Many thanks to our authors and participants for another successful and enjoyable WAHC!
Associated with the ACM CCS 2024 conference
October 14, 2024
Salt Lake City, UT, USA
The workshop is co-located with the 7th HomomorphicEncryption.org Standards Meeting will be on Oct. 13th. Register here for the standards meeting. Registration closes on Oct. 1st!
Submission Deadline: 12th JulySubmission Deadline: 23:59 26th July AoEAcceptance Notification: 29th AugustCamera-Ready Version: 5th September (hard deadline)
Workshop: October 14, 2024
Proceedings on ACM DL
For the latest edition of WAHC in 2024, we especially invite papers that are related to compilers applications for FHE. For example, we would encourage papers that focus on, for example, compiler design for FHE, real-world applications enabled by compilers, tuning of FHE schemes for compilers, software engineering to accommodate FHE compilers. We of course also welcome any and all papers relevant to applications of FHE and FHE topics in general.
REGISTRATION
Registration is through CCS.
SCOPE AND TOPICS
Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.
The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.
AUDIENCE
Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.
AGENDA
9:00 – 9:15 Chairs’ welcome
9:15 – 9:40 Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE
9:40 – 10:05 Faster Homomorphic Evaluation of Arbitrary Bivariate Integer Functions via Homomorphic Linear Transformation (Slides)
10:05 – 10:30 Training Encrypted Neural Networks on Encrypted Data with Fully Homomorphic Encryption (Slides)
10:30 – 11:00 Coffee Break
11:00-12:00 Keynote: Anwar Hithnawi: Democratizing Privacy-Preserving Computation (Slides)
12:00 – 13:30 Lunch
13:30 – 13:55 HEBridge: Connecting Arithmetic and Logic Operations in FV-style HE Schemes (Slides)
14:00 – 14:25 Oraqle: A Depth-Aware Secure Computation Compiler (Slides)
14:30 – 14:55 On the Synthesis of High-performance Homomorphic Boolean Circuits (Slides)
15:00 – 15:30 Coffee Break
15:30-15:55 vFHE: Verifiable Fully Homomorphic Encryption (Slides)
16:00-16:25 Security and Performance-Aware Cloud Computing with Homomorphic Encryption and Trusted Execution Environment (Slides)
16:30-16:45 Tutorial: HEIR: A Unified Compiler for Fully Homomorphic Encryption (Slides)
16:45-17:00 Tutorial: Automated Compilation of Vectorized Programs to Arithmetic FHE Schemes with HEIR
17:00-17:15 Tutorial: Compiling and Optimizing CGGI-Based FHE programs with HEIR
17:00 – 18:00 Community Discussion / Rump Session / Announcements
Accepted papers:
- Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE by Shintaro Narisada (KDDI Research, Inc.), Hiroki Okada (KDDI Research, Inc.), Kazuhide Fukushima (KDDI Research, Inc.) and Takashi Nishide (University of Tsukuba)
- Training Encrypted Neural Networks on Encrypted Data with Fully Homomorphic Encryption by Luca Colombo (Politecnico di Milano), Alessandro Falcetta (Politecnico di Milano), Manuel Roveri (Politecnico di Milano)
- On the Synthesis of High-performance Homomorphic Boolean Circuits Mingfei Yu (Integrated Systems Laboratory, EPFL), Sergiu Carpov (Arcium), Alessandro Tempia Calvino (Integrated Systems Laboratory, EPFL), Giovanni De Micheli (Integrated Systems Laboratory, EPFL)
- Faster Homomorphic Evaluation of Arbitrary Bivariate Integer Functions via Homomorphic Linear Transformation Akira Nakashima (NEC Corporation), Takuya Hayashi (NEC Corporation), Hikaru Tsuchida (Saitama Institute of Technology), Yukimasa Sugizaki (NEC Corporation), Kengo Mori (NEC Corporation), Takashi Nishide (University of Tsukuba)
- Security and Performance-Aware Cloud Computing with Homomorphic Encryption and Trusted Execution Environment Ryutaro Onishi (Waseda University), Takuya Suzuki (Waseda University), Shunta Sakai (Waseda University), Hayato Yamana (Waseda University)
- vFHE: Verifiable Fully Homomorphic Encryption Christian Knabenhans:EPFL), Alexander Viand (Intel Labs;Antonio Merino-Gallardo (ETH Zurich), Anwar Hithnawi (University of Toronto)
- HEBridge: Connecting Arithmetic and Logic Operations in FV-style HE Schemes Yancheng Zhang (University of Central Florida;Xun Chen (Samsung Research America), Qian Lou (University of Central Florida)
- Oraqle: A Depth-Aware Secure Computation Compiler Jelle Vos (Delft University of Technology), Mauro Conti (University of Padua,Delft University of Technology), Zekeriya Erkin (Delft University of Technology)
LIST OF TOPICS
- Software architectures for encrypted applications
- Platform and system integration for encrypted applications
- Algorithmic primitives for encrypted applications
- Hybrid (partly encrypted) applications
- Hardware implementations of encrypted computing
- Implementation of homomorphic encryption schemes and multiparty computation
- Practical performance evaluations of encrypted computing
- Practical aspects of functional encryption
- Privacy-preserving set operations
- Secure information sharing
- Circuit transformation of algorithms
- Obfuscation techniques
- Encrypted search schemes
- Encrypted e-payment solutions
- Encrypted financial transactions
- Encrypted applications in bio-informatics
- Encrypted computing for social good
SUBMISSION
Submissions may be made through EasyChair here:
https://easychair.org/conferences/?conf=wahc24
Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN.
A paper submitted to WAHC must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), including references and appendices. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. We also encourage authors to submit Demos which are limited to 6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server.
Please note – submitters should ignore the message on https://github.com/acmccs/format that the template is obsolete, and that this *is* the template to be used for WAHC
ORGANIZING COMMITTEE
Flavio Bergamaschi, Intel Labs, USA
Anamaria Costache, NTNU: Norwegian University of Science and Technology, Norway
Kurt Rohloff, NJIT and Duality Technologies, USA
CONTACT / QUESTIONS?
contact@HomomorphicEncryption.org
PROGRAM COMMITTEE
Fabian Boemer, US, Apple
Mădălina Bolboceanu, RO, Bitdefender
Joppe Bos, BE, NXP Semiconductors
Sergiu Carpov, CH, Arcium
Seung Geol Choi, US, US Naval Academy
Benjamin Curtis, FR, Zama
Nir Drucker, IL, IBM Research
Antonio Guimarães, ES, IMDEA Software Institute
Kamil Doruk Gür, US, University of Maryland, College Park
Patrick Hough, UK, Oxford University
Ilia Iliashenko, BE, CipherMode Labs
Miran Kim, KR, Hanyang University
Hilder Vitor Lima Pereira, BR, Universidade Estadual de Campinas
Pratyay Mukherjee, IN, Supra Research
Jean-Baptiste Orfila, FR, Zama
Jeongeun Park, NO, NTNU
Yuriy Polyakov, US, Duality Technologies
Miruna Roşca, US, Pi Squared Inc.
Frederik Vercauteren, BE, K.U. Leuven – ESAT/ COSIC
Alexander Viand, US, Intel Labs
Srinivas Vivek, IN, International Institute of Information Technology, Bangalore
Hayato Yamana, JP, Waseda University