posted by organizer: peeterlaud || 2262 views || tracked by 8 users: [display]

UaESMC 2014 : Workshop on Usable and Efficient Secure Multiparty Computation


When Sep 11, 2014 - Sep 11, 2014
Where Wroclaw, Poland
Submission Deadline Jul 14, 2014
Notification Due Aug 7, 2014
Final Version Due Aug 15, 2014
Categories    security   cryptography   privacy

Call For Papers

Secure Multiparty Computation (SMC) is a universally applicable privacy-enhancing technology, that can be used whenever untrusted platforms compute on sensitive data. These theoretical possibilities of SMC have been known for a long time, and the last 5-7 years have seen further impressive theoretical advances in this field. These have been accompanied with some practical applications, but these have been small in number and restricted to a couple of fields. With this workshop, we want to bring together researchers of SMC and builders of secure systems, to discuss the secure computation techniques necessary for practical applications. We are interested in practical experience of applying SMC (both positive and negative), privacy-preserving methods of solving particular problems, the integration of SMC with the rest of a secure system and any positive and negative interplay it may have with other functional and non-functional requirements, emerging problems in applications made possible by SMC, etc.

Topics of interest of this workshop include, but are not limited to:

Experience in applying SMC;
SMC and big data;
Design of privacy-preserving algorithms for various problems;
Integration of different privacy-preserving methods in applications;
Game-theoretic problems appearing in privacy-preserving applications.

The workshop solicits extended abstracts (up to three pages in the LNCS format, including the bibliography) of recent or ongoing work. There will be no formal proceedings, but the abstracts of accepted talks will be made available at the workshop. The presentation of recent work that has been published elsewhere is permitted. At least one author of each accepted abstract is required to register to the workshop and present the work.

The organizers of this workshop are planning an edited book on practical aspects of SMC. The authors of the submissions to the workshop may be solicited for chapters in this book.

Related Resources

SOUPS 2016   Symposium On Usable Privacy and Security
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
NSDI 2017   14th USENIX Symposium on Networked Systems Design and Implementation
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
DSN 2016   Annual IEEE/IFIP International Conference on Dependable Systems and Networks
ACISP 2017   Australasian Conference on Information Security and Privacy
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ACM CCS 2016   23rd ACM Conference on Computer and Communications Security
IJMSA 2016   International Journal of Modelling, Simulation and Applications
BuildSys 2016   3rd ACM International Conference on Systems for Energy-Efficient Built Environments