×

zbMATH — the first resource for mathematics

Boneh, Dan

Compute Distance To:
Author ID: boneh.dan Recent zbMATH articles by "Boneh, Dan"
Published as: Boneh, D.; Boneh, Dan
External Links: MGP · Wikidata · dblp
Documents Indexed: 117 Publications since 1995, including 1 Book
all top 5

Co-Authors

8 single-authored
12 Boyen, Xavier
12 Waters, Brent
8 Sahai, Amit
8 Zhandry, Mark
6 Franklin, Matthew K.
6 Halevi, Shai
6 Wu, David J.
5 Durfee, Glenn
5 Lipton, Richard J.
5 Segev, Gil
5 Shacham, Hovav
4 Freeman, David Mandell
4 Gentry, Craig
4 Ishai, Yuval
4 Raghunathan, Ananth
3 Agrawal, Shweta
3 Bünz, Benedikt
3 Corrigan-Gibbs, Henry
3 Fisch, Ben A.
3 Goh, Eu-Jin
3 Katz, Jonathan N.
3 Lewi, Kevin
3 Lynn, Ben
3 Mironov, Ilya
3 Ostrovsky, Rafail
3 Silverberg, Alice
3 Venkatesan, Ramarathnam
2 Ahn, Jaehyun
2 Camenisch, Jan L.
2 Daswani, Neil
2 Du, Wenliang
2 Dunworth, Christopher
2 Gennaro, Rosario
2 Goldfeder, Steven
2 Golle, Philippe
2 Hamburg, Michael
2 Hohenberger, Susan
2 Howgrave-Graham, Nick A.
2 Kim, Sam Myo
2 Li, Ninghui
2 Montgomery, Hart
2 Sgall, Jiří
2 Shaw, James R.
2 Shelat, Abhi
1 Abadi, Martín
1 Agrawal, Shashank
1 Barth, Adam
1 Baum, Eric B.
1 Biham, Eli
1 Bonneau, Joseph
1 Boyle, Elette
1 Canetti, Ran
1 Dagdelen, Özgür
1 DeMillo, Richard A.
1 Di Crescenzo, Giovanni
1 Drijvers, Manu
1 Eskandarian, Saba
1 Felten, Edward W.
1 Fischlin, Marc
1 Frankel, Yair
1 Fu, Kevin
1 Gilboa, Niv
1 Glass, Darren B.
1 Gorbunov, Sergeĭ Vladimirovich
1 Gueron, Shay
1 Gupta, Divya
1 Horwitz, Jeremy
1 Jacob, Matthias
1 Jain, Aayush
1 Jakobsson, Markus
1 Jeffrey, Christopher
1 Joux, Antoine
1 Juels, Ari
1 Kim, Michael B.
1 Kim, Sam-Tae
1 Krashen, Daniel
1 Kushilevitz, Eyal
1 Lauter, Kristin Estella
1 Lehmann, Anja
1 Love, Jonathan
1 Modadugu, Nagendra
1 Naor, Moni
1 Neven, Gregory
1 Nguyen, Phong Q.
1 Nikolaenko, Valeria
1 Nissim, Kobbi
1 Passelègue, Alain
1 Persiano, Giuseppe
1 Pinkas, Benny
1 Poon, Joseph
1 Rasmussen, Peter Michael Reichstein
1 Raykova, Mariana
1 Reingold, Omer
1 Rubin, Aviel D.
1 Rubin, Karl Cooper
1 Schaffner, Christian
1 Schechter, Stuart
1 Sharif, Shahed
1 Shen, Emily S.
1 Shoup, Victor
...and 10 more Co-Authors

Publications by Year

Citations contained in zbMATH

101 Publications have been cited 3,242 times in 1,622 Documents Cited by Year
Identity-based encryption from the Weil pairing. Zbl 1002.94023
Boneh, Dan; Franklin, Matt
373
2001
Efficient selective-id secure identity-based encryption without random oracles. Zbl 1122.94355
Boneh, Dan; Boyen, Xavier
184
2004
Identity-based encryption from the Weil pairing. Zbl 1046.94008
Boneh, Dan; Franklin, Matthew
182
2003
Collusion-secure fingerprinting for digital data. Zbl 0931.94051
Boneh, Dan; Shaw, James
158
1998
Short signatures from the Weil pairing. Zbl 1064.94554
Boneh, Dan; Lynn, Ben; Shacham, Hovav
135
2001
Short group signatures. Zbl 1104.94044
Boneh, Dan; Boyen, Xavier; Shacham, Hovav
133
2004
Hierarchical identity based encryption with constant size ciphertext. Zbl 1137.94340
Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin
119
2005
Short signatures without random oracles. Zbl 1122.94354
Boneh, Dan; Boyen, Xavier
101
2004
Evaluating 2-DNF formulas on ciphertexts. Zbl 1079.94534
Boneh, Dan; Goh, Eu-Jin; Nissim, Kobbi
93
2005
Public key encryption with keyword search. Zbl 1122.68424
Boneh, Dan; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe
89
2004
Functional encryption: definitions and challenges. Zbl 1295.94027
