Cloud Cryptography Workshop

August 5th and 6th, 2010 at Microsoft Research, Redmond

Cloud computing provides clients with a virtual computing infrastructure on top of which they can store data and run applications. Cloud computing introduces new security challenges since cloud operators are expected to manipulate client data without being fully trusted. This workshop will bring together researchers in theoretical and applied cryptography to provide a forum for discussions about cryptographic techniques for securing data and computation in a cloud environment.


Here is the program for the workshop.


A (non-exhaustive) list of topics of interest include: proofs of storage (POR, PDP); obfuscation; functional encryption; searchable encryption; homomorphic encryption; private information retrieval; oblivious transfer; verifiable computation; zero-knowledge sets; authenticated data structures; consistency in storage systems; proxy re-encryption.

Confirmed Speakers

  • Giuseppe Ateniese (Johns Hopkins)
  • Kevin Bowers (RSA Labs)
  • Ran Canetti (Tel Aviv University)
  • Melissa Chase (Microsoft Research)
  • Yevgeniy Dodis (New York University)
  • Craig Gentry (IBM Research)
  • Vipul Goyal (Microsoft Research)
  • Ari Juels (RSA Labs)
  • Seny Kamara (Microsoft Research)
  • David Molnar (Microsoft Research)
  • Charalampos Papamanthou (Brown)
  • Chris Peikert (Georgia Tech)
  • Mariana Raykova (Columbia)
  • Tom Ristenpart (UC San Diego)
  • Tom Roeder (Microsoft Research)
  • Emily Shen (MIT)
  • Gene Tsudik (UC Irvine)
  • Vinod Vaikuntanathan (Microsoft Research)


Rump Session

If there is sufficient interest, we will hold a rump session the evening of August 5. Please email Melissa Chase or Seny Kamara by August 2 if you would like to speak.



The workshop is open to all, however space is limited, and we need an accurate count of those attending.  If you are interested in attending, please email Melissa Chase or Seny Kamara.  There will be no registration fee.