posted by user: dcsec_uni_hannover || 5993 views || tracked by 10 users: [display]

WAHC 2013 : Workshop on Applied Homomorphic Cryptography

FacebookTwitterLinkedInGoogle

Link: http://www.dcsec.uni-hannover.de/4548.html
 
When Apr 1, 2013 - Apr 1, 2013
Where Okinawa, Japan
Submission Deadline Dec 31, 2012
Notification Due Feb 1, 2013
Final Version Due Feb 8, 2013
Categories    homomorphic cryptography   applied cryptography   computer science   cryptography
 

Call For Papers

Associated with Financial Crypto & Data Security 2013

Homomorphic Cryptography has become one of hottest topics in mathematics and computer science since Gentry presented the first fully homomorphic scheme in 2009. Several similar, as well as a number of limited schemes have been proposed, creating a diverse mathematical basis for further theoretical research. Research on practical applications of homomorphic encryption is still less advanced due to the poor performance resulting on the complexity assumptions made in current encryption schemes. Recent research results in the area show that homomorphic encryption can be used or embedded in applications of practical relevance.
The goal of the WAHC is to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption (but also secure function evaluation, private information retrieval or searchable encryption) to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography.

Topics include (but are not limited to)

- implementation issues of homomorphic encryption schemes
- practical performance evaluation of homomorphic encryption schemes
- software architectures for encrypted applications
- platforms and system integration for encrypted applications
- algorithmic primitives for encrypted applications
- encrypted search schemes
- encrypted applications in bio-informatics
- encrypted e-payment solutions
- encrypted financial transactions
- hybrid (partly encrypted) applications

All accepted papers will be published in an LNCS volume (as part of the main FC '13 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit anonymous versions of their papers for initial review via EasyChair. Referees will do their best to avoid identification of authors of anonymous papers during the review process.

Keynotes:

Vinod Vaikuntanathan, University of Toronto
Zvika Brakerski, Stanford University

Organising Committee:

Michael Brenner and Matthew Smith
Distributed Computing & Security Group Leibniz Universitaet Hannover, Germany

Program Committee:

Jose Maria Alcaraz Calero, HP Labs, UK
Lynn Batten, Deakin University, Australia
Zvika Brakerski, Stanford University, USA
Kristin Lauter, Microsoft, USA
Aggelos Kiayias, University of Connecticut, USA
Vladimir Kolesnikov, Bell Labs, USA
David Naccache, Ecole Normale Superieure, Paris, France
Maire O'Neill, Queen's University Belfast, UK
Elizabeth O'Sullivan, Queen's University Belfast, UK
Henning Perl, Universitaet Hannover, Germany
Benny Pinkas, Bar Ilan University, Israel
Kurt Rohloff, BBN Technologies, USA
Christoph Sorge, Universitaet Paderborn, Germany
Osman Ugus, Hochschule für Angewandte Wissenschaften (HAW) Hamburg, Germany
Yevgeniy Vahlis, AT&T Labs, USA
Vinod Vaikuntanathan, University of Toronto, Canada
Marten VanDijk, MIT CSAIL, USA
Fre Vercauteren, Katholieke Universiteit Leuven, Belgium
Adrian Waller, Thales, UK
Dirk Westhoff, Hochschule Furtwangen University, Germany
Xun Yi, Victoria University, Melbourne, Australia

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 1
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
SACI 2025   19th IEEE International Symposium on Applied Computational Intelligence and Informatics
SECRYPT 2025   22nd International Conference on Security and Cryptography