The following pages link to Dan Boneh (Q181988):
Displaying 50 items.
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring (Q1606932) (← links)
- Exploring crypto dark matter: new simple PRF candidates and their applications (Q1631360) (← links)
- Quasi-optimal SNARGs via linear multi-prover interactive proofs (Q1653086) (← links)
- Verifiable delay functions (Q1673422) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Compact multi-signatures for smaller blockchains (Q1710607) (← links)
- Short signatures from the Weil pairing (Q1772229) (← links)
- \textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments (Q2120097) (← links)
- Batching techniques for accumulators with applications to IOPs and stateless blockchains (Q2181865) (← links)
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves (Q2191198) (← links)
- Zether: towards privacy in a smart contract world (Q2226604) (← links)
- An airdrop that preserves recipient privacy (Q2226608) (← links)
- Post-quantum EPID signatures from symmetric primitives (Q2290455) (← links)
- Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security (Q2303116) (← links)
- Zero-knowledge proofs on secret-shared data via fully linear PCPs (Q2304915) (← links)
- Computing on authenticated data (Q2344052) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method (Q2430983) (← links)
- Oblivious pseudorandom functions from isogenies (Q2692394) (← links)
- (Q2707399) (← links)
- (Q2724420) (← links)
- (Q2778860) (← links)
- Targeted malleability (Q2826068) (← links)
- Message-Locked Encryption for Lock-Dependent Messages (Q2845684) (← links)
- Key Homomorphic PRFs and Their Applications (Q2845686) (← links)
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World (Q2849406) (← links)
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption (Q2849412) (← links)
- Constrained Pseudorandom Functions and Their Applications (Q2867158) (← links)
- Function-Private Subspace-Membership Encryption and Its Applications (Q2867222) (← links)
- Low Overhead Broadcast Encryption from Multilinear Maps (Q2874505) (← links)
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation (Q2874521) (← links)
- Computing on Authenticated Data (Q2891473) (← links)
- Bivariate Polynomials Modulo Composites and Their Applications (Q2938837) (← links)
- Hosting Services on an Untrusted Cloud (Q2948391) (← links)
- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation (Q2948396) (← links)
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks (Q2958121) (← links)
- Surnaming Schemes, Fast Verification, and Applications to SGX Technology (Q2975802) (← links)
- Functional Encryption: Definitions and Challenges (Q3000543) (← links)
- Homomorphic Signatures for Polynomial Functions (Q3003381) (← links)
- Attacking an Obfuscated Cipher by Injecting Faults (Q3082980) (← links)
- Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures (Q3084337) (← links)
- Random Oracles in a Quantum World (Q3102175) (← links)
- The Design and Implementation of Protocol-Based Hidden Key Recovery (Q3404402) (← links)
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (Q3452347) (← links)
- Algorithms for Black-Box Fields and their Application to Cryptography (Q3452358) (← links)
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption (Q3524122) (← links)
- Preventing Pollution Attacks in Multi-source Network Coding (Q3562894) (← links)
- Efficient Lattice (H)IBE in the Standard Model (Q3563855) (← links)
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE (Q3582750) (← links)