TY - GEN
T1 - WAHC 2025
T2 - 32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025
AU - Bergamaschi, Flavio
AU - Polyakov, Yuriy
AU - Rohloff, Kurt
N1 - Publisher Copyright:
© 2025 Copyright held by the owner/author(s).
PY - 2025/11/22
Y1 - 2025/11/22
N2 - Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced. The goal of the 13th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC'25) is to bring together researchers and practitioners from industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions. The complete WAHC'25 workshop proceedings can be found at https://dl.acm.org/citation.cfm?id=3733811.
AB - Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced. The goal of the 13th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC'25) is to bring together researchers and practitioners from industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practical approaches and solutions. The complete WAHC'25 workshop proceedings can be found at https://dl.acm.org/citation.cfm?id=3733811.
KW - encrypted computing
KW - fully homomorphic encryption
KW - lattice-based cryptography
KW - secure multiparty computation
UR - https://www.scopus.com/pages/publications/105023884894
UR - https://www.scopus.com/pages/publications/105023884894#tab=citedBy
U2 - 10.1145/3719027.3769095
DO - 10.1145/3719027.3769095
M3 - Conference contribution
AN - SCOPUS:105023884894
T3 - CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security
SP - 4926
EP - 4927
BT - CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security
PB - Association for Computing Machinery, Inc
Y2 - 13 October 2025 through 17 October 2025
ER -