WAHC 2014 – 2nd Workshop on Encrypted Computing & Applied Homomorphic Cryptography

Associated with Financial Cryptography & Data Security

Proceedings: Springer LNCS Volume 8438
ISBN 978-3-662-44774-1

Keynote: Zvika Brakerski, Computer Science Department, Stanford University 

Homomorphic Cryptography is one of the hottest topics in mathematics and computer science since Gentry presented the first construction of a fully homomorphic encryption scheme in 2009. Recently, a number of extensions to the original approach, as well as new paradigms have been proposed, creating a diverse basis for further theoretical research. On the other hand, we need research on practical applications of homomorphic encryption which is still less advanced. The cloud hype and different recent disclosures clearly show that there is a strong demand for secure delegation of computation. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced. 

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions. 

Topics include (but are not limited to) 

Implementation issues of homomorphic encryption schemes 
Practical performance evaluations of homomorphic encryption schemes 
Software architectures for encrypted applications 
Platform and system integration for encrypted applications 
Algorithmic primitives for encrypted applications 
Encrypted search schemes 
Encrypted e-payment solutions 
Encrypted financial transactions 
Encrypted applications in bio-informatics 
Hybrid (partly encrypted) applications 

Intended audience 

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption. 
Tentative Schedule 

Submission deadline: 15. Jan. 2014 
Workshop: 7. Mar. 2014 


All accepted papers will be published in an LNCS volume (as part of the main FC ’14 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit anonymous versions of their papers for initial review via the submission server. Referees will do their best to avoid identification of authors of anonymous papers during the review process. 

Organizing Committee

Michael Brenner, Leibniz Universität Hannover
Matthew Smith, Leibniz Universität Hannover

Program Committee 

Jose Maria Alcaraz Calero, University of the West of Scotland, UK 
Dario Fiore, Max Planck Institute for Software Systems, Germany 
Seny Kamara, Microsoft Research, USA 
Vladimir Kolesnikov, Bell Labs, USA 
David Naccache, Ecole Normale Superieure, Paris, France 
Maire O’Neill, Queen’s University Belfast, UK 
Elizabeth O’Sullivan, Queen’s University Belfast, UK 
Pascal Paillier, CryptoExperts, France 
Henning Perl, Universitaet Hannover, Germany 
Kurt Rohloff, BBN Technologies, USA 
Christoph Sorge, Universitaet Paderborn, Germany 
Osman Ugus, AuthentiDate International AG, Germany 
Yevgeniy Vahlis, AT&T Labs, USA 
Marten van Dijk, University of Connecticut, USA 
Fre Vercauteren, Katholieke Universiteit Leuven, Belgium 
Adrian Waller, Thales, UK 
Xun Yi, Victoria University, Melbourne, Australia