Dan Boneh

From MaRDI portal
Person:181988

Available identifiers

zbMath Open boneh.danWikidataQ2896470 ScholiaQ2896470MaRDI QIDQ181988

List of research outcomes

PublicationDate of PublicationType
Arithmetic sketching2024-02-02Paper
HyperPlonk: Plonk with linear-time prover and high-degree custom gates2023-12-08Paper
A lower bound on the length of signatures based on group actions and generic isogenies2023-12-08Paper
Threshold signatures with private accountability2023-07-07Paper
Oblivious pseudorandom functions from isogenies2023-03-21Paper
\textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments2022-03-31Paper
Supersingular curves with small noninteger endomorphisms2021-03-11Paper
Zether: towards privacy in a smart contract world2021-02-08Paper
An airdrop that preserves recipient privacy2021-02-08Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves2020-06-24Paper
Batching techniques for accumulators with applications to IOPs and stateless blockchains2020-05-20Paper
Zero-knowledge proofs on secret-shared data via fully linear PCPs2020-03-09Paper
Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security2020-03-02Paper
Post-quantum EPID signatures from symmetric primitives2020-01-28Paper
Compact multi-signatures for smaller blockchains2019-01-23Paper
Exploring crypto dark matter: new simple PRF candidates and their applications2018-12-06Paper
Verifiable delay functions2018-09-12Paper
Quasi-optimal SNARGs via linear multi-prover interactive proofs2018-07-17Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation2018-01-05Paper
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation2017-06-23Paper
Constraining Pseudorandom Functions Privately2017-06-13Paper
Surnaming Schemes, Fast Verification, and Applications to SGX Technology2017-04-12Paper
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks2017-02-01Paper
Targeted malleability2016-10-07Paper
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes2015-11-11Paper
Algorithms for Black-Box Fields and their Application to Cryptography2015-11-11Paper
Hosting Services on an Untrusted Cloud2015-09-30Paper
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation2015-09-30Paper
Oblivious signature-based envelope2015-09-04Paper
https://portal.mardi4nfdi.de/entity/Q55018472015-08-14Paper
Computing on authenticated data2015-05-12Paper
Bivariate Polynomials Modulo Composites and Their Applications2015-01-16Paper
Finding smooth integers in short intervals using CRT decoding2014-09-26Paper
Low Overhead Broadcast Encryption from Multilinear Maps2014-08-07Paper
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation2014-08-07Paper
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits2014-05-27Paper
Constrained Pseudorandom Functions and Their Applications2013-12-10Paper
Function-Private Subspace-Membership Encryption and Its Applications2013-12-10Paper
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World2013-09-17Paper
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption2013-09-17Paper
Message-Locked Encryption for Lock-Dependent Messages2013-09-02Paper
Key Homomorphic PRFs and Their Applications2013-09-02Paper
Oblivious signature-based envelope2013-06-07Paper
Quantum-Secure Message Authentication Codes2013-05-31Paper
Pairing-Based Cryptography: Past, Present, and Future2013-03-19Paper
Computing on Authenticated Data2012-06-15Paper
Efficient selective identity-based encryption without random oracles2012-01-13Paper
Random Oracles in a Quantum World2011-12-02Paper
Homomorphic Signatures for Polynomial Functions2011-05-27Paper
Functional Encryption: Definitions and Challenges2011-05-19Paper
Finding composite order ordinary elliptic curves using the Cocks-Pinch method2011-04-08Paper
Attacking an Obfuscated Cipher by Injecting Faults2011-03-18Paper
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures2011-03-15Paper
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE2010-08-24Paper
Efficient Lattice (H)IBE in the Standard Model2010-06-01Paper
Preventing Pollution Attacks in Multi-source Network Coding2010-05-28Paper
The Design and Implementation of Protocol-Based Hidden Key Recovery2010-02-09Paper
Signing a Linear Subspace: Signature Schemes for Network Coding2009-03-24Paper
Public Key Encryption That Allows PIR Queries2009-03-10Paper
Circular-Secure Encryption from Decision Diffie-Hellman2009-02-10Paper
Generalized Identity Based and Broadcast Encryption Schemes2009-02-10Paper
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption2008-09-09Paper
Short signatures without random oracles and the SDH assumption in bilinear groups2008-05-06Paper
Hierarchical Identity Based Encryption with Constant Size Ciphertext2008-05-06Paper
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys2008-03-17Paper
Efficient generation of shared RSA keys2008-02-11Paper
Bilinear Groups of Composite Order2007-11-29Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption2007-10-22Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys2007-09-24Paper
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions2007-09-04Paper
Conjunctive, Subset, and Range Queries on Encrypted Data2007-08-30Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Theory of Cryptography2005-12-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Short signatures from the Weil pairing2005-04-15Paper
https://portal.mardi4nfdi.de/entity/Q48175012004-09-24Paper
https://portal.mardi4nfdi.de/entity/Q44741642004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741962004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44348902003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44323492003-10-22Paper
On the importance of eliminating errors in cryptographic computations2003-08-26Paper
https://portal.mardi4nfdi.de/entity/Q44185292003-08-10Paper
Optimistic Mixing for Exit-Polls2003-07-16Paper
Identity-Based Encryption from the Weil Pairing2003-06-19Paper
https://portal.mardi4nfdi.de/entity/Q47837272002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q47837282002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q47837312002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45014842002-10-10Paper
Finding smooth integers in short intervals using CRT decoding2002-09-12Paper
https://portal.mardi4nfdi.de/entity/Q45368052002-08-06Paper
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring2002-07-25Paper
https://portal.mardi4nfdi.de/entity/Q27788602002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27244202001-07-12Paper
https://portal.mardi4nfdi.de/entity/Q27073992001-07-03Paper
Cryptanalysis of RSA with Private Key d Less than N 0.2922000-11-26Paper
Cryptanalysis of RSA with private key d less than N/sup 0.292/2000-09-07Paper
https://portal.mardi4nfdi.de/entity/Q49411842000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q49418642000-07-19Paper
https://portal.mardi4nfdi.de/entity/Q49418632000-03-19Paper
Collusion-secure fingerprinting for digital data1999-11-21Paper
Breaking RSA may not be equivalent to factoring1999-10-10Paper
https://portal.mardi4nfdi.de/entity/Q42248841999-08-23Paper
https://portal.mardi4nfdi.de/entity/Q42492861999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42291721999-03-08Paper
https://portal.mardi4nfdi.de/entity/Q42249011999-01-17Paper
https://portal.mardi4nfdi.de/entity/Q38401671998-11-05Paper
https://portal.mardi4nfdi.de/entity/Q38401501998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43645681997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43434141997-07-06Paper
https://portal.mardi4nfdi.de/entity/Q43434161997-07-06Paper
On the computational power of DNA1997-04-21Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Dan Boneh