March 15-16, 2011 in Zurich, Switzerland


The cloud computing model offers cheap access to a variety of
standardized services, but comes with concerns about the
correctness, privacy, and integrity of remote data and
computations. Cryptographic mechanisms can reduce such trust by
allowing the user to protect its data and computations, as well as
to verify aspects of remote computation.

The aim of this workshop is to bring together researchers and
practitioners working in cryptography and security, from academia and
industry, who are interested in the security of current and future
cloud computing technology. The workshop considers the viewpoint of
cloud-service providers as well as the concerns of cloud users. The
goal is to create a dialogue about common goals and to discuss
solutions for security problems in cloud computing, with emphasis on
cryptographic methods.


The workshop is organized and sponsored by 

   ECRYPT II (European Network of Excellence in Cryptology)

   TClouds (Trustworthy Clouds)

in collaboration with IBM Research - Zurich (


  * Data privacy and integrity
  * Proofs of storage
  * Remote attestation and verification
  * Secure outsourcing of computation
  * Verification of outsourced computation
  * Storage integrity
  * Private remote storage
  * Obfuscation of programs and data
  * Identity management in cloud computing
  * Robust generation of cryptographic random bits
  * Cryptosystems with conditional decryption (such as searchable
    encryption or functional encryption)
  * Trusted computing
  * Virtualization security


   The workshop will consist of invited keynote presentations and
   contributed presentations. There will be no proceedings, but a handout
   with abstracts will be provided to all participants.


   Giuseppe Ateniese, Johns Hopkins University, USA
   Giuseppe Persiano, Universita  di Salerno, Italy
   Benny Pinkas, Bar Ilan University, Israel
   Thomas Ristenpart, UCSD and University of Wisconsin, Madison, USA
   Ahmad Sadeghi, TU Darmstadt, Germany
   Radu Sion, Stony Brook University, USA

We are still in the process of extending the list of keynote speakers.


To contribute a submission, please submit an extended abstract
summarizing a technical contribution or a position paper summarizing
your research. Contributions will be selected by the expected interest
in the topic and the potential for stimulating exchange of ideas among
the participants.

There will be no proceedings, but a handout with abstracts will be
provided to all participants.

A submission must be a PDF file that uses only the standard character
sets. There recommended length of a submission is four pages in letter-
or A4-format, using at least 10pt fonts, but there is no sharp bound on
the length.

All submissions must be sent as an attachment by email to


Every received submission will be acknowledged by email, generally
within one working day (except during the holiday break from 20
December 2010 until 4 January 2011).

Submissions must be received before or on 17 January 2011, and
notification of acceptance will be sent by 2 February 2011.


Christian Cachin, IBM Research - Zurich, Switzerland; Chair
Giuseppe Persiano, Universit di Salerno, Italy
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Matthias Schunter, IBM Research - Zurich, Switzerland
Paulo Verissimo, Universidade de Lisboa, Portugal


A limited number of stipends is available for interested and qualified
students. If you are interested, please contact the organizers before
17 January 2011.


   Sören Bleikertz
   Christian Cachin