Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
  • Zielgruppen
  • Suche

WAHC'14 - 2nd Workshop on Applied Homomorphic Cryptography and Encrypted Computing

Associated with Financial Crypto & Data Security 2014

This is the webpage of a past workshop. Please visit WAHC'17.


The workshop proceedings have been published in Springer's Lecture Notes in Computer Science (LNCS Volume 8438).

Call for papers (PDF)


Homomorphic Cryptography is one of the hottest topics in mathematics and computer science since Gentry presented the first construction of a fully homomorphic encryption scheme in 2009. Recently, a number of extensions to the original approach, as well as new paradigms have been proposed, creating a diverse basis for further theoretical research. On the other hand, we need research on practical applications of homomorphic encryption which is still less advanced. The cloud hype and different recent disclosures clearly show that there is a strong demand for secure delegation of computation. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.


Topics include (but are not limited to)

  • Implementation issues of homomorphic encryption schemes
  • Practical performance evaluations of homomorphic encryption schemes
  • Software architectures for encrypted applications
  • Platform and system integration for encrypted applications
  • Algorithmic primitives for encrypted applications
  • Encrypted search schemes
  • Encrypted e-payment solutions
  • Encrypted financial transactions
  • Encrypted applications in bio-informatics
  • Hybrid (partly encrypted) applications

Intended audience

 Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.


  • Submission deadline: 15. Jan. 2014
  • Acceptance Notification: 31. Jan. 2014
  • Camera Ready Due: 15. Feb. 2014
  • Workshop: 7. Mar. 2014


All accepted papers will be published in an LNCS volume (as part of the main FC '14 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit anonymous versions of their papers for initial review via the submission server. Referees will do their best to avoid identification of authors of anonymous papers during the review process.


Workshop participants register through the main conference site.


Seny Kamara
Microsoft Research                                 

Keynote Speaker


Openning remarks


Seny Kamara: Keynote Speech


Coffe Break


Xiaolin Cao, Ciara Moore, Máire O'Neill, Neil Hanley and Elizabeth O'Sullivan: High-Speed Fully Homomorphic Encryption over the Integers


Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth and Berk Sunar: Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince


Berk Sunar, Yarkin Doröz and Ghaith Hammouri: Bandwidth Efficient PIR from NTRU

12:15 - 13:45



Kurt Rohloff and David Bruce Cousins: A Scalable Implementation of Somewhat Homomorphic Encryption Built on NTRU


Giovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta, Thimios Panagos, Jason Perry and Rebecca Wright: Practical and Privacy-Preserving Policy Compliance on Outsourced Data


Demos, Discussion

Organising Committee

Michael Brenner
Distributed Computing & Security Group
Leibniz Universitaet Hannover, Germany

WAHC Program Chair

Matthew Smith
Rheinische Friedrich-Wilhelms-Universität
Bonn, Germany


Program Committee

  • Jose Maria Alcaraz Calero, University of the West of Scotland, UK
  • Dario Fiore, Max Planck Institute for Software Systems, Germany
  • Seny Kamara, Microsoft Research, USA
  • Vladimir Kolesnikov, Bell Labs, USA
  • David Naccache, Ecole Normale Superieure, Paris, France
  • Maire O'Neill, Queen's University Belfast, UK
  • Elizabeth O'Sullivan, Queen's University Belfast, UK
  • Pascal Paillier, CryptoExperts, France
  • Henning Perl, Universitaet Hannover, Germany
  • Kurt Rohloff, BBN Technologies, USA
  • Christoph Sorge, Universitaet Paderborn, Germany
  • Osman Ugus, AuthentiDate International AG, Germany
  • Yevgeniy Vahlis, AT&T Labs, USA
  • Marten van Dijk, University of Connecticut, USA
  • Fre Vercauteren, Katholieke Universiteit Leuven, Belgium
  • Adrian Waller, Thales, UK
  • Xun Yi, Victoria University, Melbourne, Australia