Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Dan Boneh

From Wikipedia, the free encyclopedia
Israeli–American professor
Dan Boneh
דן בונה
Boneh in 2007
Born1969 (age 56–57)
Alma materPrinceton University (PhD)
Known for
Awards
Scientific career
FieldsCryptography
InstitutionsStanford University
ThesisStudies in Computational Number Theory with Applications to Cryptography (1996)
Doctoral advisorRichard J. Lipton
Doctoral students

Dan Boneh (/bˈn/;Hebrew:דן בונה) is an Israeli–American professor in appliedcryptography andcomputer security atStanford University.

In 2016, Boneh was elected a member of theNational Academy of Engineering for contributions to the theory and practice of cryptography and computer security.

Biography

[edit]

Born inIsrael in 1969,[1] Boneh obtained his Ph.D. in computer science fromPrinceton University in 1996 under the supervision ofRichard J. Lipton.[2][3]

Boneh is one of the principal contributors to the development ofpairing-based cryptography, along withMatt Franklin of theUniversity of California, Davis.[4] He joined the faculty ofStanford University in 1997, and became professor ofcomputer science andelectrical engineering.[5][6] He teachesmassive open online courses on the online learning platformCoursera.[7] In 1999, he was awarded a fellowship from theDavid and Lucile Packard Foundation.[8] In 2002, he co-founded a company called Voltage Security with three of his students.[9] The company was acquired byHewlett-Packard in 2015.[10][11]

In 2018, Boneh became co-director (with David Mazières) of the newly founded Center for Blockchain Research at Stanford, predicting at the time that "Blockchains will become increasingly critical to doing business globally."[12] Dr. Boneh is also known for putting his entire introductory cryptography course online for free.[13] The course is also available via Coursera.[14]

Awards

[edit]

Publications

[edit]

Boneh's primary research focuses is on the area of cryptography where he has worked in numerous areas.

Identity-Based Encryption

[edit]

In 1984Adi Shamir proposed the possibility ofidentity-based encryption (IBE), which allows people to send encrypted messages to each other by using a public key derived from the recipients identity. Boneh, withMatt Franklin, proposed one of the first identity-based encryption schemes based on theWeil pairing. TheBoneh-Franklin scheme remains an active area of research. In 2010 Boneh (with Shweta Agrawal and Xavier Boyen) introduced an IBE scheme from thelearning with errors assumption.[23]

Homomorphic Encryption

[edit]

Ahomomorphic encryption algorithm is one where a user can perform computation on encrypted data, without decrypting it. Boneh's has developed several improvements of homomorphic cryptosystems. For example, with Eu-Jin Goh and Kobbi Nissim in 2005 Boneh proposed a "partially homomorphic cryptosystem".[24]

Timing attacks

[edit]

Timing attacks are a type ofside-channel attack that allows an adversary to attack a security system by studying now long it takes to perform certain calculations. In 2003, Boneh (withDavid Brumley) proposed one of the first practical timing attacks onOpenSSL that worked over the Internet. He then later showed how to extend the attack, "show[ing] that the time web sites take to respond to HTTP requests can leak private information."[25]

Other significant work

[edit]

Some of Boneh's other results in cryptography and computer security include:

  • 2018: Verifiable Delay Functions[26]
  • 2015: Privacy-preserving proofs of solvency forBitcoin exchanges[27]
  • 2010: He was involved in designingtcpcrypt, TCP extensions for transport-level security[28][29]
  • 2005: A partiallyhomomorphic cryptosystem (with Eu-Jin Goh andKobbi Nissim)
  • 2005: The first broadcast encryption system with full collision resistance (withCraig Gentry and Brent Waters)
  • 1999: Cryptanalysis ofRSA when the private key is less than N0.292 (with Glenn Durfee)
  • 1997: Fault-based cryptanalysis of public-key systems (withRichard J. Lipton andRichard DeMillo)
  • 1995: Collision resistant fingerprinting codes for digital data (with James Shaw)
  • 1995: Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)
  • 2005: PwdHash a browser extension that transparently produces a different password for each site[30][31]

