WAHC 2023 – 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography

Note: We have extended the WAHC submission deadline to Monday July 24th.

Associated with the ACM CCS 2023 conference
November 26, 2023
Copenhagen Denmark

Submission Deadline: 24th July
Acceptance Notification: 4th September
Camera-Ready Version: 15th September
Workshop: 26th November

Proceedings on ACM DL

For the latest edition of WAHC in 2023, we especially invite papers that are related to computing hardware for FHE. For example, we would encourage papers that focus on, for example, hardware acceleration of FHE, tuning of FHE schemes for specific hardware environments, software engineering to accommodate hardware easily. We of course also welcome any and all papers relevant to applications of FHE and FHE topics in general.


Registration is through CCS.


Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against  sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.


Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.


Keynote Speaker: Prof. Ingrid Verbauwhede from KU Leuven – COSIC

Accepted papers:

  • Trivial Transciphering With Trivium and TFHE, Thibault Balenbois, Jean-Baptiste Orfila and Nigel Smart
  • GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation, Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto and Takashi Nishide
  • A Probabilistic Design for Practical Homomorphic Majority Voting with Intrinsic Differential Privacy, Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey and Cédric Gouy-Pailler
  • Noah’s Ark: Efficient Threshold-FHE Using Noise Flooding, Morten Dahl, Daniel Demmler, Sarah Elkazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragoş Rotaru, Nigel Smart, Samuel Tap and Michael Walter
  • A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE, Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga and Renaud Sirdey
  • Falkor: Federated Learning Secure Aggregation Powered by AESCTR GPU Implementation, Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev and Dmitry Mikushin
  • Fully Homomorphic Privacy-Preserving Naive Bayes Machine Learning and Classification, Boyoung Han, Yeonghyeon Kim, Jina Choi, Hojune Shin and Younho Lee
  • Optimizing HE operations via Level-aware Key-switching Framework, Intak Hwang, Jinyeong Seo and Yongsoo Song
  • High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application, Rashmi Agrawal, Jung Ho Ahn, Flavio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner and Wen Wang

List of Topics

  • Software architectures for encrypted applications
  • Platform and system integration for encrypted applications
  • Algorithmic primitives for encrypted applications
  • Hybrid (partly encrypted) applications
  • Hardware implementations of encrypted computing
  • Implementation of homomorphic encryption schemes and multiparty computation
  • Practical performance evaluations of encrypted computing
  • Practical aspects of functional encryption
  • Privacy-preserving set operations
  • Secure information sharing
  • Circuit transformation of algorithms
  • Obfuscation techniques
  • Encrypted search schemes
  • Encrypted e-payment solutions
  • Encrypted financial transactions
  • Encrypted applications in bio-informatics
  • Encrypted computing for social good


Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN.

A paper submitted to WAHC must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), including references and appendices. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. We also encourage authors to submit Demos which are limited to 6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server.

Please note – submitters should ignore the message on https://github.com/acmccs/format that the template is obsolete, and that this *is* the template to be used for WAHC


Michael Brenner, Leibniz Universität Hannover, Germany
Anamaria Costache, NTNU: Norwegian University of Science and Technology, Norway
Kurt Rohloff, NJIT and Duality Technologies, USA

Contact / Questions?



Ahmad Al Badawi, USA, Duality Technologies
Andreea Beatrice Alexandru, USA, Duality Technologies
Carsten Baum, DK,  Aarhus University
Mădălina Bolboceanu, RO, Bitdefender 
Charlotte Bonte, FR, Zama
Joppe Bos, BE, NXP Semiconductors
Katharina Boudgoust, DK,  Aarhus University
Michael Brenner, DE, Leibniz Universität Hannover
Sergiu Carpov, CH, Inpher
Yilei Chen, CN, Tsinghua University
Jung Hee Cheon, KR, Seoul National University
Seung Geol Choi, US, US Naval Academy
Anamaria Costache, NO, Norwegian University of Science and Technology
Benjamin Curtis, FR,  Zama
Miran Kim, KR, Hanyang University
Kim Laine, USA, Microsoft
Jean-Baptiste Orfila, FR, Zama
Jeongeun Park, BE, KU Leuven
Rachel Player, UK, Royal Holloway, University of London
Martin Rehberg, DE, DB Systel GmbH
Kurt Rohloff, USA, Duality Technologies
Miruna Roşca, RO, Bitdefender
Erkay Savaş, TR, Sabanci University
Tjerand Silde, NO, Norwegian University of Science and Technology
Eduardo Soria-Vazquez, AE, Cryptography Research Centre, Techonology Innovation Institute
Frederik Vercauteren, BE, K.U. Leuven – ESAT/ COSIC
Srinivas Vivek, IN, International Institute of Information Technology, Bangalore