Boneh, Dan; Sahai, Amit; Waters, Brent
87
2011
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
81
2005
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
80
2003
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav
78
2004
Efficient lattice (H)IBE in the standard model. Zbl 1227.94022
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier
66
2010
Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335
Boneh, Dan; Waters, Brent
64
2007
Secure identity based encryption without random oracles. Zbl 1104.94019
Boneh, Dan; Boyen, Xavier
54
2004
The decision Diffie-Hellman problem. Zbl 1067.94523
Boneh, Dan
50
1998
Constrained pseudorandom functions and their applications. Zbl 1314.94057
Boneh, Dan; Waters, Brent
47
2013
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier
46
2008
Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail
44
2008
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
41
2006
Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 1001.94031
Boneh, Dan; Durfee, Glenn
37
2000
Applications of multilinear forms to cryptography. Zbl 1030.94032
Boneh, Dan; Silverberg, Alice
34
2003
Twenty years of attacks on the RSA cryptosystem. Zbl 0914.94007
Boneh, Dan
32
1999
Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. Zbl 1329.94054
Boneh, Dan; Venkatesan, Ramarathnam
32
1996
Generalized identity based and broadcast encryption schemes. Zbl 1206.94054
Boneh, Dan; Hamburg, Michael
29
2008
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1310.94130
Boneh, Dan; Zhandry, Mark
28
2014
Homomorphic signatures for polynomial functions. Zbl 1281.94072
Boneh, Dan; Freeman, David Mandell
26
2011
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Zbl 1280.94035
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier
25
2010
Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326
Boneh, Dan; Sahai, Amit; Waters, Brent
25
2006
Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent
24
2009
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. Zbl 1291.94181
Boneh, Dan; Freeman, David Mandell
22
2011
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. Zbl 1375.94105
Boneh, Dan; Lewi, Kevin; Raykova, Mariana; Sahai, Amit; Zhandry, Mark; Zimmerman, Joe
21
2015
Function-private identity-based encryption: hiding the function in functional encryption. Zbl 1311.94071
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
21
2013
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. Zbl 1079.94535
Boneh, Dan; Katz, Jonathan
21
2005
An attack on RSA given a small fraction of the private key bits. Zbl 0956.94007
Boneh, Dan; Durfee, Glenn; Frankel, Yair
21
1998
Key homomorphic PRFs and their applications. Zbl 1310.94129
Boneh, Dan; Lewi, Kevin; Montgomery, Hart; Raghunathan, Ananth
20
2013
Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012
Boneh, Dan; Boyen, Xavier; Halevi, Shai
20
2006
Algorithms for black-box fields and their application to cryptography. Zbl 1329.94053
Boneh, Dan; Lipton, Richard J.
20
1996
Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 0948.94009
Boneh, Dan; Durfee, Glenn
18
1999
Quantum cryptanalysis of hidden linear functions. (Extended abstract). Zbl 0876.94023
Boneh, Dan; Lipton, Richard J.
18
1995
An efficient public key traitor tracing scheme. (Extended abstract). Zbl 0972.94029
Boneh, Dan; Franklin, Matthew
17
1999
Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485
Boneh, Dan; Shen, Emily; Waters, Brent
16
2006
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J.
