WAHC 2015 – 3rd Workshop on Encrypted Computing & Applied Homomorphic Cryptography

Associated with Financial Crypto & Data Security 2015 

Proceedings: Springer LNCS Volume 8976
ISBN 978-3-662-48050-2

The cloud hype and recent disclosures show there is demand for secure and practical computing technologies. The workshop addresses the challenge to safely outsource data processing onto remote computing resources by protecting programs and data even during processing. This allows users to confidently outsource computation over confidential information independently from the trustworthiness or the security level of the remote delegate. The technologies and techniques discussed in this workshop are key to extend the range of applications that can be securely and practically outsourced. 

The goal of the workshop is to bring together researchers, practitioners, government and industry to present, discuss and share the latest progress in the field relevant to real­world problems with practial approaches and solutions. 

Topics include (but are not limited to) 

Implementation of homomorphic encryption schemes 
Practical performance evaluations of homomorphic encryption schemes 
Practical aspects of functional encryption 
Software architectures for encrypted applications 
Platform and system integration for encrypted applications 
Algorithmic primitives for encrypted applications 
Encrypted search schemes 
Encrypted e-payment solutions 
Encrypted financial transactions 
Encrypted applications in bio-informatics 
Hybrid (partly encrypted) applications 
Hardware implementations of encrypted computing 
Secure information sharing 

== Intended audience 

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption. 

== Schedule 

Submission deadline: Oct. 16, 2014 
Acceptance Notification: Nov. 16, 2014 
Camera Ready Due: Dec. 31, 2014 
Workshop: Jan. 30, 2015 

== Submission 

Accepted papers will be published in an LNCS volume (as part of the main FC ’15 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit anonymous versions of their papers for initial review via the submission server: 


Referees will do their best to avoid identification of authors of anonymous papers during the review process. 

== Registration 

Workshop participants register through the main conference site. 

== Organizing Commitee 

Michael Brenner, Leibniz Universität Hannover, Germany 
Kurt Rohloff, NJIT, USA 

== Program Committee 

Dan Bogdanov, Cybernetica, Estonia 
Kevin Butler, University of Florida, USA 
David Cousins, BBN, USA 
Dario Fiore, IMDEA Software Institute, Madrid, Spain 
Shai Halevi, IBM, USA 
Vladimir Kolesnikov, Bell Labs, USA 
Tancrède Lepoint, CryptoExperts, France 
David Naccache, Ecole Normale Superieure, Paris, France 
Michael Naehrig, Microsoft, USA 
Maire O’Neill, Queen’s University Belfast, UK 
Pascal Paillier, CryptoExperts, France 
Benny Pinkas, Bar Ilan University, Israel 
Christoph Sorge, Universitaet Saarland, Germany 
Osman Ugus, Exceet Secure Solutions, Germany 
Yevgeniy Vahlis, University of Toronto, Canada 
Marten van Dijk, University of Connecticut, USA 
Fre Vercauteren, Katholieke Universiteit Leuven, Belgium 
Adrian Waller, Thales, UK