LIST OF ACCEPTED PAPERS IS NOW AVAILABLE.
Aug 1, 2019, 23:59:59 PDT Aug 5, 2019, 23:59:59 PDT
Aug. 22, 2019 Aug. 24, 2019
Camera Ready Due:
Aug. 30, 2019
Workshop: Nov. 11, 2019
Registration is through CCS.
SCOPE AND TOPICS
Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.
The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.
Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.
07:30-09:00: Registration & Breakfast
Session 1: Standardization of Homomorphic Encryption
09:05-09:35: On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption
09:35-10:05: Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters
10:05-10:45: Coffee Break
10:45-11:45: Advanced Cryptography on the Way to Practice
11:45-12:00: Update on the Homomorphic Encryption Standardization effort
12:00-14:00: Lunch break
Session 2: Multiparty Computation
14:00-14:30: Linear-Regression on Packed Encrypted Data in the Two-Server Model
14:30-15:00: Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
15:00-15:45: Coffee Break
Session 3: Applications of Homomorphic Encryption
15:45-16:15: nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
16:15-16:45: RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
Session 4: Demo
16:45-17:15: SHEEP: a Homomorphic Encryption Evaluation Platform.
- On the feasibility and impact of standardising sparse-secret LWE parameter sets for homomorphic encryption.
Benjamin R. Curtis, Rachel Player.
- Linear-Regression on Packed Encrypted Data in the Two-Server Model.
Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini.
- Revisiting the Hybrid attack on sparse secret LWE and Application to HE parameters.
Yongha Son, Jung Hee Cheon.
- RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications.
David Archer, José Manuel Calderón Trilla, Jason Dagit, Alex Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan.
- nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data.
Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski.
- Zaphod: Efficiently Combing LSSS and Garbled Circuits in SCALE.
Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel Smart, Tim Wood.
- SHEEP: a Homomorphic Encryption Evaluation Platform.
Nick Barlow, Tomas Lazauskas, Oliver Strickson, Adria Gascon.
ADVANCED CRYPTOGRAPHY ON THE WAY TO PRACTICE
Abstract: This talk will overview recent developments in several areas of advanced cryptography such as secure multiparty computation, zero knowledge, differential privacy. We will focus on system implementations using these techniques and the efficiency they offer. We will try to give a perspective of how the practical efficiency of such tools has evolved over time and the major hurdles that are the focus of future work.
Bio: Mariana Raykova received her PhD from Columbia University. After her PhD, she spent a year as a postdoc at IBM Research Watson. She was a Research Scientist at SRI International from 2013 to 2015, and then Assistant Professor at Yale University between 2016 and 2018. Mariana joined Google as a Research Scientist in 2019. Her research includes work in the areas of secure computation, oblivious data structures, zero knowledge and verifiable computation, and obfuscation.
- Software architectures for encrypted applications
- Platform and system integration for encrypted applications
- Algorithmic primitives for encrypted applications
- Hybrid (partly encrypted) applications
- Hardware implementations of encrypted computing
- Implementation of homomorphic encryption schemes and multiparty computation
- Practical performance evaluations of encrypted computing
- Practical aspects of functional encryption
- Privacy-preserving set operations
- Secure information sharing
- Circuit transformation of algorithms
- Obfuscation techniques
- Encrypted search schemes
- Encrypted e-payment solutions
- Encrypted financial transactions
- Encrypted applications in bio-informatics
- Encrypted computing for social good
Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN.
A paper submitted to WAHC must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), including references and appendices. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. We also encourage authors to submit Demos which are limited to 6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the HotCRP submission server.
Michael Brenner, U Hannover, Germany
Tancrède Lepoint, Google, USA
Kurt Rohloff, NJIT and Duality Technologies, USA
Carsten Baum, Bar Ilan University, Israel
Fabrice Benhamouda, IBM Research, USA
Fabian Boemer, Intel, USA
Joppe W. Bos, NXP, Belgium
Sergiu Carpov, CEA, France
Yilei Chen, Visa Research, USA
Jung Hee Cheon, SNU, South Korea
Seung Geol Choi, US Naval Academy, USA
Geoffroy Couteau, KIT, Germany
Wei Dai, Microsoft Research, USA
Mamadou H. Diallo, US Navy, USA
Dario Fiore, IMDEA, Spain
Mariya Georgieva, EPFL and Inpher, Switzerland
Sergey Gorbunov, University of Waterloo, Canada
Debayan Gupta, MIT, USA
Kim Laine, Microsoft Research, USA
Peeter Laud, Cybernetica, Estonia
Changmin Lee, ENS Lyon, France
Emmanuela Orsini, KU Leuven, Belgium
Benny Pinkas, Bar Ilan University, Israel
Rachel Player, RHUL, UK
Yuriy Polyakov, NJIT, USA
Thomas Prest, PQShield Ltd., UK
Peter Rindal, Visa Research, USA
Peter Scholl, Aarhus, Denmark
Karn Seth, Google LLC, USA
Mehdi Tibouchi, NTT, Japan
Frederik Vercauteren, KU Leuven, Belgium
Srinivas Vivek, IIIT Bangalore, India
Adrian Waller, Thales, UK
Hayato Yamana, Waseda University, Japan