Israeli–American professor
Dan Boneh (/b oʊ ˈ n eɪ / ;Hebrew :דן בונה ) is an Israeli–American professor in appliedcryptography andcomputer security atStanford University .
In 2016, Boneh was elected a member of theNational Academy of Engineering for contributions to the theory and practice of cryptography and computer security.
Born inIsrael in 1969,[ 1] Boneh obtained his Ph.D. in computer science fromPrinceton University in 1996 under the supervision ofRichard J. Lipton .[ 2] [ 3]
Boneh is one of the principal contributors to the development ofpairing-based cryptography , along withMatt Franklin of theUniversity of California, Davis .[ 4] He joined the faculty ofStanford University in 1997, and became professor ofcomputer science andelectrical engineering .[ 5] [ 6] He teachesmassive open online courses on the online learning platformCoursera .[ 7] In 1999, he was awarded a fellowship from theDavid and Lucile Packard Foundation .[ 8] In 2002, he co-founded a company called Voltage Security with three of his students.[ 9] The company was acquired byHewlett-Packard in 2015.[ 10] [ 11]
In 2018, Boneh became co-director (with David Mazières) of the newly founded Center for Blockchain Research at Stanford, predicting at the time that "Blockchains will become increasingly critical to doing business globally."[ 12] Dr. Boneh is also known for putting his entire introductory cryptography course online for free.[ 13] The course is also available via Coursera.[ 14]
Boneh's primary research focuses is on the area of cryptography where he has worked in numerous areas.
Identity-Based Encryption [ edit ] In 1984Adi Shamir proposed the possibility ofidentity-based encryption (IBE), which allows people to send encrypted messages to each other by using a public key derived from the recipients identity. Boneh, withMatt Franklin , proposed one of the first identity-based encryption schemes based on theWeil pairing . TheBoneh-Franklin scheme remains an active area of research. In 2010 Boneh (with Shweta Agrawal and Xavier Boyen) introduced an IBE scheme from thelearning with errors assumption.[ 23]
Homomorphic Encryption [ edit ] Ahomomorphic encryption algorithm is one where a user can perform computation on encrypted data, without decrypting it. Boneh's has developed several improvements of homomorphic cryptosystems. For example, with Eu-Jin Goh and Kobbi Nissim in 2005 Boneh proposed a "partially homomorphic cryptosystem".[ 24]
Timing attacks are a type ofside-channel attack that allows an adversary to attack a security system by studying now long it takes to perform certain calculations. In 2003, Boneh (withDavid Brumley ) proposed one of the first practical timing attacks onOpenSSL that worked over the Internet. He then later showed how to extend the attack, "show[ing] that the time web sites take to respond to HTTP requests can leak private information."[ 25]
Other significant work [ edit ] Some of Boneh's other results in cryptography and computer security include:
2018: Verifiable Delay Functions[ 26] 2015: Privacy-preserving proofs of solvency forBitcoin exchanges[ 27] 2010: He was involved in designingtcpcrypt , TCP extensions for transport-level security[ 28] [ 29] 2005: A partiallyhomomorphic cryptosystem (with Eu-Jin Goh andKobbi Nissim ) 2005: The first broadcast encryption system with full collision resistance (withCraig Gentry and Brent Waters) 1999: Cryptanalysis ofRSA when the private key is less than N0.292 (with Glenn Durfee) 1997: Fault-based cryptanalysis of public-key systems (withRichard J. Lipton andRichard DeMillo ) 1995: Collision resistant fingerprinting codes for digital data (with James Shaw) 1995: Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton) 2005: PwdHash a browser extension that transparently produces a different password for each site[ 30] [ 31] ^ Brown, Bob (March 31, 2015)."Stanford crypto expert Dan Boneh wins $175K computer science award" .Network World . Retrieved2025-09-25 . ^ "Cryptography Is Dead?" . March 2013.^ Dan Boneh at theMathematics Genealogy Project ^ "Google Scholar citations of Boneh-Franklin paper" .^ "Dan Boneh's Publications by Topic" .^ "Dan Boneh's Google Scholar Profile" .^ "Dan Boneh" .Coursera instructor profile . RetrievedApril 8, 2018 .^ "Dan Boneh: 1999 Fellow" . David and Lucile Packard Foundation. Archived fromthe original on May 15, 2017. RetrievedMarch 10, 2017 .^ "Voltage Security, Inc., Corporate Fact Sheet" .Old web site . Archived fromthe original on July 18, 2004. RetrievedMarch 10, 2017 .^ Mary Azevedo (February 20, 2015)."HP set to acquire encryption firm Voltage Security" .RCR Wireless news . RetrievedMarch 10, 2017 . ^ Jeremy C. Owens (February 9, 2015)."Hewlett-Packard buys Cupertino's Voltage Security for data protection" .San Jose Mercury News . RetrievedMarch 10, 2017 . ^ "Stanford computer scientists launch the Center for Blockchain Research" .Stanford School of Engineering . 2018-06-20. Retrieved2018-09-01 .^ Dan Boneh."Online Cryptography Course" . Stanford University. ^ "Cryptography I" .Coursera .^ 2021 Class of Fellows of the AMS , American Mathematical Society, retrieved2020-11-02 ^ Cacm Staff (March 2017), "ACM Recognizes New Fellows",Communications of the ACM ,60 (3): 23,doi :10.1145/3039921 ,S2CID 31701275 .^ ACM Prize in Computing Award Winners , April 11, 2018.^ "Dan Boneh" .Award web page . ACM. RetrievedJuly 12, 2019 .^ ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve Security Archived 2013-06-01 at theWayback Machine ,Association for Computing Machinery , May 29, 2013.^ http://www.securityinfowatch.com/press_release/10610184/co-founder-of-voltage-security-wins-rsa-award (Archive )^ Alfred P. Sloan Foundation ,1999 Annual Report Archived 2014-08-21 at theWayback Machine , February 17, 2014.^ Boneh, Dan -- The David and Lucile Packard Foundation , April 11, 2018.^ Agrawal, Shweta; Boneh, Dan; Boyen, Xavier (2010-05-30). "Efficient Lattice (H)IBE in the Standard Model".Advances in Cryptology – EUROCRYPT 2010 . Lecture Notes in Computer Science. Vol. 6110. Springer, Berlin, Heidelberg. pp. 553– 572.doi :10.1007/978-3-642-13190-5_28 .ISBN 9783642131899 .S2CID 185222 . ^ D Boneh, EJ Goh, K Nissim (April 2006)."Evaluating 2-DNF Formulas on Ciphertexts" (PDF) . {{cite web }}: CS1 maint: multiple names: authors list (link )^ A. Bortz, D. Boneh, and P. NandyExposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628 ^ Dan Boneh; Joseph Bonneau; Benedikt Bünz; Ben Fisch (12 June 2018)."Verifiable Delay Functions" (PDF) .International Association for Cryptologic Research . Retrieved23 February 2018 . ^ Gaby G. Dagher; Benedikt Bünz; Joseph Bonneau; Jeremy Clark; Dan Boneh (26 October 2015)."Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges" (PDF) .International Association for Cryptologic Research . Retrieved23 February 2016 . ^ A. Bittau; et al. (July 2010)."Cryptographic protection of TCP Streams (tcpcrypt)" .IETF draft . Archived fromthe original on 2010-08-21. ^ Andrea Bittau; et al. (2010-08-13).The case for ubiquitous transport-level encryption (PDF) . 19th USENIX Security Symposium. ^ B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. MitchellStronger Password Authentication Using Browser Extensions Usenix security 2005 ^ "Security experts unveil defense against phishing" . 2005-07-27.
International National Academics Other