[ietf-privacy] CFP: Workshop on Applied Encrypted Computing and Applied Homomorphic Cryptography
"Rohloff, Kurt" <rohloff@njit.edu> Wed, 28 December 2016 16:05 UTC
Return-Path: <rohloff@njit.edu>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8C46129612 for <ietf-privacy@ietfa.amsl.com>; Wed, 28 Dec 2016 08:05:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=njit-edu.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lOxiwyrfp8Uf for <ietf-privacy@ietfa.amsl.com>; Wed, 28 Dec 2016 08:05:12 -0800 (PST)
Received: from mail-io0-x22a.google.com (mail-io0-x22a.google.com [IPv6:2607:f8b0:4001:c06::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6B3612943C for <ietf-privacy@ietf.org>; Wed, 28 Dec 2016 08:05:12 -0800 (PST)
Received: by mail-io0-x22a.google.com with SMTP id p42so335816386ioo.1 for <ietf-privacy@ietf.org>; Wed, 28 Dec 2016 08:05:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=njit-edu.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to:cc; bh=c8QLjECSe06ZPA8noO7dC7kcLLc7sRKUnP2X0HKUTe4=; b=xQKgd/zrRSF3qYP/iPszHbHU5ZMWRhH3s1+D9qPqwC16jXN4UcW6D2VwbWEUTEJ15I 7+xAE7iDFrsIt3tpMvFRV5LpxGQSsvYzoGwM+V0hKZTXQhYzOMM7O0srKViD46hvsSY9 fq2FpxOaZwiW5XEqkAYgLjDcq2o4m7Z3OvLEXJYX50EpvaQBP1tVA2MXoyEK/7jYdQKB JO1op7i2oaCButxHf0mG5z8ZFV69915fkUe+BL4zIs18BxWRNX79zRfL7a97tgVeR8UW 30mD8c968wYFBmGMin8rRXizijhAUovEdi9TBmjpFEPaAofI/JXDr9m32/dul25WaRwE xUPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=c8QLjECSe06ZPA8noO7dC7kcLLc7sRKUnP2X0HKUTe4=; b=ibzQVqRiFS3z/AEPB0+8qZKkR+XDNlQxJq2U9UzGC1NsvHam1mKeP4LnU7iLhKaODd +fqeWT2M0sBjTVIwCCNSkmlUrhjw+nYK9qrK+spOu1yIXr+ld4QT3NG8Jd9GZdJSebG5 +lNlnxPumWgSFdyyYBO8XyxvykOR0/zLdjVBvNp+MIJEbmLBovSjJDtVaSpCqFbW+kuP PhItynSCYRZV1cWeDqgI8der4C9HjyIiO2ABrlYzEujO6bkjPTQTZcsvu8CVyFZwmYg9 +t9R8YiC791bgUfkA54eCcIlUyNe9FxPdr0ENX9ogLgqwnN/ti6alRv6x3k5gYUbOLM3 Wncg==
X-Gm-Message-State: AIkVDXJhvB8SfARHOYchKGFI7070phx3H9Kl3TLLkqq1q+i2Dh/KU4xpMb+N0ZwdoR3eHDAN/65RF3pdSCvUOatg
X-Received: by 10.107.131.195 with SMTP id n64mr34320907ioi.161.1482941111933; Wed, 28 Dec 2016 08:05:11 -0800 (PST)
MIME-Version: 1.0
Received: by 10.107.155.209 with HTTP; Wed, 28 Dec 2016 08:05:11 -0800 (PST)
From: "Rohloff, Kurt" <rohloff@njit.edu>
Date: Wed, 28 Dec 2016 11:05:11 -0500
Message-ID: <CAOQWjZFJHmExLHS_g3AkKE8VvXv978ojEWOd-NgtCG0uPfYabA@mail.gmail.com>
To: ietf-privacy@ietf.org
Content-Type: multipart/alternative; boundary="001a113ed05c334e8b0544ba2236"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-privacy/e6gQcdPC0CH0ZxQxaUCYXLQv3Do>
Cc: Michael Brenner <brenner@luis.uni-hannover.de>
Subject: [ietf-privacy] CFP: Workshop on Applied Encrypted Computing and Applied Homomorphic Cryptography
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Dec 2016 16:05:14 -0000
Hello- We would like to invite you to submit a paper to this year's Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC): https://www.dcsec.uni-hannover.de/wahc17.html The workshop will be held after Financial Crypto (FC) in Malta on April 7th. The workshop focuses on the implementation and application of Homomorphic Encryption (HE), Secure Multi-Party Computation (SMC), cryptographic obfuscation, SGX, differential privacy and related encrypted computing technologies in both software and hardware. The cloud hype and recent disclosures show there is demand for secure and practical computing technologies. The workshop addresses the challenge to safely outsource data processing onto remote computing resources by protecting programs and data even during processing. This allows users to confidently outsource computation over confidential information independently from the trustworthiness or the security level of the remote delegate. The technologies and techniques discussed in this workshop are key to extend the range of applications that can be securely and practically outsourced. The goal of the workshop is to bring together researchers, practitioners, government and industry to present, discuss and share the latest progress in the field relevant to real-world problems with practical approaches and solutions. Topics include (but are not limited to): -Software architectures for encrypted applications -Platform and system integration for encrypted applications -Algorithmic primitives for encrypted applications -Hybrid (partly encrypted) applications -Hardware implementations of encrypted computing -Implementation of homomorphic encryption schemes -Practical performance evaluations of homomorphic encryption schemes -Practical aspects of functional encryption -Privacy-preserving set operations -Secure information sharing -Circuit transformation of algorithms -Obfuscation techniques -Encrypted search schemes -Encrypted e-payment solutions -Encrypted financial transactions -Encrypted applications in bio-informatics Schedule: Submission Deadline: Dec. 31, 2016 Acceptance Notice: Feb. 15, 2017 Camera Ready Due: Mar. 1, 2017 Workshop: Apr. 7, 2017 Submission instructions can be found on the workshop website. Please contact the organizers with any questions, and please forward this on to anyone who you feel would be interested in participating. Best regards, Kurt Rohloff and Michael Brenner -- Kurt Rohloff Assoc. Prof., NJIT Director, NJIT Cybersecurity Research Center rohloff@njit.edu
- [ietf-privacy] CFP: Workshop on Applied Encrypted… Rohloff, Kurt