Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Dan Boneh
Search web for home page
Program Committees
1
2012
Crypto
pc
2
2011
Crypto
pc
3
2010
Eurocrypt
pc
4
2009
TCC
general chair
5
2009
Crypto
pc
6
2003
Crypto
pc chair
7
2002
Eurocrypt
pc
8
2000
Eurocrypt
pc
9
2000
Crypto
pc
10
2000
Asiacrypt
pc
11
1999
Eurocrypt
pc
12
1998
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Pairing-Based Cryptography: Past, Present, and Future
asiacrypt
1
2
2012
Computing on Authenticated Data
tcc
1-20
3
2011
Homomorphic Signatures for Polynomial Functions
eurocrypt
149
4
2011
Random Oracles in a Quantum World
asiacrypt
41-69
5
2011
Efficient Selective Identity-Based Encryption Without Random Oracles
jofc
659-693
6
2011
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
pkc
1
7
2011
Functional Encryption: Definitions and Challenges
tcc
253
8
2010
Preventing Pollution Attacks in Multi-Source Network Coding
eprint
online
9
2010
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
eprint
online
10
2010
Homomorphic Signatures over Binary Fields: Secure Network Coding with Small Coefficients
eprint
online
11
2010
Preventing Pollution Attacks in Multi-source Network Coding
pkc
161-176
12
2010
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
crypto
98-115
13
2010
Efficient Lattice (H)IBE in the Standard Model
eurocrypt
553-572
14
2009
Signing a Linear Subspace: Signature Schemes for Network Coding
pkc
68-87
15
2008
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
jofc
149-177
16
2008
Circular-Secure Encryption from Decision Diffie-Hellman
crypto
108-125
17
2008
Generalized Identity Based and Broadcast Encryption Schemes
asiacrypt
455-470
18
2008
Signing a Linear Subspace: Signature Schemes for Network Coding
eprint
online
19
2007
Public Key Encryption that Allows PIR Queries
eprint
online
20
2007
Conjunctive, Subset, and Range Queries on Encrypted Data
tcc
535-554
21
2007
Public Key Encryption That Allows PIR Queries
crypto
50-67
22
2007
Space-Efficient Identity Based Encryption Without Pairings
eprint
online
23
2006
Conjunctive, Subset, and Range Queries on Encrypted Data
eprint
online
24
2006
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
eprint
online
25
2006
Fully Collusion Resistant Traitor Tracing
eprint
online
26
2006
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
pkc
online
27
2006
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
crypto
online
28
2006
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
eurocrypt
online
29
2005
Evaluating 2-DNF Formulas on Ciphertexts
tcc
online
30
2005
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
crypto
online
31
2005
Hierarchical Identity Based Encryption with Constant Size Ciphertext
eprint
online
32
2005
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
eprint
online
33
2005
Hierarchical Identity Based Encryption with Constant Size Ciphertext
eurocrypt
online
34
2004
Secure Identity Based Encryption Without Random Oracles
crypto
online
35
2004
Short Group Signatures
crypto
online
36
2004
Short Signatures from the Weil Pairing
jofc
297-319
37
2004
Short Signatures Without Random Oracles
eprint
online
38
2004
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
eprint
online
39
2004
Secure Identity Based Encryption Without Random Oracles
eprint
online
40
2004
Short Group Signatures
eprint
online
41
2004
Short Signatures Without Random Oracles
eurocrypt
online
42
2004
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
eurocrypt
online
43
2004
Public Key Encryption with Keyword Search
eurocrypt
online
44
2004
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
eprint
online
45
2003
Public Key Encryption with keyword Search
eprint
online
46
2003
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
eurocrypt
online
47
2002
Applications of Multilinear Forms to Cryptography
eprint
online
48
2002
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
eprint
online
49
2002
Optimistic Mixing for Exit-Polls
asiacrypt
online
50
2001
Simplified OAEP for the RSA and Rabin Functions
crypto
275-291
51
2001
Identity-Based Encryption from the Weil Pairing
crypto
213-229
52
2001
On the Importance of Eliminating Errors in Cryptographic Computations
jofc
101-119
53
2001
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme
crypto
201-212
54
2001
The Modular Inversion Hidden Number Problem
asiacrypt
36-51
55
2001
Short Signatures from the Weil Pairing
asiacrypt
514-532
56
2001
Lower Bounds for Multicast Message Authentication
eurocrypt
437-452
57
2001
Identity Based Encryption From the Weil Pairing
eprint
online
58
2000
Timed Commitments
crypto
236-254
59
2000
Why Textbook ElGamal and RSA Encryption Are Insecure
asiacrypt
30-43
60
1999
Factoring N = p
r
q for Large r
crypto
326-337
61
1999
An Efficient Public Key Traitor Tracing Scheme
crypto
338-353
62
1999
Cryptanalysis of RSA with Private Key
d
Less than
N
0.292
eurocrypt
1-11
63
1998
An Attack on RSA Given a Small Fraction of the Private Key Bits
asiacrypt
25-34
64
1998
Breaking RSA May Not Be Equivalent to Factoring
eurocrypt
59-71
65
1997
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
eprint
online
66
1997
Efficient Generation of Shared RSA Keys (Extended Abstract)
crypto
425-439
67
1997
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
eurocrypt
37-51
68
1996
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)
crypto
283-297
69
1996
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
crypto
129-142
70
1995
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)
crypto
424-437
71
1995
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
crypto
452-465
Coauthors of Dan Boneh
Shweta Agrawal
Jae Hyun Ahn
Eli Biham
Xavier Boyen
Jan Camenisch
Giovanni Di Crescenzo
Özgür Dagdelen
Richard A. DeMillo
Glenn Durfee
Marc Fischlin
Yair Frankel
Matthew K. Franklin
David Freeman
Craig Gentry
Eu-Jin Goh
Philippe Golle
Shai Halevi
Michael Hamburg
Susan Hohenberger
Nick Howgrave-Graham
William E. Skeith III
Markus Jakobsson
Antoine Joux
Ari Juels
Jonathan Katz
Eyal Kushilevitz
Anja Lehmann
Richard J. Lipton
Ben Lynn
Hart Montgomery
Moni Naor
Phong Q. Nguyen
Kobbi Nissim
Rafail Ostrovsky
Giuseppe Persiano
Ananth Raghunathan
Omer Reingold
Amit Sahai
Christian Schaffner
Hovav Shacham
James Shaw
Abhi Shelat
Emily Shen
Igor E. Shparlinski
Alice Silverberg
Ramarathnam Venkatesan
Brent Waters
Mark Zhandry
Sheng Zhong