| |||||||||||||||
WAHC 2016 : 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography | |||||||||||||||
Link: https://www.dcsec.uni-hannover.de/wahc16 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Associated with 2016 Financial Cryptography and Data Security
Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced. The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions. * Topics include (but are not limited to) * Software architectures for encrypted applications Platform and system integration for encrypted applications Algorithmic primitives for encrypted applications Hybrid (partly encrypted) applications Hardware implementations of encrypted computing Implementation of homomorphic encryption schemes Practical performance evaluations of homomorphic encryption schemes Practical aspects of functional encryption Privacy-preserving set operations Secure information sharing Circuit transformation of algorithms Obfuscation techniques Encrypted search schemes Encrypted e-payment solutions Encrypted financial transactions Encrypted applications in bio-informatics * Intended audience * Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption. * Schedule * Submission Deadline: Nov. 16, 2015 Acceptance Notice: Jan. 16, 2016 Camera Ready Due: Jan. 31, 2016 Workshop: Feb. 22, 2016 * Submission * Accepted submissions will be published in a Springer LNCS volume (as part of the main FC '16 proceedings or typically collected in a subsidiary workshop volume). Papers are limited to 12-16 pages including references and appendices. This year, we also encourage authors to submit Demos which are limited to 6-8 pages and feature a presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server https://easychair.org/conferences/?conf=wahc16 * Organizers * Michael Brenner Leibniz Universität Hannover, Germany WAHC Program Chair Kurt Rohloff New Jersey Institute of Technology, USA Co-Chair * Program Committee (tentative) * Dan Bogdanov, Cybernetica, Estonia Marten van Dijk, UConn, USA Joan Feigenbaum, Yale, USA Rosario Gennaro, CCNY, USA Sergey Gorbunov, MIT, USA Aggelos Kiayias, UConn, USA Vlad Kolesnikov, Bell Labs, USA Kim Lane, Microsoft, USA Tancrède Lepoint, CryptoExperts, France David Naccache, ENS, Paris, France Michael Naehrig, Microsoft, USA Pascal Paillier, CryptoExperts, France Benny Pinkas, Bar-Ilan University, Israel Yuriy Polyakov, NJIT, USA Berk Sunar, WPI, USA Mehdi Tibouchi, NTT, Japan Yevgeniy Vahlis, Amazon, USA Fre Vercauteren, KU Leuven, Belgium Adrian Waller, Thales, UK tba |
|