16
2001
Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087
Boneh, Dan; Waters, Brent; Zhandry, Mark
15
2014
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier
15
2011
On the computational power of DNA. Zbl 0906.68071
Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří
15
1996
Computing on authenticated data. Zbl 1292.94017
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
14
2012
Timed commitments. (Extended abstract). Zbl 0989.94517
Boneh, Dan; Naor, Moni
14
2000
Collusion-secure fingerprinting for digital data. (Extended abstract). Zbl 0876.94024
Boneh, Dan; Shaw, James
14
1995
Breaking RSA may not be equivalent to factoring. (Extended abstract). Zbl 0922.94008
Boneh, Dan; Venkatesan, Ramarathnam
13
1998
Secure signatures and chosen ciphertext security in a quantum computing world. Zbl 1317.81074
Boneh, Dan; Zhandry, Mark
12
2013
Random oracles in a quantum world. Zbl 1227.94033
Boneh, Dan; Dagdelen, Özgür; Fischlin, Marc; Lehmann, Anja; Schaffner, Christian; Zhandry, Mark
12
2011
Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402
Barth, Adam; Boneh, Dan; Waters, Brent
12
2006
Rounding in lattices and its cryptographic applications. Zbl 1321.94045
Boneh, Dan; Venkatesan, Ramarathnam
12
1997
Factoring \(N=p^rq\) for large \(r\). Zbl 1007.11077
Boneh, Dan; Durfee, Glenn; Howgrave-Graham, Nick
11
1999
The modular inversion hidden number problem. Zbl 1062.94545
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick
10
2001
Making DNA computers error resistant. Zbl 0919.68031
Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří
10
1999
Function-private subspace-membership encryption and its applications. Zbl 1327.94036
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
9
2013
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
9
2012
Simplified OAEP for the RSA and Rabin functions. Zbl 1002.94526
Boneh, Dan
9
2001
Finding smooth integers in short intervals using CRT decoding. Zbl 1296.94165
Boneh, Dan
9
2000
Finding composite order ordinary elliptic curves using the Cocks-Pinch method. Zbl 1217.11061
Boneh, D.; Rubin, K.; Silverberg, A.
8
2011
A secure signature scheme from bilinear maps. Zbl 1039.94522
Boneh, Dan; Mironov, Ilya; Shoup, Victor
8
2003
Efficient generation of shared RSA keys. Zbl 1127.94340
Boneh, Dan; Franklin, Matthew
8
2001
On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme. Zbl 1002.94025
Boneh, Dan; Shparlinski, Igor E.
8
2001
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Zbl 1003.94521
Biham, Eli; Boneh, Dan; Reingold, Omer
8
1999
Constraining pseudorandom functions privately. Zbl 1400.94124
Boneh, Dan; Lewi, Kevin; Wu, David J.
7
2017
Quantum-secure message authentication codes. Zbl 1312.94111
Boneh, Dan; Zhandry, Mark
7
2013
Oblivious signature-based envelope. Zbl 1321.94075
Li, Ninghui; Du, Wenliang; Boneh, Dan
7
2003
Efficient generation of shared RSA keys. (Extended abstract). Zbl 0882.94017
Boneh, Dan; Franklin, Matthew
7
1997
Finding smooth integers in short intervals using CRT decoding. Zbl 1052.68036
Boneh, Dan
6
2002
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Public key encryption that allows PIR queries. Zbl 1215.68096
Boneh, Dan; Kushilevitz, Eyal; Ostrovsky, Rafail; Skeith, William E. III
5
2007
Private puncturable PRFs from standard lattice assumptions. Zbl 1410.94049
Boneh, Dan; Kim, Sam; Montgomery, Hart
4
2017
Bivariate polynomials modulo composites and their applications. Zbl 1306.94032
Boneh, Dan; Corrigan-Gibbs, Henry
4
2014
Message-locked encryption for lock-dependent messages. Zbl 1310.94120
Abadi, Martín; Boneh, Dan; Mironov, Ilya; Raghunathan, Ananth; Segev, Gil
4
2013
Oblivious signature-based envelope. Zbl 1264.94101
Li, Ninghui; Du, Wenliang; Boneh, Dan
4
2005
Why textbook ElGamal and RSA encryption are insecure. (Extended abstract). Zbl 0980.94014
Boneh, Dan; Joux, Antoine; Nguyen, Phong Q.
