Top Qs
Timeline
Chat
Perspective

Dan Boneh

Israeli–American professor From Wikipedia, the free encyclopedia

Dan Boneh
Remove ads

Dan Boneh (/bˈn/; Hebrew: דן בונה) is an Israeli–American professor in applied cryptography and computer security at Stanford University.

Quick Facts Born, Alma mater ...
Remove ads

In 2016, Boneh was elected a member of the National Academy of Engineering for contributions to the theory and practice of cryptography and computer security.

Remove ads

Biography

Born in Israel in 1969,[citation needed] Boneh obtained his Ph.D. in computer science from Princeton University in 1996 under the supervision of Richard J. Lipton.[1][2]

Boneh is one of the principal contributors to the development of pairing-based cryptography, along with Matt Franklin of the University of California, Davis.[3] He joined the faculty of Stanford University in 1997, and became professor of computer science and electrical engineering.[4][5] He teaches massive open online courses on the online learning platform Coursera.[6] In 1999, he was awarded a fellowship from the David and Lucile Packard Foundation.[7] In 2002, he co-founded a company called Voltage Security with three of his students.[8] The company was acquired by Hewlett-Packard in 2015.[9][10]

In 2018, Boneh became co-director (with David Mazières) of the newly founded Center for Blockchain Research at Stanford, predicting at the time that "Blockchains will become increasingly critical to doing business globally."[11] Dr. Boneh is also known for putting his entire introductory cryptography course online for free.[12] The course is also available via Coursera.[13]

Remove ads

Awards

Remove ads

Publications

Summarize
Perspective

Boneh's primary research focuses is on the area of cryptography where he has worked in numerous areas.

Identity-Based Encryption

In 1984 Adi Shamir proposed the possibility of identity-based encryption (IBE), which allows people to send encrypted messages to each other by using a public key derived from the recipients identity. Boneh, with Matt Franklin, proposed one of the first identity-based encryption schemes based on the Weil pairing. The Boneh-Franklin scheme remains an active area of research. In 2010 Boneh (with Shweta Agrawal and Xavier Boyen) introduced an IBE scheme from the learning with errors assumption.[22]

Homomorphic Encryption

A homomorphic encryption algorithm is one where a user can perform computation on encrypted data, without decrypting it. Boneh's has developed several improvements of homomorphic cryptosystems. For example, with Eu-Jin Goh and Kobbi Nissim in 2005 Boneh proposed a "partially homomorphic cryptosystem".[23]

Timing attacks

Timing attacks are a type of side-channel attack that allows an adversary to attack a security system by studying now long it takes to perform certain calculations. In 2003, Boneh (with David Brumley) proposed one of the first practical timing attacks on OpenSSL that worked over the Internet. He then later showed how to extend the attack, "show[ing] that the time web sites take to respond to HTTP requests can leak private information."[24]

Other significant work

Some of Boneh's other results in cryptography and computer security include:

  • 2018: Verifiable Delay Functions[25]
  • 2015: Privacy-preserving proofs of solvency for Bitcoin exchanges[26]
  • 2010: He was involved in designing tcpcrypt, TCP extensions for transport-level security[27][28]
  • 2005: A partially homomorphic cryptosystem (with Eu-Jin Goh and Kobbi Nissim)
  • 2005: The first broadcast encryption system with full collision resistance (with Craig Gentry and Brent Waters)
  • 1999: Cryptanalysis of RSA when the private key is less than N0.292 (with Glenn Durfee)
  • 1997: Fault-based cryptanalysis of public-key systems (with Richard J. Lipton and Richard DeMillo)
  • 1995: Collision resistant fingerprinting codes for digital data (with James Shaw)
  • 1995: Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)
  • 2005: PwdHash a browser extension that transparently produces a different password for each site[29][30]
Remove ads

References

Loading content...
Loading content...
Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads