August 5, 2016 August 6, 2016

Cloud Cryptography

Location: Microsoft Research, Redmond

Cloud computing provides clients with a virtual computing infrastructure on top of which they can store data and run applications. Cloud computing introduces new security challenges since cloud operators are expected to manipulate client data without being fully trusted. This workshop will bring together researchers in theoretical and applied cryptography to provide a forum for discussions about cryptographic techniques for securing data and computation in a cloud environment.

A (non-exhaustive) list of topics of interest include: proofs of storage (POR, PDP); obfuscation; functional encryption; searchable encryption; homomorphic encryption; private information retrieval; oblivious transfer; verifiable computation; zero-knowledge sets; authenticated data structures; consistency in storage systems; proxy re-encryption.