Team > Michael Brenner > WAHC'13

WAHC'13 - Workshop on Applied Homomorphic Cryptography

Associated with Financial Crypto & Data Security 2013

This is the webpage of a past workshop. Please visit WAHC'14.

Proceedings

The workshop proceedings have been published in Springer's Lecture Notes in Computer Science (LNCS Volume 7862).

Call for papers (PDF)

Homomorphic Cryptography has become one of the hottest topics in mathematics and computer science since Gentry presented the first fully homomorphic scheme in 2009. This has also enhanced the interest in secret function evaluation, private information retrieval or searchable encryption in general. Many new cryptographic schemes have been proposed, creating a diverse mathematical basis for further theoretical research. Research on practical applications of homomorphic encryption, secret function evaluation, private information retrieval or searchable encryption is still less advanced due to the poor performance resulting on the complexity assumptions made in current encryption schemes.
The goal of the WAHC is to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography.

Topics include (but are not limited to)

  • implementation issues of homomorphic encryption schemes
  • practical performance evaluation of homomorphic encryption schemes
  • software architectures for encrypted applications
  • platforms and system integration for encrypted applications
  • algorithmic primitives for encrypted applications
  • encrypted search schemes
  • encrypted applications in bio-informatics
  • encrypted e-payment solutions
  • encrypted financial transactions
  • hybrid (partly encrypted) applications

Intended audience

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption,  but also secure function evaluation, private information retrieval or searchable encryption.

Schedule

  • submission deadline: (extended) 31.Dec. 2012
  • notification: 1. Feb. 2013
  • cr deadline: 12. Feb. 2013
  • workshop: 1. Apr. 2013

Submission

All accepted papers will be published in an LNCS volume (as part of the main FC '13 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit anonymous versions of their papers for initial review via the submission server. Referees will do their best to avoid identification of authors of anonymous papers during the review process.

Registration

Workshop participants register through the main conference site.

Program

 

Vinod Vaikuntanathan
University of Toronto, Canada

Keynote

 

 

 

Paper Presentations (download the papers from our hcrypt project website)

T Session

14:00 Julien Bringer, Herve Chabanne and Alain Patey: SHADE: Secure HAmming DistancE computation from oblivious transfer

14:30 Seny Kamara and Lei Wei: Garbled Circuits via Structured Encryption

15:00 Tancrède Lepoint and Pascal Paillier: On the Minimal Number of Bootstrappings in Homomorphic Circuits

P Session

16:00 Shigeo Tsujii, Hiroshi Doi, Ryo Fujita, Masahito Gotaishi, Yukiyasu Tsunoo and Takahiko Syouji: Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems

16:30 Seny Kamara and Mariana Raykova: Parallel Homomorphic Encryption

17:00 Ciara Moore, Neil Hanley, John McAllister, Máire O'Neill, Elizabeth O'Sullivan and Xiaolin Cao: Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE

Organising Committee

Michael Brenner
Distributed Computing & Security Group
Leibniz Universitaet Hannover, Germany

WAHC Program Chair

Matthew Smith
Distributed Computing & Security Group
Leibniz Universitaet Hannover, Germany

Co-Chair

Program Committee

  • Jose Maria Alcaraz Calero, HP Labs, UK
  • Lynn Batten, Deakin University, Australia
  • Zvika Brakerski, Stanford University, USA
  • Dario Fiore, Max Planck Institute for Software Systems, Germany
  • Kristin Lauter, Microsoft, USA
  • Aggelos Kiayias, University of Connecticut, USA
  • Vladimir Kolesnikov, Bell Labs, USA
  • David Naccache, Ecole Normale Superieure, Paris, France
  • Maire O'Neill, Queen's University Belfast, UK
  • Elizabeth O'Sullivan, Queen's University Belfast, UK
  • Henning Perl, Universitaet Hannover, Germany
  • Benny Pinkas, Bar Ilan University, Israel
  • Kurt Rohloff, BBN Technologies, USA
  • Christoph Sorge, Universitaet Paderborn, Germany
  • Osman Ugus, Hochschule HAW Hamburg, Germany
  • Yevgeniy Vahlis, AT&T Labs, USA
  • Vinod Vaikuntanathan, University of Toronto, Canada
  • Marten VanDijk, MIT CSAIL, USA
  • Fre Vercauteren, Katholieke Universiteit Leuven, Belgium
  • Adrian Waller, Thales, UK
  • Dirk Westhoff, Hochschule Furtwangen University, Germany
  • Xun Yi, Victoria University, Melbourne, Australia
Letzte Änderung: 25.08.2014
 
Verantwortlich Hinrich Tobaben