WAHC 2022 – 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography

Associated with the ACM CCS 2022 conference
November 7, 2022
Los Angles, CA, USA

Submission Deadline: Jul. 18, 2022
Acceptance Notice: Aug. 15, 2022
Camera Ready Due: Aug. 29, 2022

Workshop: Nov. 7, 2022

Proceedings on ACM DL

REGISTRATION

Registration is through CCS.

SCOPE AND TOPICS

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against  sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.

AUDIENCE

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

Agenda

Tentative Schedule (US Pacific Time)Paper / Session TitleAuthors / Presenters
9:00-9:10General WelcomeOrganizing committee
9:10-9:35Liberating TFHE: Programmable Bootstrapping with General Quotient PolynomialsMarc Joye and Michael Walter mp4 pdf (apologies for the bad A/V quality)
9:35-10:00Efficient Homomorphic Evaluation of Arbitrary Bivariate Integer FunctionsDaisuke Maeda, Koki Morimura and Takashi Nishide mp4 pdf
10:00-10:45Break
10:45-11:10PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree EvaluationSofiane Azogagh, Victor Delfour, Sebastien Gambs and Marc-Olivier Killijian mp4 pdf
11:10-11:35Efficient and Accurate homomorphic comparisonsOlive Chakraborty and Martin Zuber mp4 pdf
11:35-12:35KeynoteShruthi Gorantala mp4
12:35-13:35Lunch
13:35-13:50Acceleration of Homomorphic Unrolled Trace-Type Function using AVX512 instructionsKotaro Inoue, Takuya Suzuki and Hayato Yamana mp4 pdf
13:50-14:20OpenFHE: Open-Source Fully Homomorphic Encryption LibraryAhmad Al Badawi, Jack Bates, Flavio Bergamaschi, David Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan and Vincent Zucca mp4 pdf
14:20-15:20Working Session / Open Discussion / Rump SessionCommunity
15:20-15:30Closing RemarksOrganizing committee

List of Topics

  • Software architectures for encrypted applications
  • Platform and system integration for encrypted applications
  • Algorithmic primitives for encrypted applications
  • Hybrid (partly encrypted) applications
  • Hardware implementations of encrypted computing
  • Implementation of homomorphic encryption schemes and multiparty computation
  • Practical performance evaluations of encrypted computing
  • Practical aspects of functional encryption
  • Privacy-preserving set operations
  • Secure information sharing
  • Circuit transformation of algorithms
  • Obfuscation techniques
  • Encrypted search schemes
  • Encrypted e-payment solutions
  • Encrypted financial transactions
  • Encrypted applications in bio-informatics
  • Encrypted computing for social good

SUBMISSION

Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN.

A paper submitted to WAHC must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), including references and appendices. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. We also encourage authors to submit Demos which are limited to 6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server.

Please note – submitters should ignore the message on https://github.com/acmccs/format that the template is obsolete, and that this *is* the template to be used for WAHC

ORGANIZING COMMITTEE

Michael Brenner, Leibniz Universität Hannover, Germany
Anamaria Costache, NTNU: Norwegian University of Science and Technology, Norway
Kurt Rohloff, NJIT and Duality Technologies, USA

Contact / Questions?

contact@HomomorphicEncryption.org

PROGRAM COMMITTEE

Fabian Boemer, US, Intel
Joppe Bos, NL, NXP Semiconductors
Michael Brenner, DE, Leibniz Universität Hannover
Sergiu Carpov, CH, Inpher
Yilei Chen, CN, Tsinghua University
Seung Geol Choi, US, US Naval Academy
Anamaria Costache, NO, NTNU
Geoffroy Couteau, FR, CNRS
Benjamin Curtis, FR, Zama
Wei Dai, US, Microsoft Research
Hamish Hunt, US, Intel
Ilia Iliashenko, US, CipherMode Labs
Miran Kim, KR, Ulsan National Institute of Science and Technology
Kim Laine, US Microsoft Research
Martha Norberg Hovd, NO, University of Bergen
Chen Qian, NO, NTNU
Martin Rehberg, DE, Agentur für Innovation in der Cybersicherheit
Kurt Rohloff, US, Duality Technologies
Miruna Rosca, RO, Bitdefender
Peter Scholl, DK, Aarhus University
Tjerand Silde, NO, NTNU
Eduardo Soria-Vazquez, AE, Cryptography Research Centre, Techonology Innovation Institute
Frederik Vercauteren, BE, K.U.Leuven – ESAT/COSIC
Srinivas Vivek, IN, International Institute of Information Technology, Bangalore
Adrian Waller, UK, Thales Research
Hayato Yamana, JP, Waseda University