WAHC 2018 – 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography

Associated with the ACM CCS 2018 conference
October 19th, 2018
Toronto, Canada

SCOPE

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against  sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

TOPICS

  • Software architectures for encrypted applications
  • Platform and system integration for encrypted applications
  • Algorithmic primitives for encrypted applications
  • Hybrid (partly encrypted) applications
  • Hardware implementations of encrypted computing
  • Implementation of homomorphic encryption schemes
  • Practical performance evaluations of homomorphic encryption schemes
  • Practical aspects of functional encryption
  • Privacy-preserving set operations
  • Secure information sharing
  • Circuit transformation of algorithms
  • Obfuscation techniques
  • Encrypted search schemes
  • Encrypted e-payment solutions
  • Encrypted financial transactions
  • Encrypted applications in bio-informatics

AUDIENCE

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

DATES

Submission Deadline Jul. 30, 2018
Acceptance Notice: Aug. 13, 2018
Camera Ready Due: Aug. 19, 2018
Workshop: Oct. 19, 2018

SUBMISSION

Papers are limited to 8-12 pages including references and appendices. We also encourage authors to submit Demos which are limited to 4-6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server. Please format your papers as described here.

The workshop proceedings will be published as a part of the ACM CCS 2018 proceedings.

REGISTRATION

Registration is through CCS, and can be found here.

PROGRAM

0730 – 0900 Breakfast
0900 – 0905 Welcome & Opening Remarks
0905 – 0950 Keynote: Joshua Baron, DARPA/I2O Program Manager
0950 – 1015 Talk 1: Alexander Viand and Hossein Shafagh. Marble: Making Fully Homomorphic Encryption Accessible to All paper slides
1015 – 1045 Coffee
1045 – 1125 Talk 2: Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt and Victor Shoup. Doing Real Work with FHE: The Case of Logistic Regression paper slides
1125 – 1200 Talk 3: Peeter Laud and Alisa Pankova. Bit Decomposition Protocols in Secure Multiparty Computation paper slides
1200 – 1400 Lunch
1400 – 1430 Talk 4: Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi and Benny Pinkas. High-Throughput Secure AES Computation paper slides
1430 – 1500 Talk 5: Wen-Jie Lu and Sakuma Jun. More Practical Privacy-Preserving Machine Learning as A Service via Efficient Secure Matrix Multiplication paper slides
1500 – 1545 Coffee
1545 – 1615 Talk 6: Kamil Doruk Gur, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan and Erkay Savas. Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors paper slides
1615 – 1630 Short Break
1630 – 1730 Panel Discussion: Programming Circuits over Encrypted Data
1730 – 1740 Closing Remarks

ORGANIZING COMMITTEE

Michael Brenner, U Hannover, Germany
Kurt Rohloff, NJIT, USA

PROGRAM COMMITTEE

Reza Azarderakhsh, FAU, USA
Zvika Brakerski, Weizmann Institute, Israel
Hao Chen, Microsoft Research, USA
Jung Hee Cheon, SNU, S Korea
Seung Geol Choi, US Naval Academy, USA
Dave Cousins, Raytheon, USA
Mamadou Diallo, SPAWAR, USA
Dario Fiore, IMDEA, Spain
Sergey Gorbunov, U Waterloo, Canada
Glenn Gulak, U Toronto, Canada
Debayan Gupta, MIT, USA
Delaram Kahrobaei, CUNY, USA
Kim Laine, Microsoft Research, USA
Peeter Laud, Cybernetica, Estonia
Tencrède Lepoint, SRI International, USA
Alex Malozemoff, Galois, USA
Benny Pinkas, Bar-Ilan University, Israel
Yuriy Polyakov, NJIT, USA
Renaud Sirdey, CEA, France
Mehdi Tibouchi, NTT, Japan
Vinod Vaikuntanathan, MIT, USA
Fré Vercauteren, KU Leuven, Belgium
Adrian Waller, Thales, UK
Shuang Wang, UCSD, USA
Lena Wiese, U Göttingen, Germany
Hayato Yamana, Waseda U, Japan