4
2000
Preventing pollution attacks in multi-source network coding. Zbl 1279.94050
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier; Freeman, David Mandell
3
2010
On the impossibility of efficiently combining collision resistant hash functions. Zbl 1138.94347
Boneh, Dan; Boyen, Xavier
3
2006
Optimistic mixing for exit-polls. Zbl 1065.94548
Golle, Philippe; Zhong, Sheng; Boneh, Dan; Jakobsson, Markus; Juels, Ari
3
2002
Improving SSL handshake performance via batching. Zbl 0972.68071
Shacham, Hovav; Boneh, Dan
3
2001
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1405.94045
Boneh, Dan; Zhandry, Mark
2
2017
Lattice-based SNARGs and their application to more efficient obfuscation. Zbl 1415.94412
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J.
2
2017
Attacking an obfuscated cipher by injecting faults. Zbl 1327.94054
Jacob, Matthias; Boneh, Dan; Felten, Edward
2
2003
Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Zbl 1027.00041
Boneh, Dan (ed.)
2
2003
Lower bounds for multicast message authentication. Zbl 0981.94037
Boneh, Dan; Durfee, Glenn; Franklin, Matt
2
2001
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
1
2020
Batching techniques for accumulators with applications to IOPs and stateless blockchains. Zbl 07202398
Boneh, Dan; Bünz, Benedikt; Fisch, Ben
1
2019
Compact multi-signatures for smaller blockchains. Zbl 1446.94105
Boneh, Dan; Drijvers, Manu; Neven, Gregory
1
2018
Verifiable delay functions. Zbl 1444.94046
Boneh, Dan; Bonneau, Joseph; Bünz, Benedikt; Fisch, Ben
1
2018
Surnaming schemes, fast verification, and applications to SGX technology. Zbl 1383.94013
Boneh, Dan; Gueron, Shay
1
2017
Balloon hashing: a memory-hard function providing provable protection against sequential attacks. Zbl 1404.94043
Boneh, Dan; Corrigan-Gibbs, Henry; Schechter, Stuart
1
2016
Hosting services on an untrusted cloud. Zbl 1371.94626
Boneh, Dan; Gupta, Divya; Mironov, Ilya; Sahai, Amit
1
2015
Computing on authenticated data. Zbl 1314.94100
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
1
2015
Generating RSA keys on a handheld using an untrusted server. Zbl 0963.94020
Boneh, Dan; Modadugu, Nagendra; Kim, Michael
1
2000
Running dynamic programming algorithms on a DNA computer. Zbl 0919.68041
Baum, Eric B.; Boneh, Dan
1
1999
Multiparty non-interactive key exchange and more from isogenies on elliptic curves. Zbl 1445.14043
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark
1
2020
Batching techniques for accumulators with applications to IOPs and stateless blockchains. Zbl 07202398
Boneh, Dan; Bünz, Benedikt; Fisch, Ben
1
2019
Compact multi-signatures for smaller blockchains. Zbl 1446.94105
Boneh, Dan; Drijvers, Manu; Neven, Gregory
1
2018
Verifiable delay functions. Zbl 1444.94046
Boneh, Dan; Bonneau, Joseph; Bünz, Benedikt; Fisch, Ben
1
2018
Constraining pseudorandom functions privately. Zbl 1400.94124
Boneh, Dan; Lewi, Kevin; Wu, David J.
7
2017
Private puncturable PRFs from standard lattice assumptions. Zbl 1410.94049
Boneh, Dan; Kim, Sam; Montgomery, Hart
4
2017
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1405.94045
Boneh, Dan; Zhandry, Mark
2
2017
Lattice-based SNARGs and their application to more efficient obfuscation. Zbl 1415.94412
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J.
