Edit Profile Boneh, Dan Compute Distance To: Compute Author ID: boneh.dan Published as: Boneh, D.; Boneh, Dan External Links: MGP · Wikidata · dblp Documents Indexed: 117 Publications since 1995, including 1 Book all top 5 Co-Authors 8 single-authored 12 Boyen, Xavier 12 Waters, Brent 8 Sahai, Amit 8 Zhandry, Mark 6 Franklin, Matthew K. 6 Halevi, Shai 6 Wu, David J. 5 Durfee, Glenn 5 Lipton, Richard J. 5 Segev, Gil 5 Shacham, Hovav 4 Freeman, David Mandell 4 Gentry, Craig 4 Ishai, Yuval 4 Raghunathan, Ananth 3 Agrawal, Shweta 3 Bünz, Benedikt 3 Corrigan-Gibbs, Henry 3 Fisch, Ben A. 3 Goh, Eu-Jin 3 Katz, Jonathan N. 3 Lewi, Kevin 3 Lynn, Ben 3 Mironov, Ilya 3 Ostrovsky, Rafail 3 Silverberg, Alice 3 Venkatesan, Ramarathnam 2 Ahn, Jaehyun 2 Camenisch, Jan L. 2 Daswani, Neil 2 Du, Wenliang 2 Dunworth, Christopher 2 Gennaro, Rosario 2 Goldfeder, Steven 2 Golle, Philippe 2 Hamburg, Michael 2 Hohenberger, Susan 2 Howgrave-Graham, Nick A. 2 Kim, Sam Myo 2 Li, Ninghui 2 Montgomery, Hart 2 Sgall, Jiří 2 Shaw, James R. 2 Shelat, Abhi 1 Abadi, Martín 1 Agrawal, Shashank 1 Barth, Adam 1 Baum, Eric B. 1 Biham, Eli 1 Bonneau, Joseph 1 Boyle, Elette 1 Canetti, Ran 1 Dagdelen, Özgür 1 DeMillo, Richard A. 1 Di Crescenzo, Giovanni 1 Drijvers, Manu 1 Eskandarian, Saba 1 Felten, Edward W. 1 Fischlin, Marc 1 Frankel, Yair 1 Fu, Kevin 1 Gilboa, Niv 1 Glass, Darren B. 1 Gorbunov, Sergeĭ Vladimirovich 1 Gueron, Shay 1 Gupta, Divya 1 Horwitz, Jeremy 1 Jacob, Matthias 1 Jain, Aayush 1 Jakobsson, Markus 1 Jeffrey, Christopher 1 Joux, Antoine 1 Juels, Ari 1 Kim, Michael B. 1 Kim, Sam-Tae 1 Krashen, Daniel 1 Kushilevitz, Eyal 1 Lauter, Kristin Estella 1 Lehmann, Anja 1 Love, Jonathan 1 Modadugu, Nagendra 1 Naor, Moni 1 Neven, Gregory 1 Nguyen, Phong Q. 1 Nikolaenko, Valeria 1 Nissim, Kobbi 1 Passelègue, Alain 1 Persiano, Giuseppe 1 Pinkas, Benny 1 Poon, Joseph 1 Rasmussen, Peter Michael Reichstein 1 Raykova, Mariana 1 Reingold, Omer 1 Rubin, Aviel D. 1 Rubin, Karl Cooper 1 Schaffner, Christian 1 Schechter, Stuart 1 Sharif, Shahed 1 Shen, Emily S. 1 Shoup, Victor ...and 10 more Co-Authors all top 5 Serials 5 Journal of Cryptology 2 IEEE Transactions on Information Theory 2 SIAM Journal on Computing 1 Discrete Applied Mathematics 1 Information Processing Letters 1 Journal of Computer and System Sciences 1 Journal of Number Theory 1 Algorithmica 1 Notices of the American Mathematical Society 1 Distributed Computing 1 Journal of the ACM 1 Lecture Notes in Computer Science 1 Journal of Mathematical Cryptology all top 5 Fields 111 Information and communication theory, circuits (94-XX) 30 Computer science (68-XX) 12 Number theory (11-XX) 10 Algebraic geometry (14-XX) 3 Quantum theory (81-XX) 3 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 General and overarching topics; collections (00-XX) 1 History and biography (01-XX) 1 Numerical analysis (65-XX) 1 Biology and other natural sciences (92-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 101 Publications have been cited 3,242 times in 1,622 Documents Cited by ▼ Year ▼ Identity-based encryption from the Weil pairing. Zbl 1002.94023Boneh, Dan; Franklin, Matt 373 2001 Efficient selective-id secure identity-based encryption without random oracles. Zbl 1122.94355Boneh, Dan; Boyen, Xavier 184 2004 Identity-based encryption from the Weil pairing. Zbl 1046.94008Boneh, Dan; Franklin, Matthew 182 2003 Collusion-secure fingerprinting for digital data. Zbl 0931.94051Boneh, Dan; Shaw, James 158 1998 Short signatures from the Weil pairing. Zbl 1064.94554Boneh, Dan; Lynn, Ben; Shacham, Hovav 135 2001 Short group signatures. Zbl 1104.94044Boneh, Dan; Boyen, Xavier; Shacham, Hovav 133 2004 Hierarchical identity based encryption with constant size ciphertext. Zbl 1137.94340Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin 119 2005 Short signatures without random oracles. Zbl 1122.94354Boneh, Dan; Boyen, Xavier 101 2004 Evaluating 2-DNF formulas on ciphertexts. Zbl 1079.94534Boneh, Dan; Goh, Eu-Jin; Nissim, Kobbi 93 2005 Public key encryption with keyword search. Zbl 1122.68424Boneh, Dan; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe 89 2004 Functional encryption: definitions and challenges. Zbl 1295.94027Boneh, Dan; Sahai, Amit; Waters, Brent 87 2011 Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434Boneh, Dan; Gentry, Craig; Waters, Brent 81 2005 Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav 80 2003 Short signatures from the Weil pairing. Zbl 1070.94010Boneh, Dan; Lynn, Ben; Shacham, Hovav 78 2004 Efficient lattice (H)IBE in the standard model. Zbl 1227.94022Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 66 2010 Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335Boneh, Dan; Waters, Brent 64 2007 Secure identity based encryption without random oracles. Zbl 1104.94019Boneh, Dan; Boyen, Xavier 54 2004 The decision Diffie-Hellman problem. Zbl 1067.94523Boneh, Dan 50 1998 Constrained pseudorandom functions and their applications. Zbl 1314.94057Boneh, Dan; Waters, Brent 47 2013 Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373Boneh, Dan; Boyen, Xavier 46 2008 Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail 44 2008 Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran 42 2014 Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan 41 2006 Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 1001.94031Boneh, Dan; Durfee, Glenn 37 2000 Applications of multilinear forms to cryptography. Zbl 1030.94032Boneh, Dan; Silverberg, Alice 34 2003 Twenty years of attacks on the RSA cryptosystem. Zbl 0914.94007Boneh, Dan 32 1999 Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. Zbl 1329.94054Boneh, Dan; Venkatesan, Ramarathnam 32 1996 Generalized identity based and broadcast encryption schemes. Zbl 1206.94054Boneh, Dan; Hamburg, Michael 29 2008 Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1310.94130Boneh, Dan; Zhandry, Mark 28 2014 Homomorphic signatures for polynomial functions. Zbl 1281.94072Boneh, Dan; Freeman, David Mandell 26 2011 Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Zbl 1280.94035Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 25 2010 Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326Boneh, Dan; Sahai, Amit; Waters, Brent 25 2006 Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent 24 2009 Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. Zbl 1291.94181Boneh, Dan; Freeman, David Mandell 22 2011 Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. Zbl 1375.94105Boneh, Dan; Lewi, Kevin; Raykova, Mariana; Sahai, Amit; Zhandry, Mark; Zimmerman, Joe 21 2015 Function-private identity-based encryption: hiding the function in functional encryption. Zbl 1311.94071Boneh, Dan; Raghunathan, Ananth; Segev, Gil 21 2013 Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. Zbl 1079.94535Boneh, Dan; Katz, Jonathan 21 2005 An attack on RSA given a small fraction of the private key bits. Zbl 0956.94007Boneh, Dan; Durfee, Glenn; Frankel, Yair 21 1998 Key homomorphic PRFs and their applications. Zbl 1310.94129Boneh, Dan; Lewi, Kevin; Montgomery, Hart; Raghunathan, Ananth 20 2013 Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012Boneh, Dan; Boyen, Xavier; Halevi, Shai 20 2006 Algorithms for black-box fields and their application to cryptography. Zbl 1329.94053Boneh, Dan; Lipton, Richard J. 20 1996 Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 0948.94009Boneh, Dan; Durfee, Glenn 18 1999 Quantum cryptanalysis of hidden linear functions. (Extended abstract). Zbl 0876.94023Boneh, Dan; Lipton, Richard J. 18 1995 An efficient public key traitor tracing scheme. (Extended abstract). Zbl 0972.94029Boneh, Dan; Franklin, Matthew 17 1999 Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485Boneh, Dan; Shen, Emily; Waters, Brent 16 2006 On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J. 16 2001 Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087Boneh, Dan; Waters, Brent; Zhandry, Mark 15 2014 