posted by organizer: dcsec_uni_hannover || 2705 views || tracked by 1 users: [display]

WAHC 2018 : 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography

FacebookTwitterLinkedInGoogle

Link: http://homomorphicencryption.org/wahc18
 
When Oct 19, 2018 - Oct 19, 2018
Where Toronto
Submission Deadline Jul 30, 2018
Notification Due Aug 13, 2018
Final Version Due Aug 19, 2018
Categories    cryptography   security   homomorphic   computer science
 

Call For Papers

WAHC'18 is associated with the 25th ACM Conference on Computer and Communications Security (CCS)


SCOPE

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against  sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

TOPICS (not strictly limited to)

Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Hybrid (partly encrypted) applications
Hardware implementations of encrypted computing
Implementation of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Practical aspects of functional encryption
Privacy-preserving set operations
Secure information sharing
Circuit transformation of algorithms
Obfuscation techniques
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics

AUDIENCE

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

DATES

Submission Deadline Jul. 30, 2018
Acceptance Notice: Aug. 13, 2018
Camera Ready Due: Aug. 19, 2018
Workshop: Oct. 19, 2018

SUBMISSION

Papers are limited to 8-12 pages including references and appendices. We also encourage authors to submit Demos which are limited to 4-6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server. Please format your papers according to the ACM template.

The workshop proceedings will be published as a part of the ACM CCS 2018 proceedings.

https://easychair.org/conferences/?conf=wahc18
https://www.sigsac.org/ccs/CCS2018/papers

REGISTRATION

tba

PROGRAM

tba

ORGANIZING COMMITTEE

Michael Brenner, U Hannover, Germany
Kurt Rohloff, NJIT, USA

PROGRAM COMMITTEE

Reza Azarderakhsh, FAU, USA
Zvika Brakerski, Weizmann Institute, Israel
Hao Chen, Microsoft Research, USA
Jung Hee Cheon, SNU, S Korea
Seung Geol Choi, US Naval Academy, USA
Dave Cousins, Raytheon, USA
Mamadou Diallo, SPAWAR, USA
Dario Fiore, IMDEA, Spain
Sergey Gorbunov, U Waterloo, Canada
Glenn Gulak, U Toronto, Canada
Debayan Gupta, MIT, USA
Delaram Kahrobaei, CUNY, USA
Kim Laine, Microsoft Research, USA
Peeter Laud, Cybernetica, Estonia
Tencrède Lepoint, SRI International, USA
Alex Malozemoff, Galois, USA
Benny Pinkas, Bar-Ilan University, Israel
Yuriy Polyakov, NJIT, USA
Renaud Sirdey, CEA, France
Mehdi Tibouchi, NTT, Japan
Vinod Vaikuntanathan, MIT, USA
Fré Vercauteren, KU Leuven, Belgium
Adrian Waller, Thales, UK
Shuang Wang, UCSD, USA
Lena Wiese, U Göttingen, Germany
Hayato Yamana, Waseda U, Japan

PREVIOUS WORKSHOPS

WAHC'17 https://www.chi.uni-hannover.de/wahc17
WAHC'16 https://www.chi.uni-hannover.de/wahc16
WAHC'15 https://www.chi.uni-hannover.de/wahc15
WAHC'14 https://www.chi.uni-hannover.de/wahc14
WAHC'13 https://www.chi.uni-hannover.de/wahc13

Related Resources

WAHC 2019   7th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
ISCAI 2020   2020 2nd International Symposium on Computing and Artificial Intelligence (ISCAI 2020)
ISBDAI 2020   【Ei Compendex Scopus】2018 International Symposium on Big Data and Artificial Intelligence
ACNS 2020   18th International Conference on Applied Cryptography and Network Security
CVPR 2020   Computer Vision and Pattern Recognition
FAIML 2020-Ei Compendex & Scopus 2020   2020 2nd International Conference on Frontiers of Artificial Intelligence and Machine Learning (FAIML 2020)
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ICCSP--Ei Compendex and Scopus 2020   2020 4th International Conference on Cryptography, Security and Privacy (ICCSP 2020)--Ei Compendex and Scopus
ACM-ACAI-Ei/Scopus 2019   2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence