WAHC'15 - 3rd Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Associated with Financial Crypto & Data Security 2015
This is the webpage of a past workshop. Please visit WAHC'17.
The workshop proceedings have been published in Springer's Lecture Notes in Computer Science (LNCS Volume 8976).
Call for papers (PDF)
The cloud hype and recent disclosures show there is demand for secure and practical computing technologies. The workshop addresses the challenge to safely outsource data processing onto remote computing resources by protecting programs and data even during processing. This allows users to confidently outsource computation over confidential information independently from the trustworthiness or the security level of the remote delegate. The technologies and techniques discussed in this workshop are key to extend the range of applications that can be securely and practically outsourced.
The goal of the workshop is to bring together researchers, practitioners, government and industry to present, discuss and share the latest progress in the field relevant to realworld problems with practial approaches and solutions.
Topics include (but are not limited to)
- Implementation of homomorphic encryption schemes
- Practical performance evaluations of homomorphic encryption schemes
- Practical aspects of functional encryption
- Software architectures for encrypted applications
- Platform and system integration for encrypted applications
- Algorithmic primitives for encrypted applications
- Encrypted search schemes
- Encrypted e-payment solutions
- Encrypted financial transactions
- Encrypted applications in bio-informatics
- Hybrid (partly encrypted) applications
- Hardware implementations of encrypted computing
- Secure information sharing
Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.
Submission Deadline: Oct. 16, 2014 Acceptance Notice: Nov. 16, 2014 Camera Ready Due: Dec. 31, 2014 Workshop: Jan. 30, 2015
Accepted papers will be published in an LNCS volume (as part of the main FC '15 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit their papers via the submission server.
Download the IFCA copyright form.
Workshop participants register through the main conference site.
09:00 Session A
- Opening Remarks: Michael Brenner, Kurt Rohloff (Workshop Chairs)
- Invited lecture: Drew Dean (SRI)
- Jung Hee Cheon, Miran Kim and Myungsun Kim: Search-and-compute on Encrypted Data
10:30 Coffee break
11:00 Session B
- Wei Dai, Yarkin Doroz and Berk Sunar: Accelerating SWHE based PIRs using GPUs
- Pille Pullonen and Sander Siim: Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Break
13:15 Session C
- Invited lecture: Dov Gordon (ACS): Secure Computation in the RAM model
- Tancrède Lepoint and Mehdi Tibouchi: Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
14:30 Tea break
15:00 Session D
- Jung Hee Cheon, Miran Kim, Kristin Lauter: Homomorphic Computation of Edit Distance
- Mayank Varia, Sophia Yakoubov, Yang Yang: HEtest - A Homomorphic Encryption Testing Framework
- Dan Bogdanov, Cybernetica, Estonia
- Kevin Butler, University of Florida, USA
- David Cousins, BBN, USA
- Dario Fiore, IMDEA Software Institute, Madrid, Spain
- Shai Halevi, IBM, USA
- Vladimir Kolesnikov, Bell Labs, USA
- Tancrède Lepoint, CryptoExperts, France
- David Naccache, Ecole Normale Superieure, Paris, France
- Michael Naehrig, Microsoft, USA
- Maire O'Neill, Queen's University Belfast, UK
- Pascal Paillier, CryptoExperts, France
- Benny Pinkas, Bar Ilan University, Israel
- Christoph Sorge, Universität Saarland, Germany
- Osman Ugus, Exceet Secure Solutions, Germany
- Yevgeniy Vahlis, University of Toronto, Canada
- Marten van Dijk, University of Connecticut, USA
- Fre Vercauteren, Katholieke Universiteit Leuven, Belgium
- Adrian Waller, Thales, UK