posted by user: dcsec_uni_hannover || 2322 views || tracked by 8 users: [display]

WAHC'14 2014 : 2nd Workshop on Applied Homomorphic Cryptography and Encrypted Computing

FacebookTwitterLinkedInGoogle

Link: https://www.dcsec.uni-hannover.de/wahc14.html
 
When Mar 7, 2014 - Mar 7, 2014
Where Barbados
Submission Deadline Jan 15, 2014
Notification Due Jan 31, 2014
Final Version Due Feb 15, 2014
Categories    computer science   cryptography
 

Call For Papers

Keynote: Zvika Brakerski, Computer Science Department, Stanford University

Homomorphic Cryptography is one of the hottest topics in mathematics and computer science since Gentry presented the first construction of a fully homomorphic encryption scheme in 2009. Recently, a number of extensions to the original approach, as well as new paradigms have been proposed, creating a diverse basis for further theoretical research. On the other hand, we need research on practical applications of homomorphic encryption which is still less advanced. The cloud hype and different recent disclosures clearly show that there is a strong demand for secure delegation of computation. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

Topics include (but are not limited to)

Implementation issues of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics
Hybrid (partly encrypted) applications

Intended audience

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.
Tentative Schedule

Submission deadline: 15. Jan. 2014
Workshop: 7. Mar. 2014

Submission

All accepted papers will be published in an LNCS volume (as part of the main FC '14 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit anonymous versions of their papers for initial review via the submission server. Referees will do their best to avoid identification of authors of anonymous papers during the review process.

Program Committee

Jose Maria Alcaraz Calero, University of the West of Scotland, UK
Dario Fiore, Max Planck Institute for Software Systems, Germany
Seny Kamara, Microsoft Research, USA
Vladimir Kolesnikov, Bell Labs, USA
David Naccache, Ecole Normale Superieure, Paris, France
Maire O'Neill, Queen's University Belfast, UK
Elizabeth O'Sullivan, Queen's University Belfast, UK
Pascal Paillier, CryptoExperts, France
Henning Perl, Universitaet Hannover, Germany
Kurt Rohloff, BBN Technologies, USA
Christoph Sorge, Universitaet Paderborn, Germany
Osman Ugus, AuthentiDate International AG, Germany
Yevgeniy Vahlis, AT&T Labs, USA
Marten van Dijk, University of Connecticut, USA
Fre Vercauteren, Katholieke Universiteit Leuven, Belgium
Adrian Waller, Thales, UK
Xun Yi, Victoria University, Melbourne, Australia

Related Resources

WAHC 2017   5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
TheWebConf 2018   World Wide Web (The Web Conference - WWW2018)
IEEE EuroSP 2018   3rd IEEE European Symposium on Security and Privacy
ACML 2017   The 9th Asian Conference on Machine Learning
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
ICCBDC - ACM 2017   International Conference on Cloud and Big Data Computing (ICCBDC 2017)--Ei Compendex and Scopus
SECRYPT 2017   14th International Conference on Security and Cryptography
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security