Efficient selective identity-based encryption without random oracles. Zbl 1251.94022Boneh, Dan; Boyen, Xavier 15 2011 On the computational power of DNA. Zbl 0906.68071Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří 15 1996 Computing on authenticated data. Zbl 1292.94017Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 14 2012 Timed commitments. (Extended abstract). Zbl 0989.94517Boneh, Dan; Naor, Moni 14 2000 Collusion-secure fingerprinting for digital data. (Extended abstract). Zbl 0876.94024Boneh, Dan; Shaw, James 14 1995 Breaking RSA may not be equivalent to factoring. (Extended abstract). Zbl 0922.94008Boneh, Dan; Venkatesan, Ramarathnam 13 1998 Secure signatures and chosen ciphertext security in a quantum computing world. Zbl 1317.81074Boneh, Dan; Zhandry, Mark 12 2013 Random oracles in a quantum world. Zbl 1227.94033Boneh, Dan; Dagdelen, Özgür; Fischlin, Marc; Lehmann, Anja; Schaffner, Christian; Zhandry, Mark 12 2011 Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402Barth, Adam; Boneh, Dan; Waters, Brent 12 2006 Rounding in lattices and its cryptographic applications. Zbl 1321.94045Boneh, Dan; Venkatesan, Ramarathnam 12 1997 Factoring \(N=p^rq\) for large \(r\). Zbl 1007.11077Boneh, Dan; Durfee, Glenn; Howgrave-Graham, Nick 11 1999 The modular inversion hidden number problem. Zbl 1062.94545Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick 10 2001 Making DNA computers error resistant. Zbl 0919.68031Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří 10 1999 Function-private subspace-membership encryption and its applications. Zbl 1327.94036Boneh, Dan; Raghunathan, Ananth; Segev, Gil 9 2013 Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119Boneh, Dan; Segev, Gil; Waters, Brent 9 2012 Simplified OAEP for the RSA and Rabin functions. Zbl 1002.94526Boneh, Dan 9 2001 Finding smooth integers in short intervals using CRT decoding. Zbl 1296.94165Boneh, Dan 9 2000 Finding composite order ordinary elliptic curves using the Cocks-Pinch method. Zbl 1217.11061Boneh, D.; Rubin, K.; Silverberg, A. 8 2011 A secure signature scheme from bilinear maps. Zbl 1039.94522Boneh, Dan; Mironov, Ilya; Shoup, Victor 8 2003 Efficient generation of shared RSA keys. Zbl 1127.94340Boneh, Dan; Franklin, Matthew 8 2001 On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme. Zbl 1002.94025Boneh, Dan; Shparlinski, Igor E. 8 2001 Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Zbl 1003.94521Biham, Eli; Boneh, Dan; Reingold, Omer 8 1999 Constraining pseudorandom functions privately. Zbl 1400.94124Boneh, Dan; Lewi, Kevin; Wu, David J. 7 2017 Quantum-secure message authentication codes. Zbl 1312.94111Boneh, Dan; Zhandry, Mark 7 2013 Oblivious signature-based envelope. Zbl 1321.94075Li, Ninghui; Du, Wenliang; Boneh, Dan 7 2003 Efficient generation of shared RSA keys. (Extended abstract). Zbl 0882.94017Boneh, Dan; Franklin, Matthew 7 1997 Finding smooth integers in short intervals using CRT decoding. Zbl 1052.68036Boneh, Dan 6 2002 Private database queries using somewhat homomorphic encryption. Zbl 1330.94037Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J. 5 2013 Public key encryption that allows PIR queries. Zbl 1215.68096Boneh, Dan; Kushilevitz, Eyal; Ostrovsky, Rafail; Skeith, William E. III 5 2007 Private puncturable PRFs from standard lattice assumptions. Zbl 1410.94049Boneh, Dan; Kim, Sam; Montgomery, Hart 4 2017 Bivariate polynomials modulo composites and their applications. Zbl 1306.94032Boneh, Dan; Corrigan-Gibbs, Henry 4 2014 Message-locked encryption for lock-dependent messages. Zbl 1310.94120Abadi, Martín; Boneh, Dan; Mironov, Ilya; Raghunathan, Ananth; Segev, Gil 4 2013 Oblivious signature-based envelope. Zbl 1264.94101Li, Ninghui; Du, Wenliang; Boneh, Dan 4 2005 Why textbook ElGamal and RSA encryption are insecure. (Extended abstract). Zbl 0980.94014Boneh, Dan; Joux, Antoine; Nguyen, Phong Q. 4 2000 Preventing pollution attacks in multi-source network coding. Zbl 1279.94050Agrawal, Shweta; Boneh, Dan; Boyen, Xavier; Freeman, David Mandell 3 2010 On the impossibility of efficiently combining collision resistant hash functions. Zbl 1138.94347Boneh, Dan; Boyen, Xavier 3 2006 Optimistic mixing for exit-polls. Zbl 1065.94548Golle, Philippe; Zhong, Sheng; Boneh, Dan; Jakobsson, Markus; Juels, Ari 3 2002 Improving SSL handshake performance via batching. Zbl 0972.68071Shacham, Hovav; Boneh, Dan 3 2001 Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1405.94045Boneh, Dan; Zhandry, Mark 2 2017 Lattice-based SNARGs and their application to more efficient obfuscation. Zbl 1415.94412Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J. 2 2017 Attacking an obfuscated cipher by injecting faults. Zbl 1327.94054Jacob, Matthias; Boneh, Dan; Felten, Edward 2 2003 Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Zbl 1027.00041Boneh, Dan (ed.) 2 2003 Lower bounds for multicast message authentication. Zbl 0981.94037Boneh, Dan; Durfee, Glenn; Franklin, Matt 2 2001 Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark 1 2020 Batching techniques for accumulators with applications to IOPs and stateless blockchains. Zbl 07202398Boneh, Dan; Bünz, Benedikt; Fisch, Ben 1 2019 Compact multi-signatures for smaller blockchains. Zbl 1446.94105Boneh, Dan; Drijvers, Manu; Neven, Gregory 1 2018 Verifiable delay functions. Zbl 1444.94046Boneh, Dan; Bonneau, Joseph; Bünz, Benedikt; Fisch, Ben 1 2018 Surnaming schemes, fast verification, and applications to SGX technology. Zbl 1383.94013Boneh, Dan; Gueron, Shay 1 2017 Balloon hashing: a memory-hard function providing provable protection against sequential attacks. Zbl 1404.94043Boneh, Dan; Corrigan-Gibbs, Henry; Schechter, Stuart 1 2016 Hosting services on an untrusted cloud. Zbl 1371.94626Boneh, Dan; Gupta, Divya; Mironov, Ilya; Sahai, Amit 1 2015 Computing on authenticated data. Zbl 1314.94100Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 1 2015 Generating RSA keys on a handheld using an untrusted server. Zbl 0963.94020Boneh, Dan; Modadugu, Nagendra; Kim, Michael 1 2000 Running dynamic programming algorithms on a DNA computer. Zbl 0919.68041Baum, Eric B.; Boneh, Dan 1 1999 Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark 1 2020 Batching techniques for accumulators with applications to IOPs and stateless blockchains. Zbl 07202398Boneh, Dan; Bünz, Benedikt; Fisch, Ben 1 2019 Compact multi-signatures for smaller blockchains. Zbl 1446.94105Boneh, Dan; Drijvers, Manu; Neven, Gregory 1 2018 Verifiable delay functions. Zbl 1444.94046Boneh, Dan; Bonneau, Joseph; Bünz, Benedikt; Fisch, Ben 1 2018 Constraining pseudorandom functions privately. Zbl 1400.94124Boneh, Dan; Lewi, Kevin; Wu, David J. 7 2017 Private puncturable PRFs from standard lattice assumptions. Zbl 1410.94049Boneh, Dan; Kim, Sam; Montgomery, Hart 4 2017 Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1405.94045Boneh, Dan; Zhandry, Mark 2 2017 Lattice-based SNARGs and their application to more efficient obfuscation. Zbl 1415.94412Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J. 2 2017 Surnaming schemes, fast verification, and applications to SGX technology. Zbl 1383.94013Boneh, Dan; Gueron, Shay 1 2017 Balloon hashing: a memory-hard function providing provable protection against sequential attacks. Zbl 1404.94043Boneh, Dan; Corrigan-Gibbs, Henry; Schechter, Stuart 1 2016 Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. Zbl 1375.94105Boneh, Dan; Lewi, Kevin; Raykova, Mariana; Sahai, Amit; Zhandry, Mark; Zimmerman, Joe 21 2015 Hosting services on an untrusted cloud. Zbl 1371.94626Boneh, Dan; Gupta, Divya; Mironov, Ilya; Sahai, Amit 1 2015 Computing on authenticated data. Zbl 1314.94100Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 1 2015 Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran 42 2014 Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1310.94130Boneh, Dan; Zhandry, Mark 28 2014 Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087Boneh, Dan; Waters, Brent; Zhandry, Mark 15 2014 Bivariate polynomials modulo composites and their applications. Zbl 1306.94032Boneh, Dan; Corrigan-Gibbs, Henry 4 2014 Constrained pseudorandom functions and their applications. Zbl 1314.94057Boneh, Dan; Waters, Brent 47 2013 Function-private identity-based encryption: hiding the function in functional encryption. Zbl 1311.94071Boneh, Dan; Raghunathan, Ananth; Segev, Gil 21 2013 Key homomorphic PRFs and their applications. Zbl 1310.94129Boneh, Dan; Lewi, Kevin; Montgomery, Hart; Raghunathan, Ananth 20 2013 Secure signatures and chosen ciphertext security in a quantum computing world. Zbl 1317.81074Boneh, Dan; Zhandry, Mark 12 2013 Function-private subspace-membership encryption and its applications. Zbl 1327.94036Boneh, Dan; Raghunathan, Ananth; Segev, Gil 9 2013 Quantum-secure message authentication codes. Zbl 1312.94111Boneh, Dan; Zhandry, Mark 7 2013 Private database queries using somewhat homomorphic encryption. Zbl 1330.94037Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J. 5 2013 Message-locked encryption for lock-dependent messages. Zbl 1310.94120Abadi, Martín; Boneh, Dan; Mironov, Ilya; Raghunathan, Ananth; Segev, Gil 4 2013 Computing on authenticated data. Zbl 1292.94017Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 14 2012 Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119Boneh, Dan; Segev, Gil; Waters, Brent 9 2012 Functional encryption: definitions and challenges. Zbl 1295.94027Boneh, Dan; Sahai, Amit; Waters, Brent 87 2011 Homomorphic signatures for polynomial functions. Zbl 1281.94072Boneh, Dan; Freeman, David Mandell 26 2011 Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. Zbl 1291.94181Boneh, Dan; Freeman, David Mandell 22 2011 Efficient selective identity-based encryption without random oracles. Zbl 1251.94022Boneh, Dan; Boyen, Xavier 15 2011 Random oracles in a quantum world. Zbl 1227.94033Boneh, Dan; Dagdelen, Özgür; Fischlin, Marc; Lehmann, Anja; Schaffner, Christian; Zhandry, Mark 12 2011 Finding composite order ordinary elliptic curves using the Cocks-Pinch method. Zbl 1217.11061Boneh, D.; Rubin, K.; Silverberg, A. 8 2011 Efficient lattice (H)IBE in the standard model. Zbl 1227.94022Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 66 2010 Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Zbl 1280.94035Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 25 2010 Preventing pollution attacks in multi-source network coding. Zbl 1279.94050Agrawal, Shweta; Boneh, Dan; Boyen, Xavier; Freeman, David Mandell 3 2010 Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent 24 2009 Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373Boneh, Dan; Boyen, Xavier 46 2008 Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail 44 2008 Generalized identity based and broadcast encryption schemes. Zbl 1206.94054Boneh, Dan; Hamburg, Michael 29 2008 Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335Boneh, Dan; Waters, Brent 64 2007 Public key encryption that allows PIR queries. Zbl 1215.68096Boneh, Dan; Kushilevitz, Eyal; Ostrovsky, Rafail; Skeith, William E. III 5 2007 Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan 41 2006 Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326Boneh, Dan; Sahai, Amit; Waters, Brent 25 2006 Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012Boneh, Dan; Boyen, Xavier; Halevi, Shai 20 2006 Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485Boneh, Dan; Shen, Emily; Waters, Brent 16 2006 Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402Barth, Adam; Boneh, Dan; Waters, Brent 12 2006 On the impossibility of efficiently combining collision resistant hash functions. Zbl 1138.94347Boneh, Dan; Boyen, Xavier 3 2006 Hierarchical identity based encryption with constant size ciphertext. Zbl 1137.94340Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin 119 2005 Evaluating 2-DNF formulas on ciphertexts. Zbl 1079.94534Boneh, Dan; Goh, Eu-Jin; Nissim, Kobbi 93 2005 Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434Boneh, Dan; Gentry, Craig; Waters, Brent 81 2005 Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. Zbl 1079.94535Boneh, Dan; Katz, Jonathan 21 2005 Oblivious signature-based envelope. Zbl 1264.94101Li, Ninghui; Du, Wenliang; Boneh, Dan 4 2005 Efficient selective-id secure identity-based encryption without random oracles. Zbl 1122.94355Boneh, Dan; Boyen, Xavier 184 2004 Short group signatures. Zbl 1104.94044Boneh, Dan; Boyen, Xavier; Shacham, Hovav 133 2004 Short signatures without random oracles. Zbl 1122.94354Boneh, Dan; Boyen, Xavier 101 2004 Public key encryption with keyword search. Zbl 1122.68424Boneh, Dan; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe 89 2004 Short signatures from the Weil pairing. Zbl 1070.94010Boneh, Dan; Lynn, Ben; Shacham, Hovav 78 2004 Secure identity based encryption without random oracles. Zbl 1104.94019Boneh, Dan; Boyen, Xavier 54 2004 Identity-based encryption from the Weil pairing. Zbl 1046.94008Boneh, Dan; Franklin, Matthew 182 2003 Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav 80 2003 Applications of multilinear forms to cryptography. Zbl 1030.94032Boneh, Dan; Silverberg, Alice 34 2003 A secure signature scheme from bilinear maps. Zbl 1039.94522Boneh, Dan; Mironov, Ilya; Shoup, Victor 8 2003 Oblivious signature-based envelope. Zbl 1321.94075Li, Ninghui; Du, Wenliang; Boneh, Dan 7 2003 Attacking an obfuscated cipher by injecting faults. Zbl 1327.94054Jacob, Matthias; Boneh, Dan; Felten, Edward 2 2003 Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Zbl 1027.00041Boneh, Dan (ed.) 2 2003 Finding smooth integers in short intervals using CRT decoding. Zbl 1052.68036Boneh, Dan 6 2002 Optimistic mixing for exit-polls. Zbl 1065.94548Golle, Philippe; Zhong, Sheng; Boneh, Dan; Jakobsson, Markus; Juels, Ari 3 2002 Identity-based encryption from the Weil pairing. Zbl 1002.94023Boneh, Dan; Franklin, Matt 373 2001 Short signatures from the Weil pairing. Zbl 1064.94554Boneh, Dan; Lynn, Ben; Shacham, Hovav 135 2001 On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J. 16 2001 The modular inversion hidden number problem. Zbl 1062.94545Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick 10 2001 Simplified OAEP for the RSA and Rabin functions. Zbl 1002.94526Boneh, Dan 9 2001 Efficient generation of shared RSA keys. Zbl 1127.94340Boneh, Dan; Franklin, Matthew 8 2001 On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme. Zbl 1002.94025Boneh, Dan; Shparlinski, Igor E. 8 2001 Improving SSL handshake performance via batching. Zbl 0972.68071Shacham, Hovav; Boneh, Dan 3 2001 Lower bounds for multicast message authentication. Zbl 0981.94037Boneh, Dan; Durfee, Glenn; Franklin, Matt 2 2001 Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 1001.94031Boneh, Dan; Durfee, Glenn 37 2000 Timed commitments. (Extended abstract). Zbl 0989.94517Boneh, Dan; Naor, Moni 14 2000 Finding smooth integers in short intervals using CRT decoding. Zbl 1296.94165Boneh, Dan 9 2000 Why textbook ElGamal and RSA encryption are insecure. (Extended abstract). Zbl 0980.94014Boneh, Dan; Joux, Antoine; Nguyen, Phong Q. 4 2000 Generating RSA keys on a handheld using an untrusted server. Zbl 0963.94020Boneh, Dan; Modadugu, Nagendra; Kim, Michael 1 2000 Twenty years of attacks on the RSA cryptosystem. Zbl 0914.94007Boneh, Dan 32 1999 Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 0948.94009Boneh, Dan; Durfee, Glenn 18 1999 An efficient public key traitor tracing scheme. (Extended abstract). Zbl 0972.94029Boneh, Dan; Franklin, Matthew 17 1999 Factoring \(N=p^rq\) for large \(r\). Zbl 1007.11077Boneh, Dan; Durfee, Glenn; Howgrave-Graham, Nick 11 1999 Making DNA computers error resistant. Zbl 0919.68031Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří 10 1999 Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Zbl 1003.94521Biham, Eli; Boneh, Dan; Reingold, Omer 8 1999 Running dynamic programming algorithms on a DNA computer. Zbl 0919.68041Baum, Eric B.; Boneh, Dan 1 1999 Collusion-secure fingerprinting for digital data. Zbl 0931.94051Boneh, Dan; Shaw, James 158 1998 The decision Diffie-Hellman problem. Zbl 1067.94523Boneh, Dan 50 1998 An attack on RSA given a small fraction of the private key bits. Zbl 0956.94007Boneh, Dan; Durfee, Glenn; Frankel, Yair 21 1998 Breaking RSA may not be equivalent to factoring. (Extended abstract). Zbl 0922.94008Boneh, Dan; Venkatesan, Ramarathnam 13 1998 Generating a product of three primes with an unknown factorization. Zbl 0916.11066Boneh, Dan; Horwitz, Jeremy 1 1998 Rounding in lattices and its cryptographic applications. Zbl 1321.94045Boneh, Dan; Venkatesan, Ramarathnam 12 1997 Efficient generation of shared RSA keys. (Extended abstract). Zbl 0882.94017Boneh, Dan; Franklin, Matthew 7 1997 Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. Zbl 1329.94054Boneh, Dan; Venkatesan, Ramarathnam 32 1996 Algorithms for black-box fields and their application to cryptography. Zbl 1329.94053Boneh, Dan; Lipton, Richard J. 20 1996 On the computational power of DNA. Zbl 0906.68071Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří 15 1996 Quantum cryptanalysis of hidden linear functions. (Extended abstract). Zbl 0876.94023Boneh, Dan; Lipton, Richard J. 18 1995 ...and 1 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 2,451 Authors 57 Susilo, Willy 50 Mu, Yi 28 Cao, Zhenfu 24 Guo, Fuchun 23 Waters, Brent 22 Shparlinski, Igor E. 21 Libert, Benoît 20 Hanaoka, Goichiro 19 Wang, Huaxiong 19 Yang, Guomin 18 Kiltz, Eike 18 Sahai, Amit 17 Hu, Yupu 16 Au, Man Ho 16 Boneh, Dan 16 Chen, Kefei 16 Wong, Duncan S. 15 Hofheinz, Dennis 15 Segev, Gil 15 Zhandry, Mark 15 Zhang, Fangguo 14 Li, Jin 14 Vaikuntanathan, Vinod 13 Chen, Xiaofeng 13 Emura, Keita 13 Kunihiro, Noboru 13 Liu, Shengli 13 Wu, Qianhong 12 Bitansky, Nir 12 Catalano, Dario 12 Huang, Qiong 12 Ling, San 12 Park, Jonghwan 12 Sarkar, Santanu 12 Wang, Baocang 12 Weng, Jian 12 Yang, Bo 12 Yung, Moti 11 Abdalla, Michel 11 Brakerski, Zvika 11 Chen, Jie 11 Deng, Robert Huijie 11 Dutta, Ratna 11 Herranz, Javier 11 Lee, Kwangsu 11 Venturi, Daniele 11 Zhang, Mingwu 10 Canetti, Ran 10 Galbraith, Steven D. 10 Jager, Tibor 10 Li, Fagen 10 Long, Yu 10 Menezes, Alfred J. 10 Seo, Jae Hong 10 Takagi, Tsuyoshi 10 Wee, Hoeteck 10 Yamada, Shota 9 Attrapadung, Nuttapong 9 Bellare, Mihir 9 Fiore, Dario 9 Galindo, David 9 Gu, Dawu 9 Huang, Xinyi 9 Lee, Donghoon 9 Lee, Hyangsook 9 Li, Jiguo 9 Lu, Rongxing 9 Ostrovsky, Rafail 9 Pass, Rafael 9 Takayasu, Atsushi 9 Wichs, Daniel 8 Chen, Rongmao 8 Cheon, Jung Hee 8 Domingo-Ferrer, Josep 8 Dong, Xiaolei 8 Fuchsbauer, Georg 8 Hazay, Carmit 8 Ishai, Yuval 8 Laguillaumie, Fabien 8 Lai, Jianchang 8 Liu, Joseph K. K. 8 Nitaj, Abderrahmane 8 Paterson, Kenneth G. 8 Peng, Liqiang 8 Pointcheval, David 8 Qin, Baodong 8 Ràfols, Carla 8 Smart, Nigel P. 8 Steinfeld, Ron 8 Vergnaud, Damien 8 Zhang, Zhenfeng 7 Abe, Masayuki 7 Chen, Yu 7 Cheng, Minquan 7 Choo, Kim-Kwang Raymond 7 Garg, Sanjam 7 Hohenberger, Susan 7 Jiang, Jing 7 Joye, Marc 7 Komargodski, Ilan ...and 2,351 more Authors all top 5 Cited in 118 Serials 134 Information Sciences 123 Designs, Codes and Cryptography 115 Journal of Cryptology 108 Theoretical Computer Science 45 Information Processing Letters 25 Applied Mathematics and Computation 23 Journal of Computer and System Sciences 23 Soft Computing 20 International Journal of Foundations of Computer Science 18 Wuhan University Journal of Natural Sciences (WUJNS) 17 Applicable Algebra in Engineering, Communication and Computing 14 Mathematics of Computation 14 Mathematical Problems in Engineering 14 Journal of Mathematical Cryptology 14 Advances in Mathematics of Communications 13 Discrete Applied Mathematics 13 Journal of Shanghai Jiaotong University (Science) 12 SIAM Journal on Computing 11 Science China. Information Sciences 11 Frontiers of Computer Science 10 International Journal of Computer Mathematics 