Cryptographers' World
 

Dan Boneh


Author's Web Page Link

51 papers in database with 12891 citations StarStarStarStarStar

Editor of 1 conference proceedings book

H-number: 37

Conference Proceedings

 
1. Dan Boneh, editor, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. Springer, 2003. ISBN 3-540-40674-3.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Dan Boneh,  Xavier Boyen,  Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups, Journal of Cryptology, Volume 21(2), pp. 149 - 177, Springer, 2008.

[Cited 19 times ]

2. Dan Boneh,  Ben Lynn,  Hovav Shacham,  Short Signatures from the Weil Pairing, Journal of Cryptology, Volume 17(4), pp. 297 - 319, Springer, 2004.

[Cited 960 times Red StarRed StarRed StarRed Star]

3. Dan Boneh,  Richard A. DeMillo,  Richard J. Lipton,  On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, Volume 14(2), pp. 101 - 119, Springer, 2001.

[Cited 125 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Shweta Agrawal,  Dan Boneh,  Homomorphic MACs: MAC-Based Integrity for Network Coding, pp. 292 - 305, ACNS 2009.

[Electronic Edition][Cited 24 times ]

2. Dan Boneh,  David Freeman,  Jonathan Katz,  Brent Waters,  Signing a Linear Subspace: Signature Schemes for Network Coding, pp. 68 - 87, PKC 2009.

[Electronic Edition][Cited 22 times ]

3. Dan Boneh,  Michael Hamburg,  Generalized Identity Based and Broadcast Encryption Schemes, pp. 455 - 470, ASIACRYPT 2008.

[Electronic Edition][Cited 22 times ]

4. Dan Boneh,  Periklis A. Papakonstantinou,  Charles Rackoff,  Yevgeniy Vahlis,  Brent Waters,  On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations, pp. 283 - 292, FOCS 2008.

[Electronic Edition][Cited 7 times ]

5. Dan Boneh,  Shai Halevi,  Michael Hamburg,  Rafail Ostrovsky,  Circular-Secure Encryption from Decision Diffie-Hellman, pp. 108 - 125, CRYPTO 2008.

[Electronic Edition][Cited 37 times ]

6. Dan Boneh,  Craig Gentry,  Michael Hamburg,  Space-Efficient Identity Based Encryption Without Pairings, pp. 647 - 657, FOCS 2007.

[Electronic Edition][Cited 67 times Red Star]

7. Dan Boneh,  A Brief Look at Pairings Based Cryptography, pp. 19 - 26, FOCS 2007.

[Electronic Edition][Cited 8 times ]

8. Dan Boneh,  Brent Waters,  Conjunctive, Subset, and Range Queries on Encrypted Data, pp. 535 - 554, TCC 2007.

[Electronic Edition][Cited 129 times Red StarRed Star]

9. Dan Boneh,  Eyal Kushilevitz,  Rafail Ostrovsky,  William E. Skeith III,  Public Key Encryption That Allows PIR Queries, pp. 50 - 67, CRYPTO 2007.

[Electronic Edition][Cited 32 times ]

10. Dan Boneh,  Amit Sahai,  Brent Waters,  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, pp. 573 - 592, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

11. Dan Boneh,  Emily Shen,  Brent Waters,  Strongly Unforgeable Signatures Based on Computational Diffie-Hellman, pp. 229 - 240, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 52 times Red Star]

12. Dan Boneh,  Xavier Boyen,  Shai Halevi,  Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles, pp. 226 - 243, CT-RSA 2006.

[Electronic Edition][Cited 44 times ]

13. Adam Barth,  Dan Boneh,  Brent Waters,  Privacy in Encrypted Content Distribution Using Private Broadcast Encryption, pp. 52 - 64, FC 2006.

[Electronic Edition][Cited 20 times ]

14. Dan Boneh,  Xavier Boyen,  On the Impossibility of Efficiently Combining Collision Resistant Hash Functions, pp. 570 - 583, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

15. Dan Boneh,  Craig Gentry,  Brent Waters,  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, pp. 258 - 275, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 232 times Red StarRed Star]

16. Dan Boneh,  Xavier Boyen,  Eu-Jin Goh,  Hierarchical Identity Based Encryption with Constant Size Ciphertext, pp. 440 - 456, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 372 times Red StarRed StarRed Star]

17. Dan Boneh,  Eu-Jin Goh,  Kobbi Nissim,  Evaluating 2-DNF Formulas on Ciphertexts, pp. 325 - 341, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 258 times Red StarRed StarRed Star]

18. Dan Boneh,  Jonathan Katz,  Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, pp. 87 - 103, CT-RSA 2005.

[Electronic Edition][Cited 159 times Red StarRed Star]

19. Dan Boneh,  Xavier Boyen,  Secure Identity Based Encryption Without Random Oracles, pp. 443 - 459, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 655 times Red StarRed StarRed StarRed Star]

20. Dan Boneh,  Xavier Boyen,  Hovav Shacham,  Short Group Signatures, pp. 41 - 55, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 546 times Red StarRed StarRed StarRed Star]

21. Dan Boneh,  Xavier Boyen,  Short Signatures Without Random Oracles, pp. 56 - 73, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 560 times Red StarRed StarRed StarRed Star]

22. Dan Boneh,  Xavier Boyen,  Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, pp. 223 - 238, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 670 times Red StarRed StarRed StarRed Star]

