Associated with the ACM CCS 2021 conference
November 15, 2021
Seoul, South Korea
DATES
Submission Deadline: Jul. 9, 2021 (Extended 2 weeks from original deadline!)Acceptance Notice: Aug. 13, 2021Camera Ready Due: Sep. 20, 2021 (Extended 2 weeks from original deadline!)
Workshop: Nov. 15, 2021
REGISTRATION
Registration is through CCS.
SCOPE AND TOPICS
Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.
The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.
AUDIENCE
Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.
AGENDA
Session | US Pacific Time (Starting afternoon of Nov. 14th) | US Eastern Time (Starting evening of Nov. 14th) | UK Time (Starting late night of Nov. 14th) | Germany Time (Starting before midnight Nov. 14th/15th) | South Korea Time (Starting morning of Nov. 15th) | Paper Title |
Intro | 2:30pm | 5:30pm | 10:30pm | 11:30pm | 7:30am | |
Paper 1 | 2:40pm | 5:40pm | 10:40pm | 11:40pm | 7:40am | Integer Functions Suitable for Homomorphic Encryption over Finite Fields |
Paper 2 | 3:05pm | 6:05pm | 11:05pm | 0:05am | 8:05am | EVA Improved: Compiler and Extension Library for CKKS |
Brief Coffee Break | 3:30pm | 6:30pm | 11:30pm | 0:30am | 8:30am | |
Invited Talk | 3:40pm | 6:40pm | 11:40pm | 0:40am | 8:40am | FHE Ecosystem Evolution and Standardization: A Retrospection, A Look Ahead |
Paper 3 | 4:40pm | 7:40pm | 0:40am | 1:40am | 9:40am | Bootstrapping in FHEW-like Cryptosystems |
Paper 4 | 5:05pm | 8:05pm | 1:05am | 2:05am | 10:05am | Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors |
“Lunch” Break | 5:30pm | 8:30pm | 1:30am | 2:30am | 10:30am | |
Demo 1 | 6:30pm | 9:30pm | 2:30am | 3:30am | 11:30am | Pyfhel: PYthon For Homomorphic Encryption Libraries |
Demo 2 | 6:55pm | 9:55pm | 2:55am | 3:55am | 11:55am | Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52 |
Demo 3 | 7:20pm | 10:20pm | 3:20am | 4:20am | 12:20pm | Towards Better Standard Cell Library: Optimizing Compound Logic Gates for TFHE |
Closing Remarks | 7:45pm | 10:45pm | 3:45am | 4:45am | 12:45pm |
INVITED Talk
Rosario Cammarota
FHE Ecosystem Evolution and Standardization: A Retrospection, A Look Ahead
Standardization is an essential tool to enable innovations, interoperability and facilitate global trade and secure supply chains. Technologies enabling the implementation of cybersecurity mechanisms, such as cryptographic algorithms, must be globally interoperable across the industry, as should be the case for fully homomorphic encryption.
The cybersecurity sub-committee ISO/IEC JTC 1 SC 27 develops international standards to advance information security, cybersecurity and privacy protection for information and communication technology products and services. This year, 2021, the cybersecurity sub-committee approved to extend the cryptography standards series with a new standard dedicated to Fully Homomorphic Encryption.
The standard document will provide foundational definitions, data formats, cryptographic mechanisms, and security parameters, for specific cryptographic schemes that meet the maturity criteria for standardization at ISO/ IEC, namely, BGV, BFV, CKKS and CGGI. The standard is contributed by 26 countries, and its publication is expected in mid-2024.
Speaker bio: Ro is a Principal Engineer at Intel Labs. He leads privacy technologies research theory, application, and standardization, with a focus on privacy-enhancing cryptography. He is an Intel principal investigator for the DARPA DPRIVE program, the Intel Private AI Collaborative Academic Center, and the Intel Crypto Frontiers Academic Center. He leads standardization of FHE at ISO/IEC JTC1. Ro is a Senior Member of IEEE, and one of the recipients of the SRC Outstanding Industry Liaison Awards in 2017, 2018, and 2019. He obtained his Ph.D. degree in Computer Science from the University of California, Irvine, in 2013.
ACCEPTED PAPERS
- Integer Functions Suitable for Homomorphic Encryption over Finite Fields. Ilia Iliashenko (imec-COSIC, KU Leuven); Christophe Nègre (DALI, Université de Perpignan Via Domitia; LIRMM Univ Montpellier); Vincent Zucca (DALI, Université de Perpignan Via Domitia; LIRMM Univ Montpellier). Slides.
- Bootstrapping in FHEW-like Cryptosystems. Daniele Micciancio (Duality Technologies); Yuriy Polyakov (Duality Technologies). Slides.
- Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors. Leo de Castro (MIT); Chiraag Juvekar (Analog Devices); Vinod Vaikuntanathan (MIT).
- EVA Improved: Compiler and Extension Library for CKKS. Sangeeta Chowdhary (Rutgers University); Kim Laine (Microsoft Research); Olli Saarikivi (Microsoft Research); Wei Dai (Microsoft Research).
ACCEPTED DEMOS
- DEMO: Pyfhel: PYthon For Homomorphic Encryption Libraries Alberto Ibarrondo (IDEMIA & EURECOM); Alexander Viand (ETH Zurich). Slides.
