Call for Chapters
Identity-Based
Cryptography
Editors: Marc Joye and Gregory Neven
Scope
First introduced by Shamir as early as in 1984, identity-based cryptography has seen a revival in public interest in recent years due to the introduction of bilinear maps to cryptography. This edited volume intends to give an overview of the state-of-the-art of the theory and practice related to identity-based cryptography. The targeted audience includes beginning students in the field, interested researchers from other fields as well as industry practitioners.Topics
High-quality contributions will be invited on all aspects of identity-based cryptography, including (but not necessarily limited to) the following topics:- mathematics underlying ID-based cryptography, and in particular bilinear maps
- ID-based encryption, signatures, authentication, signcryption, key exchange and other primitives
- certificateless encryption
- pairing-based schemes with new properties
- theory and security notions related to ID-based cryptography
- real-world applications and implementations
- efficient software or hardware implementations of pairing-based cryptography
- security policies and enforcement
- impact of ID-based cryptography on organizational structures
- legal and regulatory issues
Important dates
Abstract due: | Submission closed! |
Manuscript due: | March 15th 2008 |
Completion of reviews: | April 15th 2008 |
Revised manuscripts due: | July 1st 2008 |
Publication: | September 2008 |
Preliminary table of contents
Introduction to identity-based cryptography | Antoine Joux |
Mathematical Background on Pairings | Frederik Vercauteren |
Generic model for groups with pairing | David Lubicz and Thomas Sirvent |
Certificateless Encryption | Sherman Chow |
Identity-Based Signatures | Eike Kiltz and Gregory Neven |
Identity-Based Encryption and Hierarchical Identity-Based Encryption | Sanjit Chatterjee and Palash Sarkar |
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption |
Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, and Anna Lysyanskaya |
Identity-based Identification and Signature Schemes using Error Correcting Codes | Pierre-Louis Cayrel, Philippe Gaborit, and Marc Girault |
Attribute-Based Encryption and Beyond | Amit Sahai, Brent Waters, and Steve Lu |
Commutative Blinding IBE Framework | Xavier Boyen |
Exponent Inversion IBE Framework | Xavier Boyen |
Software Implementation of Pairings | Darrel Hankerson, Alfred Menezes, and Mike Scott |
Efficient Hardware Architectures for Identity Based Encryption | Robert Ronan, Maurice Keller, Colin Murphy, and William Marnane |
Implementation Attacks, Countermeasures & Performance Evaluation | Claire Whelan, Andrew Byrne, Dan Page, Frederik Vercauteren, Mike Scott, and William Marnane |