[ietf-privacy] CFP: Workshop on Applied Encrypted Computing and Applied Homomorphic Cryptography

"Rohloff, Kurt" <rohloff@njit.edu> Wed, 28 December 2016 16:05 UTC

Return-Path: <rohloff@njit.edu>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8C46129612 for <ietf-privacy@ietfa.amsl.com>; Wed, 28 Dec 2016 08:05:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=njit-edu.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lOxiwyrfp8Uf for <ietf-privacy@ietfa.amsl.com>; Wed, 28 Dec 2016 08:05:12 -0800 (PST)
Received: from mail-io0-x22a.google.com (mail-io0-x22a.google.com [IPv6:2607:f8b0:4001:c06::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6B3612943C for <ietf-privacy@ietf.org>; Wed, 28 Dec 2016 08:05:12 -0800 (PST)
Received: by mail-io0-x22a.google.com with SMTP id p42so335816386ioo.1 for <ietf-privacy@ietf.org>; Wed, 28 Dec 2016 08:05:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=njit-edu.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to:cc; bh=c8QLjECSe06ZPA8noO7dC7kcLLc7sRKUnP2X0HKUTe4=; b=xQKgd/zrRSF3qYP/iPszHbHU5ZMWRhH3s1+D9qPqwC16jXN4UcW6D2VwbWEUTEJ15I 7+xAE7iDFrsIt3tpMvFRV5LpxGQSsvYzoGwM+V0hKZTXQhYzOMM7O0srKViD46hvsSY9 fq2FpxOaZwiW5XEqkAYgLjDcq2o4m7Z3OvLEXJYX50EpvaQBP1tVA2MXoyEK/7jYdQKB JO1op7i2oaCButxHf0mG5z8ZFV69915fkUe+BL4zIs18BxWRNX79zRfL7a97tgVeR8UW 30mD8c968wYFBmGMin8rRXizijhAUovEdi9TBmjpFEPaAofI/JXDr9m32/dul25WaRwE xUPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=c8QLjECSe06ZPA8noO7dC7kcLLc7sRKUnP2X0HKUTe4=; b=ibzQVqRiFS3z/AEPB0+8qZKkR+XDNlQxJq2U9UzGC1NsvHam1mKeP4LnU7iLhKaODd +fqeWT2M0sBjTVIwCCNSkmlUrhjw+nYK9qrK+spOu1yIXr+ld4QT3NG8Jd9GZdJSebG5 +lNlnxPumWgSFdyyYBO8XyxvykOR0/zLdjVBvNp+MIJEbmLBovSjJDtVaSpCqFbW+kuP PhItynSCYRZV1cWeDqgI8der4C9HjyIiO2ABrlYzEujO6bkjPTQTZcsvu8CVyFZwmYg9 +t9R8YiC791bgUfkA54eCcIlUyNe9FxPdr0ENX9ogLgqwnN/ti6alRv6x3k5gYUbOLM3 Wncg==
X-Gm-Message-State: AIkVDXJhvB8SfARHOYchKGFI7070phx3H9Kl3TLLkqq1q+i2Dh/KU4xpMb+N0ZwdoR3eHDAN/65RF3pdSCvUOatg
X-Received: by 10.107.131.195 with SMTP id n64mr34320907ioi.161.1482941111933; Wed, 28 Dec 2016 08:05:11 -0800 (PST)
MIME-Version: 1.0
Received: by 10.107.155.209 with HTTP; Wed, 28 Dec 2016 08:05:11 -0800 (PST)
From: "Rohloff, Kurt" <rohloff@njit.edu>
Date: Wed, 28 Dec 2016 11:05:11 -0500
Message-ID: <CAOQWjZFJHmExLHS_g3AkKE8VvXv978ojEWOd-NgtCG0uPfYabA@mail.gmail.com>
To: ietf-privacy@ietf.org
Content-Type: multipart/alternative; boundary="001a113ed05c334e8b0544ba2236"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-privacy/e6gQcdPC0CH0ZxQxaUCYXLQv3Do>
Cc: Michael Brenner <brenner@luis.uni-hannover.de>
Subject: [ietf-privacy] CFP: Workshop on Applied Encrypted Computing and Applied Homomorphic Cryptography
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Dec 2016 16:05:14 -0000

Hello-

We would like to invite you to submit a paper to this year's Workshop on
Encrypted Computing and Applied Homomorphic Cryptography (WAHC):

https://www.dcsec.uni-hannover.de/wahc17.html

The workshop will be held after Financial Crypto (FC) in Malta on April 7th.
The workshop focuses on the implementation and application of Homomorphic
Encryption (HE), Secure Multi-Party Computation (SMC), cryptographic
obfuscation, SGX, differential privacy and related encrypted computing
technologies in both software and hardware.

The cloud hype and recent disclosures show there is demand for secure and
practical computing technologies. The workshop addresses the challenge to
safely outsource data processing onto remote computing resources by
protecting programs and data even during processing. This allows users to
confidently outsource computation over confidential information
independently from the trustworthiness or the security level of the remote
delegate. The technologies and techniques discussed in this workshop are
key to extend the range of applications that can be securely and
practically outsourced. The goal of the workshop is to bring together
researchers, practitioners, government and industry to present, discuss and
share the latest progress in the field relevant to real-world problems with
practical approaches and solutions.

Topics include (but are not limited to):
-Software architectures for encrypted applications
-Platform and system integration for encrypted applications
-Algorithmic primitives for encrypted applications
-Hybrid (partly encrypted) applications
-Hardware implementations of encrypted computing
-Implementation of homomorphic encryption schemes
-Practical performance evaluations of homomorphic encryption schemes
-Practical aspects of functional encryption
-Privacy-preserving set operations
-Secure information sharing
-Circuit transformation of algorithms
-Obfuscation techniques
-Encrypted search schemes
-Encrypted e-payment solutions
-Encrypted financial transactions
-Encrypted applications in bio-informatics

Schedule:

Submission Deadline: Dec. 31, 2016
Acceptance Notice: Feb. 15, 2017
Camera Ready Due: Mar. 1, 2017
Workshop: Apr. 7, 2017

Submission instructions can be found on the workshop website.

Please contact the organizers with any questions, and please forward this
on to anyone who you feel would be interested in participating.

Best regards,

Kurt Rohloff and Michael Brenner

-- 
Kurt Rohloff
Assoc. Prof., NJIT
Director, NJIT Cybersecurity Research Center
rohloff@njit.edu