10 Finite Fields and their Applications 9 Computers & Mathematics with Applications 9 Algorithmica 9 Information and Computation 9 Science in China. Series F 8 Mathematical and Computer Modelling 7 Quantum Information Processing 7 Cryptography and Communications 5 Problems of Information Transmission 5 Computing 5 Journal of Combinatorial Theory. Series A 5 Journal of Complexity 5 Cybernetics and Systems Analysis 5 Journal of Discrete Mathematical Sciences & Cryptography 5 LMS Journal of Computation and Mathematics 5 Journal of Systems Science and Complexity 5 Symmetry 5 JSIAM Letters 4 Journal of Symbolic Computation 4 Journal of Parallel and Distributed Computing 4 Journal of Applied Mathematics 4 Frontiers of Computer Science in China 3 Discrete Mathematics 3 Israel Journal of Mathematics 3 Journal of Number Theory 3 Journal of Automated Reasoning 3 SIAM Journal on Discrete Mathematics 3 Journal of Mathematical Sciences (New York) 3 Journal of Applied Mathematics and Computing 3 Arabian Journal for Science and Engineering 2 Acta Informatica 2 The Mathematical Intelligencer 2 International Journal of Mathematics and Mathematical Sciences 2 Journal of Computational and Applied Mathematics 2 Moscow University Computational Mathematics and Cybernetics 2 Acta Applicandae Mathematicae 2 Annals of Pure and Applied Logic 2 Journal of Computer Science and Technology 2 New Generation Computing 2 Applied Mathematics Letters 2 Japan Journal of Industrial and Applied Mathematics 2 Distributed Computing 2 Sādhanā 2 2 Journal of Discrete Algorithms 2 Mathematics in Computer Science 2 Discrete Mathematics, Algorithms and Applications 2 Groups, Complexity, Cryptology 2 RAIRO. Theoretical Informatics and Applications 2 Afrika Matematika 2 Computer Science Review 1 International Journal of Theoretical Physics 1 Journal of the Franklin Institute 1 Lithuanian Mathematical Journal 1 Physics Letters. A 1 Rocky Mountain Journal of Mathematics 1 Journal of Algebra 1 Journal of Statistical Planning and Inference 1 Cryptologia 1 Advances in Applied Mathematics 1 Journal of Information & Optimization Sciences 1 International Journal of Approximate Reasoning 1 Random Structures & Algorithms 1 Elemente der Mathematik 1 Pattern Recognition 1 Bulletin of the American Mathematical Society. New Series 1 Computational Complexity 1 Tatra Mountains Mathematical Publications 1 St. Petersburg Mathematical Journal 1 Annales Mathématiques Blaise Pascal 1 Journal of the Egyptian Mathematical Society 1 Selecta Mathematica. New Series 1 Arab Journal of Mathematical Sciences 1 Science in China. Series E 1 Theory of Computing Systems 1 Nonlinear Dynamics 1 Journal of Combinatorial Optimization 1 Chicago Journal of Theoretical Computer Science 1 Interdisciplinary Information Sciences (IIS) ...and 18 more Serials all top 5 Cited in 27 Fields 1,392 Information and communication theory, circuits (94-XX) 538 Computer science (68-XX) 173 Number theory (11-XX) 109 Algebraic geometry (14-XX) 39 Quantum theory (81-XX) 38 Combinatorics (05-XX) 21 Operations research, mathematical programming (90-XX) 19 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 16 Numerical analysis (65-XX) 10 Field theory and polynomials (12-XX) 9 Biology and other natural sciences (92-XX) 7 Group theory and generalizations (20-XX) 7 Probability theory and stochastic processes (60-XX) 6 Mathematical logic and foundations (03-XX) 4 Commutative algebra (13-XX) 4 Linear and multilinear algebra; matrix theory (15-XX) 3 Associative rings and algebras (16-XX) 2 Abstract harmonic analysis (43-XX) 1 General and overarching topics; collections (00-XX) 1 History and biography (01-XX) 1 General algebraic systems (08-XX) 1 Real functions (26-XX) 1 Functions of a complex variable (30-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Statistics (62-XX) 1 Statistical mechanics, structure of matter (82-XX) 1 Mathematics education (97-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.