Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC)
Event submitted on Sunday, July 18th 2021, approved by Content Team ✓
This event has been tagged as follows:
Secure computing is quickly becoming a critical component of future information systems. Because a large amount of personal consumer data is gathered in multiple formats and for diverse reasons, distributed network applications and cloud architectures are in jeopardy. Threats to industry and consumer electronics businesses include intellectual property theft and industrial espionage. Public infrastructure must be protected from sabotage and manipulation and this event will address the fact that encrypted computing is one possible solution to the threat. Data may be handled on remote, potentially unsafe resources yet program code and data are encrypted at all times. This enables the calculation of private information to be outsourced regardless of the trustworthiness or security level of the distant system. The technologies and approaches covered in this session are critical for broadening the scope of applications that may be safely outsourced. If you work in this niche then we’d highly recommend you attend this academic infosec event.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Sunday, July 18th 2021, or created by us.
Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are in danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data are encrypted all the time. This allows outsourcing the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are key to extend the range of applications that can be securely outsourced.
The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss, and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions.