posted by organizer: dcsec_uni_hannover || 4571 views || tracked by 5 users: [display]

WAHC 2016 : 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography

FacebookTwitterLinkedInGoogle

Link: https://www.dcsec.uni-hannover.de/wahc16
 
When Feb 22, 2016 - Feb 26, 2016
Where Rockley, Barbados
Submission Deadline Nov 30, 2015
Notification Due Jan 16, 2016
Final Version Due Jan 31, 2016
Categories    computer security   encrypted computing   homomorphic cryptography   cryptography
 

Call For Papers

Associated with 2016 Financial Cryptography and Data Security

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

* Topics include (but are not limited to) *

Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Hybrid (partly encrypted) applications
Hardware implementations of encrypted computing
Implementation of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Practical aspects of functional encryption
Privacy-preserving set operations
Secure information sharing
Circuit transformation of algorithms
Obfuscation techniques
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics

* Intended audience *

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

* Schedule *

Submission Deadline: Nov. 16, 2015
Acceptance Notice: Jan. 16, 2016
Camera Ready Due: Jan. 31, 2016
Workshop: Feb. 22, 2016

* Submission *

Accepted submissions will be published in a Springer LNCS volume (as part of the main FC '16 proceedings or typically collected in a subsidiary workshop volume). Papers are limited to 12-16 pages including references and appendices. This year, we also encourage authors to submit Demos which are limited to 6-8 pages and feature a presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server https://easychair.org/conferences/?conf=wahc16

* Organizers *

Michael Brenner
Leibniz Universität Hannover, Germany
WAHC Program Chair

Kurt Rohloff
New Jersey Institute of Technology, USA
Co-Chair

* Program Committee (tentative) *

Dan Bogdanov, Cybernetica, Estonia
Marten van Dijk, UConn, USA
Joan Feigenbaum, Yale, USA
Rosario Gennaro, CCNY, USA
Sergey Gorbunov, MIT, USA
Aggelos Kiayias, UConn, USA
Vlad Kolesnikov, Bell Labs, USA
Kim Lane, Microsoft, USA
Tancrède Lepoint, CryptoExperts, France
David Naccache, ENS, Paris, France
Michael Naehrig, Microsoft, USA
Pascal Paillier, CryptoExperts, France
Benny Pinkas, Bar-Ilan University, Israel
Yuriy Polyakov, NJIT, USA
Berk Sunar, WPI, USA
Mehdi Tibouchi, NTT, Japan
Yevgeniy Vahlis, Amazon, USA
Fre Vercauteren, KU Leuven, Belgium
Adrian Waller, Thales, UK
tba

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IJCIS 2024   International Journal on Cryptography and Information Security
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 1
IJCSITY 2024   International Journal of Computational Science and Information Technology
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)