- DEMO: Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52. Fabian Boemer (Intel Corporation); Sejun Kim (Intel Corporation); Gelila Seifu (Intel Corporation); Fillipe D.M. de Souza (Intel Corporation); Vinodh Gopal (Intel Corporation). Slides.
- DEMO: Towards Better Standard Cell Library: Optimizing Compound Logic Gates for TFHE. Kotaro Matsuoka (Kyoto University); Yusuke Hoshizuki (AXELL CORPORATION); Takashi Sato (Kyoto University); Song Bian (Kyoto University). Slides.
AGENDA
- Paper Session 1:
- Integer Functions Suitable for Homomorphic Encryption over Finite Fields. Ilia Iliashenko (imec-COSIC, KU Leuven); Christophe Nègre (DALI, Université de Perpignan Via Domitia; LIRMM Univ Montpellier); Vincent Zucca (DALI, Université de Perpignan Via Domitia; LIRMM Univ Montpellier).
- EVA Improved: Compiler and Extension Library for CKKS Sangeeta Chowdhary (Rutgers University); Kim Laine (Microsoft Research); Olli Saarikivi (Microsoft Research); Wei Dai (Microsoft Research).
- Invited Talk:
- FHE Ecosystem Evolution and Standardization: A Retrospection, A Look Ahead Rosario Cammarota (Intel Labs)
- Paper Session 2:
- Bootstrapping in FHEW-like Cryptosystems Daniele Micciancio (Duality Technologies); Yuriy Polyakov (Duality Technologies).
- Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors
Leo de Castro (MIT); Chiraag Juvekar (Analog Devices); Vinod Vaikuntanathan (MIT).
- Demo Session:
- DEMO: Pyfhel: PYthon For Homomorphic Encryption Libraries Alberto Ibarrondo (IDEMIA & EURECOM); Alexander Viand (ETH Zurich).
- DEMO: Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52 Fabian Boemer (Intel Corporation); Sejun Kim (Intel Corporation); Gelila Seifu (Intel Corporation); Fillipe D.M. de Souza (Intel Corporation); Vinodh Gopal (Intel Corporation).
- DEMO: Towards Better Standard Cell Library: Optimizing Compound Logic Gates for TFHE Kotaro Matsuoka (Kyoto University); Yusuke Hoshizuki (AXELL CORPORATION); Takashi Sato (Kyoto University); Song Bian (Kyoto University).
LIST OF TOPICS
- Software architectures for encrypted applications
- Platform and system integration for encrypted applications
- Algorithmic primitives for encrypted applications
- Hybrid (partly encrypted) applications
- Hardware implementations of encrypted computing
- Implementation of homomorphic encryption schemes and multiparty computation
- Practical performance evaluations of encrypted computing
- Practical aspects of functional encryption
- Privacy-preserving set operations
- Secure information sharing
- Circuit transformation of algorithms
- Obfuscation techniques
- Encrypted search schemes
- Encrypted e-payment solutions
- Encrypted financial transactions
- Encrypted applications in bio-informatics
- Encrypted computing for social good
SUBMISSION
Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN.
A paper submitted to WAHC must be written in English and be anonymous, with no author names, affiliations, acknowledgements, or any identifying citations. It should begin with a title and a short abstract. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), including references and appendices. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. We also encourage authors to submit Demos which are limited to 6 pages and feature an oral presentation with an extensive code review. Authors are invited to submit their work via the EasyChair submission server.
Please note – submitters should ignore the message on https://github.com/acmccs/format that the template is obsolete, and that this *is* the template to be used for WAHC
ORGANIZING COMMITTEE
Michael Brenner, Leibniz Universität Hannover, Germany
Rachel Player, Royal Holloway, University of London, UK
Kurt Rohloff, NJIT and Duality Technologies, USA
Contact / Questions?
contact@HomomorphicEncryption.org
PROGRAM COMMITTEE
Carsten Baum | Aarhus University | DK |
Fabian Boemer | Intel Corporation | US |
Joppe Bos | NXP Semiconductors | NL |
Michael Brenner | Leibniz Universität Hannover | DE |
Sergiu Carpov | Inpher | US |
Yilei Chen | Shanghai Jiao Tong University | JP |
Ilaria Chillotti | Zama | FR |
Seung Geol Choi | US Naval Academy | US |
Anamaria Costache | NTNU / RHUL | UK |
Geoffroy Couteau | CNRS | FR |
Benjamin Curtis | The Alan Turing Institute | UK |
Wei Dai | Microsoft | US |
Dario Fiore | IMDEA Software Institute | ES |
Adriá Gascon | The Alan Turing Institute / Warwick University | UK |
Kim Laine | Microsoft | US |
Emmanuela Orsini | Katholieke Universiteit Leuven | BE |
Rachel Player | Royal Holloway, University of London | UK |
Yuriy Polyakov | NJIT / Duality | US |
Peter Rindal | Visa Research | US |
Kurt Rohloff | NJIT / Duality | US |
Peter Scholl | Aarhus University | DK |
Frederik Vercauteren | K.U. Leuven – ESAT/COSIC | BE |
Srinivas Vivek | International Institute of Information Technology, Bangalore | IN |
Adrian Waller | Thales Research & Technology Ltd. | UK |
Hayato Yamana | Waseda University | JP |