2
2017
Surnaming schemes, fast verification, and applications to SGX technology. Zbl 1383.94013
Boneh, Dan; Gueron, Shay
1
2017
Balloon hashing: a memory-hard function providing provable protection against sequential attacks. Zbl 1404.94043
Boneh, Dan; Corrigan-Gibbs, Henry; Schechter, Stuart
1
2016
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. Zbl 1375.94105
Boneh, Dan; Lewi, Kevin; Raykova, Mariana; Sahai, Amit; Zhandry, Mark; Zimmerman, Joe
21
2015
Hosting services on an untrusted cloud. Zbl 1371.94626
Boneh, Dan; Gupta, Divya; Mironov, Ilya; Sahai, Amit
1
2015
Computing on authenticated data. Zbl 1314.94100
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
1
2015
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Zbl 1310.94130
Boneh, Dan; Zhandry, Mark
28
2014
Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087
Boneh, Dan; Waters, Brent; Zhandry, Mark
15
2014
Bivariate polynomials modulo composites and their applications. Zbl 1306.94032
Boneh, Dan; Corrigan-Gibbs, Henry
4
2014
Constrained pseudorandom functions and their applications. Zbl 1314.94057
Boneh, Dan; Waters, Brent
47
2013
Function-private identity-based encryption: hiding the function in functional encryption. Zbl 1311.94071
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
21
2013
Key homomorphic PRFs and their applications. Zbl 1310.94129
Boneh, Dan; Lewi, Kevin; Montgomery, Hart; Raghunathan, Ananth
20
2013
Secure signatures and chosen ciphertext security in a quantum computing world. Zbl 1317.81074
Boneh, Dan; Zhandry, Mark
12
2013
Function-private subspace-membership encryption and its applications. Zbl 1327.94036
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
9
2013
Quantum-secure message authentication codes. Zbl 1312.94111
Boneh, Dan; Zhandry, Mark
7
2013
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Message-locked encryption for lock-dependent messages. Zbl 1310.94120
Abadi, Martín; Boneh, Dan; Mironov, Ilya; Raghunathan, Ananth; Segev, Gil
4
2013
Computing on authenticated data. Zbl 1292.94017
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
14
2012
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
9
2012
Functional encryption: definitions and challenges. Zbl 1295.94027
Boneh, Dan; Sahai, Amit; Waters, Brent
87
2011
Homomorphic signatures for polynomial functions. Zbl 1281.94072
Boneh, Dan; Freeman, David Mandell
26
2011
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. Zbl 1291.94181
Boneh, Dan; Freeman, David Mandell
22
2011
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier
15
2011
Random oracles in a quantum world. Zbl 1227.94033
Boneh, Dan; Dagdelen, Özgür; Fischlin, Marc; Lehmann, Anja; Schaffner, Christian; Zhandry, Mark
12
2011
Finding composite order ordinary elliptic curves using the Cocks-Pinch method. Zbl 1217.11061
Boneh, D.; Rubin, K.; Silverberg, A.
8
2011
Efficient lattice (H)IBE in the standard model. Zbl 1227.94022
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier
66
2010
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Zbl 1280.94035
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier
25
2010
Preventing pollution attacks in multi-source network coding. Zbl 1279.94050
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier; Freeman, David Mandell
3
2010
Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent
24
2009
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier
46
2008
Circular-secure encryption from decision Diffie-Hellman. Zbl 1183.94025
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail
44
2008
Generalized identity based and broadcast encryption schemes. Zbl 1206.94054
Boneh, Dan; Hamburg, Michael
29
2008
Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335
Boneh, Dan; Waters, Brent
64
2007
Public key encryption that allows PIR queries. Zbl 1215.68096
Boneh, Dan; Kushilevitz, Eyal; Ostrovsky, Rafail; Skeith, William E. III
5
2007
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
41
2006
Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326
Boneh, Dan; Sahai, Amit; Waters, Brent
25
2006
Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012
Boneh, Dan; Boyen, Xavier; Halevi, Shai
20
2006
Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485
Boneh, Dan; Shen, Emily; Waters, Brent
16
2006
Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402
Barth, Adam; Boneh, Dan; Waters, Brent
12
2006
On the impossibility of efficiently combining collision resistant hash functions. Zbl 1138.94347
Boneh, Dan; Boyen, Xavier
3
2006
Hierarchical identity based encryption with constant size ciphertext. Zbl 1137.94340
Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin
119
2005
Evaluating 2-DNF formulas on ciphertexts. Zbl 1079.94534
Boneh, Dan; Goh, Eu-Jin; Nissim, Kobbi
93
2005
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
81
2005
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. Zbl 1079.94535
Boneh, Dan; Katz, Jonathan
21
2005
Oblivious signature-based envelope. Zbl 1264.94101
Li, Ninghui; Du, Wenliang; Boneh, Dan
4
2005
Efficient selective-id secure identity-based encryption without random oracles. Zbl 1122.94355
Boneh, Dan; Boyen, Xavier
184
2004
Short group signatures. Zbl 1104.94044
Boneh, Dan; Boyen, Xavier; Shacham, Hovav
133
2004
Short signatures without random oracles. Zbl 1122.94354
Boneh, Dan; Boyen, Xavier
101
2004
Public key encryption with keyword search. Zbl 1122.68424
Boneh, Dan; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe
89
2004
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav
78
2004
Secure identity based encryption without random oracles. Zbl 1104.94019
Boneh, Dan; Boyen, Xavier
54
2004
Identity-based encryption from the Weil pairing. Zbl 1046.94008
Boneh, Dan; Franklin, Matthew
182
2003
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
80
2003
Applications of multilinear forms to cryptography. Zbl 1030.94032
Boneh, Dan; Silverberg, Alice
34
2003
A secure signature scheme from bilinear maps. Zbl 1039.94522
Boneh, Dan; Mironov, Ilya; Shoup, Victor
8
2003
Oblivious signature-based envelope. Zbl 1321.94075
Li, Ninghui; Du, Wenliang; Boneh, Dan
7
2003
Attacking an obfuscated cipher by injecting faults. Zbl 1327.94054
Jacob, Matthias; Boneh, Dan; Felten, Edward
2
2003
Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Zbl 1027.00041
Boneh, Dan (ed.)
