Call for Chapters

An edited volume of IOS Press Cryptology and Information Security Series on
Identity-Based Cryptography
Editors: Marc Joye and Gregory Neven


First introduced by Shamir as early as in 1984, identity-based cryptography has seen a revival in public interest in recent years due to the introduction of bilinear maps to cryptography. This edited volume intends to give an overview of the state-of-the-art of the theory and practice related to identity-based cryptography. The targeted audience includes beginning students in the field, interested researchers from other fields as well as industry practitioners.


High-quality contributions will be invited on all aspects of identity-based cryptography, including (but not necessarily limited to) the following topics: Contributions will particularly be expected to give a survey of a larger part of the literature, and prepared using the IOS Press LaTeX style file. Interested authors should send an abstract of their planned contribution with a provisional table of contents to the editors by electronic mail (, by November 15th 2007. Upon acceptance, the full contributions are due by March 15th 2008. The volume is expected to appear in August 2008.

Important dates

Abstract due: Submission closed!
Manuscript due: March 15th 2008
Completion of reviews: April 15th 2008
Revised manuscripts due: July 1st 2008
Publication: September 2008

Preliminary table of contents

Introduction to identity-based cryptography Antoine Joux
Mathematical Background on Pairings Frederik Vercauteren
Generic model for groups with pairing David Lubicz and Thomas Sirvent
Certificateless Encryption Sherman Chow
Identity-Based Signatures Eike Kiltz and Gregory Neven
Identity-Based Encryption and Hierarchical Identity-Based Encryption Sanjit Chatterjee and Palash Sarkar
ID-Based Encryption for Complex Hierarchies
with Applications to Forward Security and Broadcast Encryption
Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, and Anna Lysyanskaya
Identity-based Identification and Signature Schemes using Error Correcting Codes Pierre-Louis Cayrel, Philippe Gaborit, and Marc Girault
Attribute-Based Encryption and Beyond Amit Sahai, Brent Waters, and Steve Lu
Commutative Blinding IBE Framework Xavier Boyen
Exponent Inversion IBE Framework Xavier Boyen
Software Implementation of Pairings Darrel Hankerson, Alfred Menezes, and Mike Scott
Efficient Hardware Architectures for Identity Based Encryption Robert Ronan, Maurice Keller, Colin Murphy, and William Marnane
Implementation Attacks, Countermeasures & Performance Evaluation Claire Whelan, Andrew Byrne, Dan Page, Frederik Vercauteren, Mike Scott, and William Marnane