Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Dan Boneh
Search web for home page
Program Committees
1
2012
Crypto
pc
2
2011
Crypto
pc
3
2010
Eurocrypt
pc
4
2009
TCC
general chair
5
2009
Crypto
pc
6
2003
Crypto
pc chair
7
2002
Eurocrypt
pc
8
2000
Eurocrypt
pc
9
2000
Crypto
pc
10
2000
Asiacrypt
pc
11
1999
Eurocrypt
pc
12
1998
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Computing on Authenticated Data
tcc
1-20
2
2011
Homomorphic Signatures for Polynomial Functions
eurocrypt
149
3
2011
Random Oracles in a Quantum World
asiacrypt
41-69
4
2011
Efficient Selective Identity-Based Encryption Without Random Oracles
jofc
659-693
5
2011
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
pkc
1
6
2011
Functional Encryption: Definitions and Challenges
tcc
253
7
2010
Preventing Pollution Attacks in Multi-Source Network Coding
eprint
online
8
2010
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
eprint
online
9
2010
Homomorphic Signatures over Binary Fields: Secure Network Coding with Small Coefficients
eprint
online
10
2010
Preventing Pollution Attacks in Multi-source Network Coding
pkc
161-176
11
2010
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
crypto
98-115
12
2010
Efficient Lattice (H)IBE in the Standard Model
eurocrypt
553-572
13
2009
Signing a Linear Subspace: Signature Schemes for Network Coding
pkc
68-87
14
2008
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
jofc
149-177
15
2008
Circular-Secure Encryption from Decision Diffie-Hellman
crypto
108-125
16
2008
Generalized Identity Based and Broadcast Encryption Schemes
asiacrypt
455-470
17
2008
Signing a Linear Subspace: Signature Schemes for Network Coding
eprint
online
18
2007
Public Key Encryption that Allows PIR Queries
eprint
online
19
2007
Conjunctive, Subset, and Range Queries on Encrypted Data
tcc
535-554
20
2007
Public Key Encryption That Allows PIR Queries
crypto
50-67
21
2007
Space-Efficient Identity Based Encryption Without Pairings
eprint
online
22
2006
Conjunctive, Subset, and Range Queries on Encrypted Data
eprint
online
23
2006
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
eprint
online
24
2006
Fully Collusion Resistant Traitor Tracing
eprint
online
25
2006
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
pkc
online
26
2006
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
crypto
online
27
2006
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
eurocrypt
online
28
2005
Evaluating 2-DNF Formulas on Ciphertexts
tcc
online
29
2005
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
crypto
online
30
2005
Hierarchical Identity Based Encryption with Constant Size Ciphertext
eprint
online
31
2005
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
eprint
online
32
2005
Hierarchical Identity Based Encryption with Constant Size Ciphertext
eurocrypt
online
33
2004
Secure Identity Based Encryption Without Random Oracles
crypto
online
34
2004
Short Group Signatures
crypto
online
35
2004
Short Signatures from the Weil Pairing
jofc
297-319
36
2004
Short Signatures Without Random Oracles
eprint
online
37
2004
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
eprint
online
38
2004
Secure Identity Based Encryption Without Random Oracles
eprint
online
39
2004
Short Group Signatures
eprint
online
40
2004
Short Signatures Without Random Oracles
eurocrypt
online
41
2004
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
eurocrypt
online
42
2004
Public Key Encryption with Keyword Search
eurocrypt
online
43
2004
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
eprint
online
44
2003
Public Key Encryption with keyword Search
eprint
online
45
2003
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
eurocrypt
online
46
2002
Applications of Multilinear Forms to Cryptography
eprint
online
47
2002
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
eprint
online
48
2002
Optimistic Mixing for Exit-Polls
asiacrypt
online
49
2001
Simplified OAEP for the RSA and Rabin Functions
crypto
275-291
50
2001
Identity-Based Encryption from the Weil Pairing
crypto
213-229
51
2001
On the Importance of Eliminating Errors in Cryptographic Computations
jofc
101-119
52
2001
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme
crypto
201-212
53
2001
The Modular Inversion Hidden Number Problem
asiacrypt
36-51
54
2001
Short Signatures from the Weil Pairing
asiacrypt
514-532
55
2001
Lower Bounds for Multicast Message Authentication
eurocrypt
437-452
56
2001
Identity Based Encryption From the Weil Pairing
eprint
online
57
2000
Timed Commitments
crypto
236-254
58
2000
Why Textbook ElGamal and RSA Encryption Are Insecure
asiacrypt
30-43
59
1999
Factoring N = p
r
q for Large r
crypto
326-337
60
1999
An Efficient Public Key Traitor Tracing Scheme
crypto
338-353
61
1999
Cryptanalysis of RSA with Private Key
d
Less than
N
0.292
eurocrypt
1-11
62
1998
An Attack on RSA Given a Small Fraction of the Private Key Bits
asiacrypt
25-34
63
1998
Breaking RSA May Not Be Equivalent to Factoring
eurocrypt
59-71
64
1997
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
eprint
online
65
1997
Efficient Generation of Shared RSA Keys (Extended Abstract)
crypto
425-439
66
1997
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
eurocrypt
37-51
67
1996
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)
crypto
283-297
68
1996
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
crypto
129-142
69
1995
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)
crypto
424-437
70
1995
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
crypto
452-465
Coauthors of Dan Boneh
Shweta Agrawal
Jae Hyun Ahn
Eli Biham
Xavier Boyen
Jan Camenisch
Giovanni Di Crescenzo
Özgür Dagdelen
Richard A. DeMillo
Glenn Durfee
Marc Fischlin
Yair Frankel
Matthew K. Franklin
David Freeman
Craig Gentry
Eu-Jin Goh
Philippe Golle
Shai Halevi
Michael Hamburg
Susan Hohenberger
Nick Howgrave-Graham
William E. Skeith III
Markus Jakobsson
Antoine Joux
Ari Juels
Jonathan Katz
Eyal Kushilevitz
Anja Lehmann
Richard J. Lipton
Ben Lynn
Hart Montgomery
Moni Naor
Phong Q. Nguyen
Kobbi Nissim
Rafail Ostrovsky
Giuseppe Persiano
Ananth Raghunathan
Omer Reingold
Amit Sahai
Christian Schaffner
Hovav Shacham
James Shaw
Abhi Shelat
Emily Shen
Igor E. Shparlinski
Alice Silverberg
Ramarathnam Venkatesan
Brent Waters
Mark Zhandry
Sheng Zhong