2
2003
Finding smooth integers in short intervals using CRT decoding. Zbl 1052.68036
Boneh, Dan
6
2002
Optimistic mixing for exit-polls. Zbl 1065.94548
Golle, Philippe; Zhong, Sheng; Boneh, Dan; Jakobsson, Markus; Juels, Ari
3
2002
Identity-based encryption from the Weil pairing. Zbl 1002.94023
Boneh, Dan; Franklin, Matt
373
2001
Short signatures from the Weil pairing. Zbl 1064.94554
Boneh, Dan; Lynn, Ben; Shacham, Hovav
135
2001
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J.
16
2001
The modular inversion hidden number problem. Zbl 1062.94545
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick
10
2001
Simplified OAEP for the RSA and Rabin functions. Zbl 1002.94526
Boneh, Dan
9
2001
Efficient generation of shared RSA keys. Zbl 1127.94340
Boneh, Dan; Franklin, Matthew
8
2001
On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme. Zbl 1002.94025
Boneh, Dan; Shparlinski, Igor E.
8
2001
Improving SSL handshake performance via batching. Zbl 0972.68071
Shacham, Hovav; Boneh, Dan
3
2001
Lower bounds for multicast message authentication. Zbl 0981.94037
Boneh, Dan; Durfee, Glenn; Franklin, Matt
2
2001
Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 1001.94031
Boneh, Dan; Durfee, Glenn
37
2000
Timed commitments. (Extended abstract). Zbl 0989.94517
Boneh, Dan; Naor, Moni
14
2000
Finding smooth integers in short intervals using CRT decoding. Zbl 1296.94165
Boneh, Dan
9
2000
Why textbook ElGamal and RSA encryption are insecure. (Extended abstract). Zbl 0980.94014
Boneh, Dan; Joux, Antoine; Nguyen, Phong Q.
4
2000
Generating RSA keys on a handheld using an untrusted server. Zbl 0963.94020
Boneh, Dan; Modadugu, Nagendra; Kim, Michael
1
2000
Twenty years of attacks on the RSA cryptosystem. Zbl 0914.94007
Boneh, Dan
32
1999
Cryptanalysis of RSA with private key \(d\) less than \(N^{0. 292}\). Zbl 0948.94009
Boneh, Dan; Durfee, Glenn
18
1999
An efficient public key traitor tracing scheme. (Extended abstract). Zbl 0972.94029
Boneh, Dan; Franklin, Matthew
17
1999
Factoring \(N=p^rq\) for large \(r\). Zbl 1007.11077
Boneh, Dan; Durfee, Glenn; Howgrave-Graham, Nick
11
1999
Making DNA computers error resistant. Zbl 0919.68031
Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří
10
1999
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Zbl 1003.94521
Biham, Eli; Boneh, Dan; Reingold, Omer
8
1999
Running dynamic programming algorithms on a DNA computer. Zbl 0919.68041
Baum, Eric B.; Boneh, Dan
1
1999
Collusion-secure fingerprinting for digital data. Zbl 0931.94051
Boneh, Dan; Shaw, James
158
1998
The decision Diffie-Hellman problem. Zbl 1067.94523
Boneh, Dan
50
1998
An attack on RSA given a small fraction of the private key bits. Zbl 0956.94007
Boneh, Dan; Durfee, Glenn; Frankel, Yair
21
1998
Breaking RSA may not be equivalent to factoring. (Extended abstract). Zbl 0922.94008
Boneh, Dan; Venkatesan, Ramarathnam
13
1998
Generating a product of three primes with an unknown factorization. Zbl 0916.11066
Boneh, Dan; Horwitz, Jeremy
1
1998
Rounding in lattices and its cryptographic applications. Zbl 1321.94045
Boneh, Dan; Venkatesan, Ramarathnam
12
1997
Efficient generation of shared RSA keys. (Extended abstract). Zbl 0882.94017
Boneh, Dan; Franklin, Matthew
7
1997
Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. Zbl 1329.94054
Boneh, Dan; Venkatesan, Ramarathnam
32
1996
Algorithms for black-box fields and their application to cryptography. Zbl 1329.94053
Boneh, Dan; Lipton, Richard J.
20
1996
On the computational power of DNA. Zbl 0906.68071
Boneh, Dan; Dunworth, Christopher; Lipton, Richard J.; Sgall, Jiří
15
1996
Quantum cryptanalysis of hidden linear functions. (Extended abstract). Zbl 0876.94023
Boneh, Dan; Lipton, Richard J.
18
1995
...and 1 more Documents
all top 5

Cited by 2,451 Authors

57 Susilo, Willy
50 Mu, Yi
28 Cao, Zhenfu
24 Guo, Fuchun
23 Waters, Brent
22 Shparlinski, Igor E.
21 Libert, Benoît
20 Hanaoka, Goichiro
19 Wang, Huaxiong
19 Yang, Guomin
18 Kiltz, Eike
18 Sahai, Amit
17 Hu, Yupu
16 Au, Man Ho
16 Boneh, Dan
16 Chen, Kefei
16 Wong, Duncan S.
15 Hofheinz, Dennis
15 Segev, Gil
15 Zhandry, Mark
15 Zhang, Fangguo
14 Li, Jin
14 Vaikuntanathan, Vinod
13 Chen, Xiaofeng
13 Emura, Keita
13 Kunihiro, Noboru
13 Liu, Shengli
13 Wu, Qianhong
12 Bitansky, Nir
12 Catalano, Dario
12 Huang, Qiong
12 Ling, San
12 Park, Jonghwan
12 Sarkar, Santanu
12 Wang, Baocang
12 Weng, Jian
12 Yang, Bo
12 Yung, Moti
11 Abdalla, Michel
11 Brakerski, Zvika
11 Chen, Jie
11 Deng, Robert Huijie
11 Dutta, Ratna
11 Herranz, Javier
11 Lee, Kwangsu
11 Venturi, Daniele
11 Zhang, Mingwu
10 Canetti, Ran
10 Galbraith, Steven D.
10 Jager, Tibor
10 Li, Fagen
10 Long, Yu
10 Menezes, Alfred J.
10 Seo, Jae Hong
10 Takagi, Tsuyoshi
10 Wee, Hoeteck
10 Yamada, Shota
9 Attrapadung, Nuttapong
9 Bellare, Mihir
9 Fiore, Dario
9 Galindo, David
9 Gu, Dawu
9 Huang, Xinyi
9 Lee, Donghoon
9 Lee, Hyangsook
9 Li, Jiguo
9 Lu, Rongxing
9 Ostrovsky, Rafail
9 Pass, Rafael
9 Takayasu, Atsushi
9 Wichs, Daniel
8 Chen, Rongmao
8 Cheon, Jung Hee
8 Domingo-Ferrer, Josep
8 Dong, Xiaolei
8 Fuchsbauer, Georg
8 Hazay, Carmit
8 Ishai, Yuval
8 Laguillaumie, Fabien
8 Lai, Jianchang
8 Liu, Joseph K. K.
8 Nitaj, Abderrahmane
8 Paterson, Kenneth G.
8 Peng, Liqiang
8 Pointcheval, David
8 Qin, Baodong
8 Ràfols, Carla
8 Smart, Nigel P.
8 Steinfeld, Ron
8 Vergnaud, Damien
8 Zhang, Zhenfeng
7 Abe, Masayuki
7 Chen, Yu
7 Cheng, Minquan
7 Choo, Kim-Kwang Raymond
7 Garg, Sanjam
7 Hohenberger, Susan
7 Jiang, Jing
7 Joye, Marc
7 Komargodski, Ilan
...and 2,351 more Authors
all top 5

Cited in 118 Serials

134 Information Sciences
123 Designs, Codes and Cryptography
115 Journal of Cryptology
108 Theoretical Computer Science
45 Information Processing Letters
25 Applied Mathematics and Computation
23 Journal of Computer and System Sciences
23 Soft Computing
20 International Journal of Foundations of Computer Science
18 Wuhan University Journal of Natural Sciences (WUJNS)
17 Applicable Algebra in Engineering, Communication and Computing
14 Mathematics of Computation
14 Mathematical Problems in Engineering
14 Journal of Mathematical Cryptology
14 Advances in Mathematics of Communications
13 Discrete Applied Mathematics
13 Journal of Shanghai Jiaotong University (Science)
12 SIAM Journal on Computing
11 Science China. Information Sciences
11 Frontiers of Computer Science
10 International Journal of Computer Mathematics
