Australia), Anmin Fu (Nanjing University of Science and Technology, China), Fanjian Zeng (Nanjing University of Science and Technology, China), Boyu Kuang (Nanjing University of Science and Technology, China), Robert H. Deng (Singapore Management University, Singapore)

Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience

Ying Cai (Shandong University, China), Chengyi Qin (Shandong University, China), Mingqiang Wang (Shandong University, China)

Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION  and Chaghri

Weizhe Wang (Shanghai Jiao Tong University, China), Deng Tang (Shanghai Jiao Tong University, China), Haoyang Wang (Shanghai Jiao Tong University, China)

FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory

Haocheng Ye (Nanjing University of Aeronautics and Astronautics, China), Lu Zhou (Nanjing University of Aeronautics and Astronautics, China; Collaborative Innovation Center of Novel Software Technology and Industrialization, China), Hao Wang (Nanjing University of Aeronautics and Astronautics, China), Chunpeng Ge (Shandong University, China; The Joint SDU-NTU Centre for Artificial Intelligence Research (C-FAIR))

DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend

Huiwen Wu (Zhejiang Laboratory, China), Chuan Ma (Chongqing University, China), Xueran Li (Anhui University, China), Deyi Zhang (Zhejiang Laboratory, China), Xiaohan Li (Zhejiang Laboratory, China), She Sun (Zhejiang Laboratory, China)

Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWE-Based Optimization

Xiaohan Wan (Shandong University, China; State Key Laboratory of Cryptography and Digital Economy Security, China), Yang Wang (Shandong University, China; National Key Laboratory of Security Communication, China; State Key Laboratory of Cryptography and Digital Economy Security, China; State Key Laboratory of Cryptology, China), Haiyang Xue (Singapore Management University, Singapore), Mingqiang Wang (Shandong University, China; State Key Laboratory of Cryptography and Digital Economy Security, China)

Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application

Jiahao Xuan (University of Electronic Science and Technology of China, China)

Solving Generalized Approximate Divisor Multiples Problems

Naoki Shimoe (University of Tsukuba, Japan), Noboru Kunihiro (University of Tsukuba, Japan)

Sentence Embedding Generation Method for Differential Privacy Protection

Yangyang Liu (Nanjing University, China), Wanqi Wang (Nanjing University, China), Jingyu Hua (Nanjing University, China)

MG-Det: Deepfake Detection with Multi-Granularity

Ahmed Asiri (University of Technology Sydney, Australia), Luoyu Chen (University of Technology Sydney, Australia), Zhiyi Tian (University of Technology Sydney, Australia), Xiaoyu Ding (University of Technology Sydney, Australia), Shui Yu (University of Technology Sydney, Australia)

LPIA: Label Preference Inference Attack against Federated Graph Learning

Jiaxue Bai (Harbin Institute of Technology, China), Lu Shi (Harbin Institute of Technology, China; Pengcheng Laboratory, China), Yang Liu (Swansea University, UK), Weizhe Zhang (Harbin Institute of Technology, China; Pengcheng Laboratory, China; Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, China)

Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo

Weiqing Deng (Shanghai Jiao Tong University, China), Jianing Zhang (Shanghai Jiao Tong University, China), Haoyang Wang (Shanghai Jiao Tong University, China)

Accountability for Server Misbehavior in Homomorphic Secret Sharing

Xinzhou Wang (Shanghai Jiao Tong University, China), Shi-Feng Sun (Shanghai Jiao Tong University, China), Dawu Gu (Shanghai Jiao Tong University, China), Yuan Luo (Shanghai Jiao Tong University, China)

SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies

Qishu Huang Fu (Monash University, Australia), Joseph K. Liu (Monash University, Australia), Shirui Pan (Griffith University, Australia), Tsz Hon Yuen (Monash University, Australia)

TEAKEX: TESLA-Authenticated Group Key Exchange

Qinyi Li (Griffith University, Australia), Lise Millerjord (NTNU – Norwegian University of Science and Technology, Norway), Colin Boyd (NTNU – Norwegian University of Science and Technology, Norway)

SoK: From Systematization to Best Practices in Fuzz Driver Generation

Qian Yan (Academy of Military Sciences, PLA, China), Minhuan Huang (Academy of Military Sciences, PLA, China), Huayang Cao (Academy of Military Sciences, PLA, China), Shuaibing Lu (Academy of Military Sciences, PLA, China)

Glitter: A Fully Adaptive and Tightly Secure Threshold Signature

Shaolong Tang (Beijing Institute of Technology, China), Peng Jiang (Beijing Institute of Technology, China), Liehuang Zhu (Beijing Institute of Technology, China)

KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation

Yuan Li (Guangdong University of Foreign Studies, China), Changji Wang (Guangdong University of Foreign Studies, China; Guangdong Engineering Research Center of Data Security Governance and Privacy Computing, China), Shiwen Hu (Guangdong University of Foreign Studies, China)

Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps

Chuer Yu (Zhejiang University, China), Siyi Xia (Zhejiang University, China), Haoyu Wang (Zhejiang University, China), Xia Liu (Zhejiang University, China), Zonghui Wang (Zhejiang University, China), Lirong Fu (Zhejiang University, China), Zhiyuan Wan (Zhejiang University, China), Yandong Gao (Zhejiang University, China), Yang Xiang (Swinburne University of Technology, Australia), Wenzhi Chen (Zhejiang University, China)

Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection

Yao Cheng (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Xianhui Lu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Ziyi Li (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yongjian Yin (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight

