August 5th and 6th, 2010 at Microsoft Research, Redmond
Cloud computing provides clients with a virtual computing infrastructure on top of which they can store data and run applications. Cloud computing introduces new security challenges since cloud operators are expected to manipulate client data without being fully trusted. This workshop will bring together researchers in theoretical and applied cryptography to provide a forum for discussions about cryptographic techniques for securing data and computation in a cloud environment.
Here is the program for the workshop.
A (non-exhaustive) list of topics of interest include: proofs of storage (POR, PDP); obfuscation; functional encryption; searchable encryption; homomorphic encryption; private information retrieval; oblivious transfer; verifiable computation; zero-knowledge sets; authenticated data structures; consistency in storage systems; proxy re-encryption.
- Giuseppe Ateniese (Johns Hopkins)
- Kevin Bowers (RSA Labs)
- Ran Canetti (Tel Aviv University)
- Melissa Chase (Microsoft Research)
- Yevgeniy Dodis (New York University)
- Craig Gentry (IBM Research)
- Vipul Goyal (Microsoft Research)
- Ari Juels (RSA Labs)
- Seny Kamara (Microsoft Research)
- David Molnar (Microsoft Research)
- Charalampos Papamanthou (Brown)
- Chris Peikert (Georgia Tech)
- Mariana Raykova (Columbia)
- Tom Ristenpart (UC San Diego)
- Tom Roeder (Microsoft Research)
- Emily Shen (MIT)
- Gene Tsudik (UC Irvine)
- Vinod Vaikuntanathan (Microsoft Research)