10 Finite Fields and their Applications
9 Computers & Mathematics with Applications
9 Algorithmica
9 Information and Computation
9 Science in China. Series F
8 Mathematical and Computer Modelling
7 Quantum Information Processing
7 Cryptography and Communications
5 Problems of Information Transmission
5 Computing
5 Journal of Combinatorial Theory. Series A
5 Journal of Complexity
5 Cybernetics and Systems Analysis
5 Journal of Discrete Mathematical Sciences & Cryptography
5 LMS Journal of Computation and Mathematics
5 Journal of Systems Science and Complexity
5 Symmetry
5 JSIAM Letters
4 Journal of Symbolic Computation
4 Journal of Parallel and Distributed Computing
4 Journal of Applied Mathematics
4 Frontiers of Computer Science in China
3 Discrete Mathematics
3 Israel Journal of Mathematics
3 Journal of Number Theory
3 Journal of Automated Reasoning
3 SIAM Journal on Discrete Mathematics
3 Journal of Mathematical Sciences (New York)
3 Journal of Applied Mathematics and Computing
3 Arabian Journal for Science and Engineering
2 Acta Informatica
2 The Mathematical Intelligencer
2 International Journal of Mathematics and Mathematical Sciences
2 Journal of Computational and Applied Mathematics
2 Moscow University Computational Mathematics and Cybernetics
2 Acta Applicandae Mathematicae
2 Annals of Pure and Applied Logic
2 Journal of Computer Science and Technology
2 New Generation Computing
2 Applied Mathematics Letters
2 Japan Journal of Industrial and Applied Mathematics
2 Distributed Computing
2 Sādhanā
2
2 Journal of Discrete Algorithms
2 Mathematics in Computer Science
2 Discrete Mathematics, Algorithms and Applications
2 Groups, Complexity, Cryptology
2 RAIRO. Theoretical Informatics and Applications
2 Afrika Matematika
2 Computer Science Review
1 International Journal of Theoretical Physics
1 Journal of the Franklin Institute
1 Lithuanian Mathematical Journal
1 Physics Letters. A
1 Rocky Mountain Journal of Mathematics
1 Journal of Algebra
1 Journal of Statistical Planning and Inference
1 Cryptologia
1 Advances in Applied Mathematics
1 Journal of Information & Optimization Sciences
1 International Journal of Approximate Reasoning
1 Random Structures & Algorithms
1 Elemente der Mathematik
1 Pattern Recognition
1 Bulletin of the American Mathematical Society. New Series
1 Computational Complexity
1 Tatra Mountains Mathematical Publications
1 St. Petersburg Mathematical Journal
1 Annales Mathématiques Blaise Pascal
1 Journal of the Egyptian Mathematical Society
1 Selecta Mathematica. New Series
1 Arab Journal of Mathematical Sciences
1 Science in China. Series E
1 Theory of Computing Systems
1 Nonlinear Dynamics
1 Journal of Combinatorial Optimization
1 Chicago Journal of Theoretical Computer Science
1 Interdisciplinary Information Sciences (IIS)
...and 18 more Serials

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.