Yuanyuan Zhang (Hubei University of Technology, China; Hubei Provincial Key Laboratory of Green Intelligent Computing Power Network, China), Yu Liu (Hubei University of Technology, China; Hubei Provincial Key Laboratory of Green Intelligent Computing Power Network, China), Yahui Wang (Xinyang Normal University, China), Tianqing Zhu (City University of Macau, China), Mingwu Zhang (Hubei University of Technology, China; Hubei Provincial Key Laboratory of Green Intelligent Computing Power Network, China)

DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention

Lihua Wang (The University of New South Wales, Australia; CSIRO Data61, Australia), Jiaojiao Jiang (The University of New South Wales, Australia), Salil S. Kanhere (The University of New South Wales, Australia), Jiamou Sun (CSIRO Data61, Australia), Sanjay Jha (The University of New South Wales, Australia), Zhenchang Xing (CSIRO Data61, Australia)

Fiat-Shamir with Rejection and Rotation

Xianhui Lu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yongjian Yin (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Dingding Jia (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Jingnan He (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yamin Liu (Huawei International, China), Yijian Liu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Hongbo Liu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

Refined Error Management for Gate Bootstrapping

Chunling Chen (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Xianhui Lu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Binwu Xiang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Bowen Huang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Ruida Wang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yijian Liu (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

Faster VOLEitH Signatures from All-but-One Vector Commitment and Half-Tree

Dung Bui (IRIF, Université Paris Cité, France), Kelong Cong (Zama, France), Cyprien Delpech de Saint Guilhem (3MI Labs, Belgium)

Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques

Mengce Zheng (Zhejiang Wanli University, China), Yansong Feng (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Abderrahmane Nitaj (Normandie Univ, UNICAEN, CNRS, LMNO, France), Yanbin Pan (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks

Jianbin Gao (University of Electronic Science and Technology of China, China), Ansu Badjie (University of Electronic Science and Technology of China, China), Qi Xia (University of Electronic Science and Technology of China, China), Patrick Mukala (University of Wollongong in Dubai, UAE), Hu Xia (University of Electronic Science and Technology of China, China), Grace Mupoyi Ntuala (University of Electronic Science and Technology of China, China)

Amoeba: More Flexible RLWE-based KEM

Qingfeng Wang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Li-Ping Wang (Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China; Laboratory for Advanced Computing and Intelligence Engineering, China)

Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols

Lei Tian (Shanghai Jiao Tong University, China), Chenke Wang (Shanghai Jiao Tong University, China), Yu Long (Shanghai Jiao Tong University, China), Xian Xu (East China University of Science and Technology, China), Mingchao Wan (Beijing Academy of Blockchain and Edge Computing, China), Chunmiao Li (Beijing Academy of Blockchain and Edge Computing, China), Shi-Feng Sun (Shanghai Jiao Tong University, China), Dawu Gu (Shanghai Jiao Tong University, China)

Zeroth-Order Federated Private Tuning for Pretrained Large Language Models

Xiaoyu Zhang (Xidian University, China; Guangzhou University, China), Yong Lin (Xidian University, China), Meixia Miao (Xi’an University of Posts and Telecommunications, China; Guangzhou University, China), Jian Lou (Xidian University, China; Sun Yat-sen University, China), Jin Li (Guangzhou University, China), Xiaofeng Chen (Xidian University, China)

Strengthening Key Scheduling of AES-256 with Minimal Software Modifications

Shoma Kawakami (University of Hyogo, Japan), Kazuma Taka (University of Osaka, Japan; National Institute of Information and Communications Technology, Japan), Atsushi Tanaka (University of Osaka, Japan), Tatsuya Ishikawa (University of Osaka, Japan), Takanori Isobe (University of Osaka, Japan)

Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-based Self-Comparison Oracle

Zhenzhi Lai (The University of Melbourne, Australia), Udaya Parampalli (The University of Melbourne, Australia)

Understanding the Robustness of Machine Unlearning Models

Guanqin Zhang (UNSW Sydney, Australia; CSIRO Data61, Australia), Feng Xu (UNSW Sydney, Australia; CSIRO Data61, Australia), H.M.N. Dilum Bandara (UNSW Sydney, Australia; CSIRO Data61, Australia), Shiping Chen (UNSW Sydney, Australia; CSIRO Data61, Australia), Yulei Sui (UNSW Sydney, Australia)

PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain

Hideaki Miyaji (Ritsumeikan University, Japan), Noriaki Kamiyama (Ritsumeikan University, Japan)

Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption

Bowen Jiang (Singapore Management University, Singapore), Guofeng Tang (Singapore Management University, Singapore), Haiyang Xue (Singapore Management University, Singapore)

High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping

Zejiu Tan (Harbin Institute of Technology, China), Junping Wan (Harbin Institute of Technology, China), Zoe L. Jiang (Harbin Institute of Technology, China; Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, China), Jingjing Fan (University of Hong Kong, Hong Kong), Manho Au (The Hong Kong Polytechnic University, Hong Kong), Siuming Yiu (University of Hong Kong, Hong Kong)

Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit

Tianyou Tang (University of Chinese Academy of Sciences, China; State Key Laboratory of Cryptology, China), Shuqin Fan (State Key Laboratory of Cryptology, China)

Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection

Guoan Liu (Information Engineering University, China), Jian Lin (Information Engineering University, China), Weiyu Dong (Information Engineering University, China), Jiaan Liu (North China University of Science and Technology, China), Tieming Liu (Information Engineering University, China)

Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases

Xiaowei Zhang (Swinburne University of Technology, Australia), Shigang Liu (Swinburne University of Technology, Australia; CSIRO's Data61, Australia), Jun Zhang (Swinburne University of Technology, Australia), Yang Xiang (Swinburne University of Technology, Australia)