23. Dan Boneh,  Giovanni Di Crescenzo,  Rafail Ostrovsky,  Giuseppe Persiano,  Public Key Encryption with Keyword Search, pp. 506 - 522, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 305 times Red StarRed StarRed Star]

24. Dan Boneh,  Craig Gentry,  Ben Lynn,  Hovav Shacham,  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, pp. 416 - 432, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 525 times Red StarRed StarRed StarRed Star]

25. Dan Boneh,  Ilya Mironov,  Victor Shoup,  A Secure Signature Scheme from Bilinear Maps, pp. 98 - 110, CT-RSA 2003.

[Electronic Edition][Cited 37 times ]

26. Philippe Golle,  Sheng Zhong,  Dan Boneh,  Markus Jakobsson,  Ari Juels,  Optimistic Mixing for Exit-Polls, pp. 451 - 465, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 86 times Red Star]

27. Dan Boneh,  Shai Halevi,  Nick Howgrave-Graham,  The Modular Inversion Hidden Number Problem, pp. 36 - 51, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 29 times ]

28. Dan Boneh,  Ben Lynn,  Hovav Shacham,  Short Signatures from the Weil Pairing, pp. 514 - 532, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1486 times Red StarRed StarRed StarRed StarRed Star]

29. Dan Boneh,  Simplified OAEP for the RSA and Rabin Functions, pp. 275 - 291, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 102 times Red StarRed Star]

30. Dan Boneh,  Matthew K. Franklin,  Identity-Based Encryption from the Weil Pairing, pp. 213 - 229, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2977 times Red StarRed StarRed StarRed StarRed StarRed Star]

31. Dan Boneh,  Igor Shparlinski,  On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme, pp. 201 - 212, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

32. Dan Boneh,  Glenn Durfee,  Matthew K. Franklin,  Lower Bounds for Multicast Message Authentication, pp. 437 - 452, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 56 times Red Star]

33. Hovav Shacham,  Dan Boneh,  Improving SSL Handshake Performance via Batching, pp. 28 - 43, CT-RSA 2001.

[Electronic Edition][Cited 46 times ]

34. Dan Boneh,  Antoine Joux,  Phong Q. Nguyen,  Why Textbook ElGamal and RSA Encryption Are Insecure, pp. 30 - 43, ASIACRYPT 2000.

[Electronic Edition][Cited 63 times Red Star]

35. Dan Boneh,  Nagendra Modadugu,  Michael Kim,  Generating RSA Keys on a Handheld Using an Untrusted Server, pp. 271 - 282, INDOCRYPT 2000.

[Electronic Edition][Cited 46 times ]

36. Dan Boneh,  Moni Naor,  Timed Commitments, pp. 236 - 254, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 118 times Red StarRed Star]

37. Dan Boneh,  Glenn Durfee,  Nick Howgrave-Graham,  Factoring N = prq for large r, pp. 326 - 337, CRYPTO 1999.

[Electronic Edition][Cited 76 times Red Star]

38. Dan Boneh,  Matthew K. Franklin,  An Efficient Public Key Traitor Tracing Scheme, pp. 338 - 353, CRYPTO 1999.

[Electronic Edition][Cited 259 times Red StarRed StarRed Star]

39. Dan Boneh,  Glenn Durfee,  Cryptanalysis of RSA with Private Key d less than N^0.292, pp. 1 - 11, EUROCRYPT 1999.

[Electronic Edition][Cited 227 times Red StarRed Star]

40. Neil Daswani,  Dan Boneh,  Experimenting with Electronic Commerce on the PalmPilot, pp. 1 - 16, FC 1999.

[Electronic Edition][Cited 62 times Red Star]

41. Dan Boneh,  Glenn Durfee,  Yair Frankel,  An Attack on RSA Given a Small Fraction of the Private Key Bits, pp. 25 - 34, ASIACRYPT 1998.

[Electronic Edition][Cited 95 times Red Star]

42. Dan Boneh,  Ramarathnam Venkatesan,  Breaking RSA May Not Be Equivalent to Factoring, pp. 59 - 71, EUROCRYPT 1998.

[Electronic Edition][Cited 118 times Red StarRed Star]

43. Dan Boneh,  Matthew K. Franklin,  Efficient Generation of Shared RSA Keys (Extended Abstract), pp. 425 - 439, CRYPTO 1997.

[Electronic Edition][Cited 351 times Red StarRed StarRed Star]

44. Dan Boneh,  Richard A. DeMillo,  Richard J. Lipton,  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), pp. 37 - 51, EUROCRYPT 1997.

[Electronic Edition][Cited 636 times Red StarRed StarRed StarRed Star]

45. Dan Boneh,  Richard J. Lipton,  Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract), pp. 283 - 297, CRYPTO 1996.

[Electronic Edition][Cited 140 times Red StarRed Star]

46. Dan Boneh,  Ramarathnam Venkatesan,  Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes, pp. 129 - 142, CRYPTO 1996.

[Electronic Edition][Cited 154 times Red StarRed Star]

47. Dan Boneh,  Richard J. Lipton,  Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract), pp. 424 - 437, CRYPTO 1995.

[Electronic Edition][Cited 91 times Red Star]

48. Dan Boneh,  James Shaw,  Collusion-Secure Fingerprinting for Digital Data (Extended Abstract), pp. 452 - 465, CRYPTO 1995.

[Electronic Edition][Cited 597 times Red StarRed StarRed StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...