ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WAHC 2014 - 2nd Workshop on Workshop on Applied Homomorphic Cryptography (WAHC'14)

Date2014-03-07

Deadline2013-11-24

VenueBarbados, USA - United States USA - United States

Keywords

Websitehttps://www.dcsec.uni-hannover.de/4556.html

Topics/Call fo Papers

Homomorphic Cryptography is one of the hottest topics in mathematics and computer science since Gentry presented the first construction of a fully homomorphic encryption scheme in 2009. Recently, a number of extensions to the original approach, as well as new paradigms have been proposed, creating a diverse basis for further theoretical research. On the other hand, we need research on practical applications of homomorphic encryption which is still less advanced. The cloud hype and different recent disclosures clearly show that there is a strong demand for secure delegation of computation. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.
The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.
Topics include (but are not limited to)
Implementation issues of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics
Hybrid (partly encrypted) applications
Intended audience
Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

Last modified: 2013-09-26 07:23:15