posted by user: dcsec_uni_hannover || 2499 views || tracked by 3 users: [display]

WAHC 2023 : 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography

FacebookTwitterLinkedInGoogle

Link: https://homomorphicencryption.org/workshops-wahc23/
 
When Nov 26, 2023 - Nov 26, 2023
Where Copenhagen Denmark
Submission Deadline Jul 7, 2023
Notification Due Aug 25, 2023
Final Version Due Sep 8, 2023
Categories    security   cryptography   homomorphic   CCS
 

Call For Papers

Associated with the ACM CCS 2023 conference
November 26, 2023
Copenhagen Denmark

Submission Deadline: 7th July
Acceptance Notification: 25th August
Camera-Ready Version: 8th September
Workshop: 26th November

Proceedings on ACM DL

For the latest edition of WAHC in 2023, we especially invite papers that are related to computing hardware for FHE. For example, we would encourage papers that focus on, for example, hardware acceleration of FHE, tuning of FHE schemes for specific hardware environments, software engineering to accommodate hardware easily. We of course also welcome any and all papers relevant to applications of FHE and FHE topics in general.

REGISTRATION

Registration is through CCS.

SCOPE AND TOPICS

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

AUDIENCE

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

AGENDA

Keynote Speaker: Prof. Ingrid Verbauwhede from KU Leuven – COSIC

LIST OF TOPICS

Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Hybrid (partly encrypted) applications
Hardware implementations of encrypted computing
Implementation of homomorphic encryption schemes and multiparty computation
Practical performance evaluations of encrypted computing
Practical aspects of functional encryption
Privacy-preserving set operations
Secure information sharing
Circuit transformation of algorithms
Obfuscation techniques
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics
Encrypted computing for social good

SUBMISSION

Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN.

A paper submitted to WAHC must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), including references and appendices. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. We also encourage authors to submit Demos which are limited to 6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server https://easychair.org/conferences/?conf=wahc23.

Please note – submitters should ignore the message on https://github.com/acmccs/format that the template is obsolete, and that this *is* the template to be used for WAHC

ORGANIZING COMMITTEE

Michael Brenner, Leibniz Universität Hannover, Germany
Anamaria Costache, NTNU: Norwegian University of Science and Technology, Norway
Kurt Rohloff, NJIT and Duality Technologies, USA

CONTACT / QUESTIONS?

contact@HomomorphicEncryption.org

PROGRAM COMMITTEE

Ahmad Al Badawi, USA, Duality Technologies
Andreea Beatrice Alexandru, USA, Duality Technologies
Carsten Baum, DK, Aarhus University
Mădălina Bolboceanu, RO, Bitdefender
Charlotte Bonte, FR, Zama
Joppe Bos, BE, NXP Semiconductors
Katharina Boudgoust, DK, Aarhus University
Michael Brenner, DE, Leibniz Universität Hannover
Sergiu Carpov, CH, Inpher
Yilei Chen, CN, Tsinghua University
Jung Hee Cheon, KR, Seoul National University
Seung Geol Choi, US, US Naval Academy
Anamaria Costache, NO, Norwegian University of Science and Technology
Benjamin Curtis, FR, Zama
Miran Kim, KR, Hanyang University
Kim Laine, USA, Microsoft
Jean-Baptiste Orfila, FR, Zama
Jeongeun Park, BE, KU Leuven
Rachel Player, UK, Royal Holloway, University of London
Martin Rehberg, DE, DB Systel GmbH
Kurt Rohloff, USA, Duality Technologies
Miruna Roşca, RO, Bitdefender
Erkay Savaş, TR, Sabanci University
Tjerand Silde, NO, Norwegian University of Science and Technology
Eduardo Soria-Vazquez, AE, Cryptography Research Centre, Techonology Innovation Institute
Frederik Vercauteren, BE, K.U. Leuven – ESAT/ COSIC
Srinivas Vivek, IN, International Institute of Information Technology, Bangalore

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IJCSITY 2024   International Journal of Computational Science and Information Technology
CSITEC 2025   11th International Conference on Computer Science, Information Technology
SECRYPT 2025   22nd International Conference on Security and Cryptography
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
IJCIS 2024   International Journal on Cryptography and Information Security