WAHC 2017 – 5th Workshop on Encrypted Computing & Applied Homomorphic Cryptography

Associated with Financial Cryptography & Data Security 2017 

Proceedings: Springer LNCS Volume 10323
ISBN 978-3-319-70277-3

* SCOPE * 

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced. 

The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions. 

* TOPICS * (include but not limited to) 

Software architectures for encrypted applications 
Platform and system integration for encrypted applications 
Algorithmic primitives for encrypted applications 
Hybrid (partly encrypted) applications 
Hardware implementations of encrypted computing 
Implementation of homomorphic encryption schemes 
Practical performance evaluations of homomorphic encryption schemes 
Practical aspects of functional encryption 
Privacy-preserving set operations 
Secure information sharing 
Circuit transformation of algorithms 
Obfuscation techniques 
Encrypted search schemes 
Encrypted e-payment solutions 
Encrypted financial transactions 
Encrypted applications in bio-informatics 


Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption. 


Submission Deadline: EXTENDED Dec. 31, 2016 
Acceptance Notice: Feb. 15, 2017 
Camera Ready Due: Mar. 1, 2017 
Workshop: Apr. 7, 2017 


Accepted submissions will be published in a Springer LNCS volume (as part of the main FC ’17 proceedings or typically collected in a subsidiary workshop volume). Papers are limited to 12-16 pages including references and appendices. We also encourage authors to submit Demos which are limited to 6-8 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server https://easychair.org/conferences/?conf=wahc17 


“Microsoft’s Homomorphic SEAL Library”: Kim Laine, Microsoft Research Redmond, USA 
“The PALISADE Project”: Yuriy Polyakov, New Jersey Institute of Technology, USA 


Michael Brenner, Leibniz Universität Hannover, Germany 
Kurt Rohloff, New Jersey Institute of Technology, USA 


Dan Bogdanov, Cybernetica, Estonia 
Zvika Brakerski, Weizmann Institute, Israel 
David Cash, Rutgers, USA 
Hao Chen, Microsoft Research, USA 
Rosario Gennaro, CUNY, USA 
Seung Geol Choi, US Naval Academy, USA 
David Cousins, BBN, USA 
Marten van Dijk, UConn, USA 
Dario Fiore, IMDEA, Spain 
Sergey Gorbunov, MIT, USA 
Debayan Gupta, MIT, USA 
Vlad Kolesnikov, Bell Labs, USA 
Kim Laine, Microsoft Research, USA 
Tencrède Lepoint, SRI International, USA 
Pascal Paillier, CryptoExperts, France 
Benny Pinkas, Bar-Ilan University, Israel 
Erkay Savas, Sabancı University, Turkey 
Berk Sunar, WPI, USA 
Mehdi Tibouchi, NTT, Japan 
Fre Vercauteren, KU Leuven, Belgium 
Adrian Waller, Thales, UK