• Zielgruppen
  • Suche

WAHC'16 - 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography

Associated with Financial Cryptography & Data Security 2016

This is the webpage of a past workshop. Please visit WAHC'17.


The workshop proceedings have been published in Springer's Lecture Notes in Computer Science (LNCS Volume 9604).

Pre-Proceedings (zipped PDF, 4.2M)


Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against  sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

Topics include (but are not limited to)

  • Software architectures for encrypted applications
  • Platform and system integration for encrypted applications
  • Algorithmic primitives for encrypted applications
  • Hybrid (partly encrypted) applications
  • Hardware implementations of encrypted computing
  • Implementation of homomorphic encryption schemes
  • Practical performance evaluations of homomorphic encryption schemes
  • Practical aspects of functional encryption
  • Privacy-preserving set operations
  • Secure information sharing
  • Circuit transformation of algorithms
  • Obfuscation techniques
  • Encrypted search schemes
  • Encrypted e-payment solutions
  • Encrypted financial transactions
  • Encrypted applications in bio-informatics

Intended audience

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.


  • Submission Deadline EXTENDED: Nov. 30, 2015
  • Acceptance Notice: Jan. 16-17, 2016
  • Camera Ready Due: Feb. 15, 2016
  • Workshop: Feb. 26, 2016


Accepted submissions will be published in a Springer LNCS volume (as part of the main FC '16 proceedings or typically collected in a subsidiary workshop volume). Papers are limited to 12-16 pages including references and appendices. This year, we also encourage authors to submit Demos which are limited to 6-8 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server.


Workshop participants register through the main conference site.




Cryptographic Solutions for Genomic Privacy

Erman Ayday

      Department of Computer Science          
Bilkent University
Ankara, Turkey



09:00Opening remarks & Keynote
10:00Gamze Tillem, Ömer M. Candan, Erkay Savas and Kamer Kaya:
Hiding Access Patterns in Range Queries using Private Information Retrieval and ORAM
10:30 - 11:00Coffee break
11:00Liisi Kerik, Peeter Laud and Jaak Randmets:
Optimizing MPC for robust and scalable integer and floating-point arithmetic
11:30Yarkın Doröz, Gizem Cetin and Berk Sunar:
On-the-fly Homomorphic Batching/Unbatching
12:00Discussion: Challenges in Encrypted Computing
12:30 - 14:00Lunch break
14:00Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin Butler and Patrick Traynor:
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation
14:30Mamadou Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au and Vic Beach:
CallForFire: A Mission-Critical Cloud-based Application Built Using the Nomad Framework
15:30Discussion & Closing remarks



Organising Committee


Michael Brenner
Leibniz Universität Hannover, Germany 
WAHC Program Chair


Kurt Rohloff
New Jersey Institute of Technology, USA

WAHC Program Chair

Program Committee 

  • Dan Bogdanov, Cybernetica, Estonia
  • Marten van Dijk, UConn, USA
  • Joan Feigenbaum, Yale, USA
  • Rosario Gennaro, CCNY, USA
  • Sergey Gorbunov, MIT, USA
  • Aggelos Kiayias, UConn, USA
  • Vlad Kolesnikov, Bell Labs, USA
  • Kim Laine, Microsoft, USA
  • Tancrède Lepoint, CryptoExperts, France
  • David Naccache, ENS, Paris, France
  • Michael Naehrig, Microsoft, USA
  • Pascal Paillier, CryptoExperts, France
  • Benny Pinkas, Bar-Ilan University, Israel
  • Yuriy Polyakov, NJIT, USA
  • Berk Sunar, WPI, USA
  • Mehdi Tibouchi, NTT, Japan
  • Yevgeniy Vahlis, Amazon, USA
  • Fré Vercauteren, KU Leuven, Belgium
  • Adrian Waller, Thales, UK