| |||||||||||||||
WAHC 2023 : 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography | |||||||||||||||
Link: https://homomorphicencryption.org/workshops-wahc23/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Associated with the ACM CCS 2023 conference
November 26, 2023 Copenhagen Denmark Submission Deadline: 7th July Acceptance Notification: 25th August Camera-Ready Version: 8th September Workshop: 26th November Proceedings on ACM DL For the latest edition of WAHC in 2023, we especially invite papers that are related to computing hardware for FHE. For example, we would encourage papers that focus on, for example, hardware acceleration of FHE, tuning of FHE schemes for specific hardware environments, software engineering to accommodate hardware easily. We of course also welcome any and all papers relevant to applications of FHE and FHE topics in general. REGISTRATION Registration is through CCS. SCOPE AND TOPICS Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced. The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions. AUDIENCE Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption. AGENDA Keynote Speaker: Prof. Ingrid Verbauwhede from KU Leuven – COSIC LIST OF TOPICS Software architectures for encrypted applications Platform and system integration for encrypted applications Algorithmic primitives for encrypted applications Hybrid (partly encrypted) applications Hardware implementations of encrypted computing Implementation of homomorphic encryption schemes and multiparty computation Practical performance evaluations of encrypted computing Practical aspects of functional encryption Privacy-preserving set operations Secure information sharing Circuit transformation of algorithms Obfuscation techniques Encrypted search schemes Encrypted e-payment solutions Encrypted financial transactions Encrypted applications in bio-informatics Encrypted computing for social good SUBMISSION Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN. A paper submitted to WAHC must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), including references and appendices. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. We also encourage authors to submit Demos which are limited to 6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server https://easychair.org/conferences/?conf=wahc23. Please note – submitters should ignore the message on https://github.com/acmccs/format that the template is obsolete, and that this *is* the template to be used for WAHC ORGANIZING COMMITTEE Michael Brenner, Leibniz Universität Hannover, Germany Anamaria Costache, NTNU: Norwegian University of Science and Technology, Norway Kurt Rohloff, NJIT and Duality Technologies, USA CONTACT / QUESTIONS? contact@HomomorphicEncryption.org PROGRAM COMMITTEE Ahmad Al Badawi, USA, Duality Technologies Andreea Beatrice Alexandru, USA, Duality Technologies Carsten Baum, DK, Aarhus University Mădălina Bolboceanu, RO, Bitdefender Charlotte Bonte, FR, Zama Joppe Bos, BE, NXP Semiconductors Katharina Boudgoust, DK, Aarhus University Michael Brenner, DE, Leibniz Universität Hannover Sergiu Carpov, CH, Inpher Yilei Chen, CN, Tsinghua University Jung Hee Cheon, KR, Seoul National University Seung Geol Choi, US, US Naval Academy Anamaria Costache, NO, Norwegian University of Science and Technology Benjamin Curtis, FR, Zama Miran Kim, KR, Hanyang University Kim Laine, USA, Microsoft Jean-Baptiste Orfila, FR, Zama Jeongeun Park, BE, KU Leuven Rachel Player, UK, Royal Holloway, University of London Martin Rehberg, DE, DB Systel GmbH Kurt Rohloff, USA, Duality Technologies Miruna Roşca, RO, Bitdefender Erkay Savaş, TR, Sabanci University Tjerand Silde, NO, Norwegian University of Science and Technology Eduardo Soria-Vazquez, AE, Cryptography Research Centre, Techonology Innovation Institute Frederik Vercauteren, BE, K.U. Leuven – ESAT/ COSIC Srinivas Vivek, IN, International Institute of Information Technology, Bangalore |
|