References

[edit]
  1. ^Brown, Bob (March 31, 2015)."Stanford crypto expert Dan Boneh wins $175K computer science award".Network World. Retrieved2025-09-25.
  2. ^"Cryptography Is Dead?". March 2013.
  3. ^Dan Boneh at theMathematics Genealogy Project
  4. ^"Google Scholar citations of Boneh-Franklin paper".
  5. ^"Dan Boneh's Publications by Topic".
  6. ^"Dan Boneh's Google Scholar Profile".
  7. ^"Dan Boneh".Coursera instructor profile. RetrievedApril 8, 2018.
  8. ^"Dan Boneh: 1999 Fellow". David and Lucile Packard Foundation. Archived fromthe original on May 15, 2017. RetrievedMarch 10, 2017.
  9. ^"Voltage Security, Inc., Corporate Fact Sheet".Old web site. Archived fromthe original on July 18, 2004. RetrievedMarch 10, 2017.
  10. ^Mary Azevedo (February 20, 2015)."HP set to acquire encryption firm Voltage Security".RCR Wireless news. RetrievedMarch 10, 2017.
  11. ^Jeremy C. Owens (February 9, 2015)."Hewlett-Packard buys Cupertino's Voltage Security for data protection".San Jose Mercury News. RetrievedMarch 10, 2017.
  12. ^"Stanford computer scientists launch the Center for Blockchain Research".Stanford School of Engineering. 2018-06-20. Retrieved2018-09-01.
  13. ^Dan Boneh."Online Cryptography Course". Stanford University.
  14. ^"Cryptography I".Coursera.
  15. ^2021 Class of Fellows of the AMS, American Mathematical Society, retrieved2020-11-02
  16. ^Cacm Staff (March 2017), "ACM Recognizes New Fellows",Communications of the ACM,60 (3): 23,doi:10.1145/3039921,S2CID 31701275.
  17. ^ACM Prize in Computing Award Winners, April 11, 2018.
  18. ^"Dan Boneh".Award web page. ACM. RetrievedJuly 12, 2019.
  19. ^ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve SecurityArchived 2013-06-01 at theWayback Machine,Association for Computing Machinery, May 29, 2013.
  20. ^http://www.securityinfowatch.com/press_release/10610184/co-founder-of-voltage-security-wins-rsa-award (Archive)
  21. ^Alfred P. Sloan Foundation,1999 Annual ReportArchived 2014-08-21 at theWayback Machine, February 17, 2014.
  22. ^Boneh, Dan -- The David and Lucile Packard Foundation, April 11, 2018.
  23. ^Agrawal, Shweta; Boneh, Dan; Boyen, Xavier (2010-05-30). "Efficient Lattice (H)IBE in the Standard Model".Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Vol. 6110. Springer, Berlin, Heidelberg. pp. 553–572.doi:10.1007/978-3-642-13190-5_28.ISBN 9783642131899.S2CID 185222.
  24. ^D Boneh, EJ Goh, K Nissim (April 2006)."Evaluating 2-DNF Formulas on Ciphertexts"(PDF).{{cite web}}: CS1 maint: multiple names: authors list (link)
  25. ^A. Bortz, D. Boneh, and P. NandyExposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628
  26. ^Dan Boneh; Joseph Bonneau; Benedikt Bünz; Ben Fisch (12 June 2018)."Verifiable Delay Functions"(PDF).International Association for Cryptologic Research. Retrieved23 February 2018.
  27. ^Gaby G. Dagher; Benedikt Bünz; Joseph Bonneau; Jeremy Clark; Dan Boneh (26 October 2015)."Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges"(PDF).International Association for Cryptologic Research. Retrieved23 February 2016.
  28. ^A. Bittau; et al. (July 2010)."Cryptographic protection of TCP Streams (tcpcrypt)".IETF draft. Archived fromthe original on 2010-08-21.
  29. ^Andrea Bittau; et al. (2010-08-13).The case for ubiquitous transport-level encryption(PDF). 19th USENIX Security Symposium.
  30. ^B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. MitchellStronger Password Authentication Using Browser ExtensionsUsenix security 2005
  31. ^"Security experts unveil defense against phishing". 2005-07-27.

External links

[edit]
Gödel Prize laureates
International
National
Academics
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Dan_Boneh&oldid=1334545968"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp