posted by organizer: dcsec_uni_hannover || 7118 views || tracked by 6 users: [display]

WAHC 2017 : 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography

FacebookTwitterLinkedInGoogle

Link: https://www.dcsec.uni-hannover.de/wahc17
 
When Apr 7, 2017 - Apr 7, 2017
Where Sliema, Malta
Submission Deadline Nov 30, 2016
Notification Due Feb 15, 2017
Final Version Due Mar 1, 2017
Categories    computer science   cryptography   encryption   cloud computing
 

Call For Papers

Associated with Financial Cryptography & Data Security 2017

* SCOPE *

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

* TOPICS * (include but not limited to)

Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Hybrid (partly encrypted) applications
Hardware implementations of encrypted computing
Implementation of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Practical aspects of functional encryption
Privacy-preserving set operations
Secure information sharing
Circuit transformation of algorithms
Obfuscation techniques
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics

* AUDIENCE *

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

* DEADLINES *

Submission Deadline: EXTENDED Dec. 31, 2016
Acceptance Notice: Feb. 15, 2017
Camera Ready Due: Mar. 1, 2017
Workshop: Apr. 7, 2017

* SUBMISSIONS *

Accepted submissions will be published in a Springer LNCS volume (as part of the main FC '17 proceedings or typically collected in a subsidiary workshop volume). Papers are limited to 12-16 pages including references and appendices. We also encourage authors to submit Demos which are limited to 6-8 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server https://easychair.org/conferences/?conf=wahc17

* INVITED TALKS *

"Microsoft's Homomorphic SEAL Library": Kim Laine, Microsoft Research Redmond, USA
"The PALISADE Project": Yuriy Polyakov, New Jersey Institute of Technology, USA

* ORGANIZING COMMITTEE *

Michael Brenner, Leibniz Universität Hannover, Germany
Kurt Rohloff, New Jersey Institute of Technology, USA

* PROGRAM COMMITTEE * (tentative)

Dan Bogdanov, Cybernetica, Estonia
Zvika Brakerski, Weizmann Institute, Israel
David Cash, Rutgers, USA
Hao Chen, Microsoft Research, USA
Rosario Gennaro, CUNY, USA
Seung Geol Choi, US Naval Academy, USA
David Cousins, BBN, USA
Marten van Dijk, UConn, USA
Dario Fiore, IMDEA, Spain
Sergey Gorbunov, MIT, USA
Debayan Gupta, MIT, USA
Vlad Kolesnikov, Bell Labs, USA
Kim Laine, Microsoft Research, USA
Tencrède Lepoint, SRI International, USA
Pascal Paillier, CryptoExperts, France
Benny Pinkas, Bar-Ilan University, Israel
Erkay Savas, Sabancı University, Turkey
Berk Sunar, WPI, USA
Mehdi Tibouchi, NTT, Japan
Fre Vercauteren, KU Leuven, Belgium
Adrian Waller, Thales, UK

Related Resources

TACC 2022   The 2nd Tunisian-Algerian Joint Conference on Applied Computing
ACM-Ei/Scopus-ITNLP 2022   2022 2nd International Conference on Information Technology and Natural Language Processing (ITNLP 2022) -EI Compendex
EDSIGCON 2022   Information Systems & Computing Education (EDSIG CON) and Information Systems Applied Research (CONISAR)
EI-CFAIS 2022   2022 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2022)
CSIA 2022   13th International Conference on Communications Security & Information Assurance
JEDT 2022   International Journal of Electronic Design and Test
CFMAI 2022   2022 4th International Conference on Frontiers of Mathematics and Artificial Intelligence (CFMAI 2022)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
IOP, EI, Scopus-PRECE 2022   2022 International Conference on Power, Renewable Energy and Control Engineering (PRECE 2022)-EI Compendex
CIKM 2022   Call for Applied Research Papers (CIKM 2022)