Dan Boneh

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Mangrove: a scalable framework for folding-based SNARKs
 
2025-01-10Paper
Traceable secret sharing: strong security and efficient constructions
 
2024-12-13Paper
Accountability for misbehavior in threshold decryption via threshold traitor tracing
 
2024-12-13Paper
Cryptoeconomic security for data availability committees
 
2024-07-17Paper
Arithmetic sketching
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
A lower bound on the length of signatures based on group actions and generic isogenies
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
HyperPlonk: Plonk with linear-time prover and high-degree custom gates
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Threshold signatures with private accountability
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Oblivious pseudorandom functions from isogenies
 
2023-03-21Paper
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
 
2022-07-01Paper
\textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments
 
2022-03-31Paper
Supersingular curves with small noninteger endomorphisms
Open Book Series
2021-03-11Paper
Zether: towards privacy in a smart contract world
 
2021-02-08Paper
An airdrop that preserves recipient privacy
 
2021-02-08Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves
Journal of Mathematical Cryptology
2020-06-24Paper
Batching techniques for accumulators with applications to IOPs and stateless blockchains
 
2020-05-20Paper
Zero-knowledge proofs on secret-shared data via fully linear PCPs
 
2020-03-09Paper
Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security
 
2020-03-02Paper
Post-quantum EPID signatures from symmetric primitives
 
2020-01-28Paper
Compact multi-signatures for smaller blockchains
 
2019-01-23Paper
Exploring crypto dark matter: new simple PRF candidates and their applications
 
2018-12-06Paper
Verifiable delay functions
 
2018-09-12Paper
Quasi-optimal SNARGs via linear multi-prover interactive proofs
 
2018-07-17Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
Algorithmica
2018-01-05Paper
Lattice-based SNARGs and their application to more efficient obfuscation
Lecture Notes in Computer Science
2017-06-23Paper
Constraining pseudorandom functions privately
Lecture Notes in Computer Science
2017-06-13Paper
Surnaming schemes, fast verification, and applications to SGX technology
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Balloon hashing: a memory-hard function providing provable protection against sequential attacks
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Targeted malleability: homomorphic encryption for restricted computations
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
2016-10-07Paper
Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Algorithms for black-box fields and their application to cryptography
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Hosting services on an untrusted cloud
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
scientific article; zbMATH DE number 6472645 (Why is no real title available?)
 
2015-08-14Paper
Computing on authenticated data
Journal of Cryptology
2015-05-12Paper
Bivariate polynomials modulo composites and their applications
Lecture Notes in Computer Science
2015-01-16Paper
Finding smooth integers in short intervals using CRT decoding
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Low overhead broadcast encryption from multilinear maps
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Private database queries using somewhat homomorphic encryption
Applied Cryptography and Network Security
2014-01-24Paper
Function-private subspace-membership encryption and its applications
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Constrained pseudorandom functions and their applications
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Secure signatures and chosen ciphertext security in a quantum computing world
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Function-private identity-based encryption: hiding the function in functional encryption
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Key homomorphic PRFs and their applications
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Message-Locked Encryption for Lock-Dependent Messages
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Oblivious signature-based envelope
Distributed Computing
2013-06-07Paper
Quantum-secure message authentication codes
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Pairing-based cryptography: past, present, and future
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Computing on Authenticated Data
Theory of Cryptography
2012-06-15Paper
Efficient selective identity-based encryption without random oracles
Journal of Cryptology
2012-01-13Paper
Random oracles in a quantum world
Lecture Notes in Computer Science
2011-12-02Paper
Homomorphic signatures for polynomial functions
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Functional encryption: definitions and challenges
Theory of Cryptography
2011-05-19Paper
Finding composite order ordinary elliptic curves using the Cocks-Pinch method
Journal of Number Theory
2011-04-08Paper
Attacking an obfuscated cipher by injecting faults
Lecture Notes in Computer Science
2011-03-18Paper
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
Public Key Cryptography – PKC 2011
2011-03-15Paper
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Efficient lattice (H)IBE in the standard model
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Preventing pollution attacks in multi-source network coding
Public Key Cryptography – PKC 2010
2010-05-28Paper
The design and implementation of protocol-based hidden key recovery
Lecture Notes in Computer Science
2010-02-09Paper
Signing a Linear Subspace: Signature Schemes for Network Coding
Public Key Cryptography – PKC 2009
2009-03-24Paper
Public Key Encryption That Allows PIR Queries
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Circular-Secure Encryption from Decision Diffie-Hellman
Lecture Notes in Computer Science
2009-02-10Paper
Generalized Identity Based and Broadcast Encryption Schemes
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
Financial Cryptography and Data Security
2008-09-09Paper
Short signatures without random oracles and the SDH assumption in bilinear groups
Journal of Cryptology
2008-05-06Paper
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Lecture Notes in Computer Science
2008-05-06Paper
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Efficient generation of shared RSA keys
Journal of the ACM
2008-02-11Paper
Bilinear Groups of Composite Order
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption
SIAM Journal on Computing
2007-10-22Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Lecture Notes in Computer Science
2007-09-04Paper
Conjunctive, Subset, and Range Queries on Encrypted Data
Theory of Cryptography
2007-08-30Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Short signatures from the Weil pairing
Journal of Cryptology
2005-04-15Paper
scientific article; zbMATH DE number 2102669 (Why is no real title available?)
 
2004-09-24Paper
scientific article; zbMATH DE number 2081084 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2081057 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2009971 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1996402 (Why is no real title available?)
 
2003-10-22Paper
On the importance of eliminating errors in cryptographic computations
Journal of Cryptology
2003-08-26Paper
scientific article; zbMATH DE number 1962145 (Why is no real title available?)
 
2003-08-10Paper
Optimistic Mixing for Exit-Polls
Lecture Notes in Computer Science
2003-07-16Paper
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
2003-06-19Paper
scientific article; zbMATH DE number 1842494 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1842497 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1842493 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1500479 (Why is no real title available?)
 
2002-10-10Paper
Finding smooth integers in short intervals using CRT decoding
Journal of Computer and System Sciences
2002-09-12Paper
scientific article; zbMATH DE number 1759782 (Why is no real title available?)
 
2002-08-06Paper
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring
Information Processing Letters
2002-07-25Paper
scientific article; zbMATH DE number 1722689 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1617915 (Why is no real title available?)
 
2001-07-12Paper
scientific article; zbMATH DE number 1583952 (Why is no real title available?)
 
2001-07-08Paper
scientific article; zbMATH DE number 1583767 (Why is no real title available?)
 
2001-07-03Paper
Cryptanalysis of RSA with Private Key d Less than N 0.292
Advances in Cryptology — EUROCRYPT ’99
2000-11-26Paper
Cryptanalysis of RSA with private key d less than N/sup 0.292/
IEEE Transactions on Information Theory
2000-09-07Paper
scientific article; zbMATH DE number 1408369 (Why is no real title available?)
 
2000-08-23Paper
scientific article; zbMATH DE number 1418304 (Why is no real title available?)
 
2000-07-19Paper
scientific article; zbMATH DE number 1418303 (Why is no real title available?)
 
2000-03-19Paper
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
1999-11-21Paper
Breaking RSA may not be equivalent to factoring
Lecture Notes in Computer Science
1999-10-10Paper
scientific article; zbMATH DE number 1241364 (Why is no real title available?)
 
1999-08-23Paper
scientific article; zbMATH DE number 1302812 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1258344 (Why is no real title available?)
 
1999-03-08Paper
scientific article; zbMATH DE number 1241372 (Why is no real title available?)
 
1999-01-17Paper
scientific article; zbMATH DE number 1186946 (Why is no real title available?)
 
1998-11-05Paper
scientific article; zbMATH DE number 1186931 (Why is no real title available?)
 
1998-01-01Paper
scientific article; zbMATH DE number 1088251 (Why is no real title available?)
 
1997-11-17Paper
scientific article; zbMATH DE number 1030976 (Why is no real title available?)
 
1997-07-06Paper
scientific article; zbMATH DE number 1030974 (Why is no real title available?)
 
1997-07-06Paper
On the computational power of DNA
Discrete Applied Mathematics
1997-04-21Paper


Research outcomes over time


This page was built for person: Dan Boneh