[ietf-privacy] CFP: 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography WAHC 2016, Feb. 26, Barbados

"Rohloff, Kurt" <rohloff@njit.edu> Sat, 21 November 2015 05:05 UTC

Return-Path: <rohloff@njit.edu>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com []) by ietfa.amsl.com (Postfix) with ESMTP id 5ED001A8ABA for <ietf-privacy@ietfa.amsl.com>; Fri, 20 Nov 2015 21:05:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.422
X-Spam-Level: *
X-Spam-Status: No, score=1.422 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id XXfarTYahSqT for <ietf-privacy@ietfa.amsl.com>; Fri, 20 Nov 2015 21:05:08 -0800 (PST)
Received: from mail-ig0-x233.google.com (mail-ig0-x233.google.com [IPv6:2607:f8b0:4001:c05::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C5B21A8ABD for <ietf-privacy@ietf.org>; Fri, 20 Nov 2015 21:05:08 -0800 (PST)
Received: by igcto18 with SMTP id to18so26116290igc.0 for <ietf-privacy@ietf.org>; Fri, 20 Nov 2015 21:05:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=njit-edu.20150623.gappssmtp.com; s=20150623; h=mime-version:date:message-id:subject:from:to:content-type; bh=yhKL1xryhX7l9ZbSYY9G1yn3fThIQSqZPbB0xKuo6BA=; b=ggZ8yaeMEjA7dP63XdbzV1N9dRKP/JQ1YWw5bUoakEwvLLabblup61pwhDpc8NnekG 82JPhxmrhm1ePVKW4csDOek5c9adZUoolumtG6YJs9f8ucmICxpkHEhggZqvcHvGE5Hf ux//QlHbDPJfuiKZfghbuNkYyYUFCTI+LEqEljAam4FQpN9rLbLv/nbvWIF2WU60yu1a FwWeCGvBov6aE0+bzyEYhIZINcu4MmLngx66D7NNdy9A36Jd29VktWMaBYV4ibwK8Uxg qej60++/rLpKdyQGFgNcmXP6/hoJ5esXE5VFQrCH9muj1ZGOEhjoBDtceeK6HLkxAQ3G LKoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=yhKL1xryhX7l9ZbSYY9G1yn3fThIQSqZPbB0xKuo6BA=; b=M5Z+R29FUkqUYpzmljiQ03onYQtlXQaDh9NYeKQ8EagqNHIL3T8MdDnohuD1mYMpay LY6FmkYtcPcB7ZB1S1hfYGiIQQZc5XNu+O0os3c0loBSgz+di6PjPc9eteDtlsrc/f12 xVBmEaBGH+bAQz/gfroaAEXx9VNgTmzilJeQuVN082LrgN60OWBhwE5ZrmKdAwwHZR3W ZDsBs47xqEchl4EH19HscWDn7T/rajrGkXaKZ58GJGfrhp8YgqcsarxHARdR1NE8lE9o WvMw77xyp/EKho355VoF2GANlTyiTLU/gTMlLgc8noFG/YiNaTCLkYH8sgVYsV8+H8y1 +KNA==
X-Gm-Message-State: ALoCoQlrSm1tiadtf3a+GbSNta38o9fVi3ESgPgw8CUJFNsnnLW6XslNr2d+C6ogRJg6C5eUOlXf
MIME-Version: 1.0
X-Received: by with SMTP id d2mr4761586igx.72.1448082307761; Fri, 20 Nov 2015 21:05:07 -0800 (PST)
Received: by with HTTP; Fri, 20 Nov 2015 21:05:07 -0800 (PST)
Date: Sat, 21 Nov 2015 00:05:07 -0500
Message-ID: <CAOQWjZG7omDEw7Un9D=4e-W7Dde9YRJ=9npf456J4mroDppG4w@mail.gmail.com>
From: "Rohloff, Kurt" <rohloff@njit.edu>
To: ietf-privacy@ietf.org
Content-Type: multipart/alternative; boundary="089e0111e06a8f6893052505efb0"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf-privacy/zFL79d8O4_QonMpgv48ZerT6VyQ>
Subject: [ietf-privacy] CFP: 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography WAHC 2016, Feb. 26, Barbados
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-privacy/>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Nov 2015 05:06:29 -0000

We invite you to submit a paper to this year's Workshop on Encrypted
Computing and Applied Homomorphic Cryptography (WAHC):


The workshop will be held after Financial Crypto (FC) in Barbados on Feb
26th.  The workshop focuses on the implementation and application of
Homomorphic Encryption (HE) and and Secure Multi-Party Computation (SMC)
technologies in both software and hardware.

Secure computation is becoming a key feature of future information systems.
Distributed network applications and cloud architectures are at danger
because lots of personal consumer data is aggregated in all kinds of
formats and for various purposes. Industry and consumer electronics
companies are facing massive threats like theft of intellectual property
and industrial espionage. Public infrastructure has to be secured against
 sabotage and manipulation. A possible solution is encrypted computing:
Data can be processed on remote, possibly insecure resources, while program
code and data is encrypted all the time. This allows to outsource the
computation of confidential information independently from the
trustworthiness or the security level of the remote system. The
technologies and techniques discussed in this workshop are a key to extend
the range of applications that can be securely outsourced.

The goal of the workshop is to bring together researchers with
practitioners and industry to present, discuss and to share the latest
progress in the field. We want to exchange ideas that address real-world
problems with practical approaches and solutions.


Submission Deadline EXTENDED: Nov. 30, 2015
Acceptance Notice: Jan. 16, 2016
Camera Ready Due: Jan. 31, 2016
Workshop: Feb. 26, 2016

Accepted submissions will be published in a Springer LNCS volume (as part
of the main FC '16 proceedings or typically collected in a subsidiary
workshop volume). Papers are limited to 12-16 pages including references
and appendices. This year, we also encourage authors to submit Demos which
are limited to 6-8 pages and feature a presentation with an extensive code

Submission instructions can be found on the workshop website.

Kurt Rohloff
Assoc. Prof., NJIT
Director, NJ Cybersecurity Research Center