Boneh, Dan; Boyle, Elette; Corrigan-Gibbs, Henry; Gilboa, Niv; Ishai, Yuval Arithmetic sketching. (English) Zbl 07799094 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 171-202 (2023). MSC: 94A62 94A60 68Q25 68P25 68P15 68Q17 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 14081, 171--202 (2023; Zbl 07799094) Full Text: DOI
Boneh, Dan; Guan, Jiaxin; Zhandry, Mark A lower bound on the length of signatures based on group actions and generic isogenies. (English) Zbl 1528.94091 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 507-531 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 14008, 507--531 (2023; Zbl 1528.94091) Full Text: DOI
Chen, Binyi; Bünz, Benedikt; Boneh, Dan; Zhang, Zhenfei HyperPlonk: Plonk with linear-time prover and high-degree custom gates. (English) Zbl 07773997 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14005, 499-530 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Chen} et al., Lect. Notes Comput. Sci. 14005, 499--530 (2023; Zbl 07773997) Full Text: DOI
Boneh, Dan; Komlo, Chelsea Threshold signatures with private accountability. (English) Zbl 1517.94182 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13510, 551-581 (2022). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{C. Komlo}, Lect. Notes Comput. Sci. 13510, 551--581 (2022; Zbl 1517.94182) Full Text: DOI
Boneh, Dan; Drake, Justin; Fisch, Ben; Gabizon, Ariel Halo Infinite: proof-carrying data from additive polynomial commitments. (English) Zbl 1485.94061 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 649-680 (2021). MSC: 94A60 68T05 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 12825, 649--680 (2021; Zbl 1485.94061) Full Text: DOI
Boneh, Dan; Eskandarian, Saba; Kim, Sam; Shih, Maurice Improving speed and security in updatable encryption schemes. (English) Zbl 1511.94059 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 559-589 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 12493, 559--589 (2020; Zbl 1511.94059) Full Text: DOI
Boneh, Dan; Kogan, Dmitry; Woo, Katharine Oblivious pseudorandom functions from isogenies. (English) Zbl 1511.94060 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 520-550 (2020). MSC: 94A60 14K02 14H52 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 12492, 520--550 (2020; Zbl 1511.94060) Full Text: DOI
Love, Jonathan; Boneh, Dan Supersingular curves with small noninteger endomorphisms. (English) Zbl 1460.11093 Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 7-22 (2020). MSC: 11G20 14H52 PDFBibTeX XMLCite \textit{J. Love} and \textit{D. Boneh}, Open Book Ser. 4, 7--22 (2020; Zbl 1460.11093) Full Text: DOI arXiv
Wahby, Riad S.; Boneh, Dan; Jeffrey, Christopher; Poon, Joseph An airdrop that preserves recipient privacy. (English) Zbl 1459.94145 Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 444-463 (2020). MSC: 94A60 94A62 91B64 91G20 PDFBibTeX XMLCite \textit{R. S. Wahby} et al., Lect. Notes Comput. Sci. 12059, 444--463 (2020; Zbl 1459.94145) Full Text: DOI
Bünz, Benedikt; Agrawal, Shashank; Zamani, Mahdi; Boneh, Dan Zether: towards privacy in a smart contract world. (English) Zbl 1459.94101 Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 423-443 (2020). MSC: 94A60 91B64 91G20 PDFBibTeX XMLCite \textit{B. Bünz} et al., Lect. Notes Comput. Sci. 12059, 423--443 (2020; Zbl 1459.94101) Full Text: DOI
Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; Silverberg, Alice; Tibouchi, Mehdi; Zhandry, Mark Multiparty non-interactive key exchange and more from isogenies on elliptic curves. (English) Zbl 1445.14043 J. Math. Cryptol. 14, 5-14 (2020). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14G50 94A60 14K02 14H52 14Q20 PDFBibTeX XMLCite \textit{D. Boneh} et al., J. Math. Cryptol. 14, 5--14 (2020; Zbl 1445.14043) Full Text: DOI arXiv
Boneh, Dan; Bünz, Benedikt; Fisch, Ben Batching techniques for accumulators with applications to IOPs and stateless blockchains. (English) Zbl 1456.94051 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 561-586 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 11692, 561--586 (2019; Zbl 1456.94051) Full Text: DOI
Boneh, Dan; Boyle, Elette; Corrigan-Gibbs, Henry; Gilboa, Niv; Ishai, Yuval Zero-knowledge proofs on secret-shared data via fully linear PCPs. (English) Zbl 1436.94043 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 67-97 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 11694, 67--97 (2019; Zbl 1436.94043) Full Text: DOI
Boneh, Dan; Gennaro, Rosario; Goldfeder, Steven Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security. (English) Zbl 1454.94112 Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 352-377 (2019). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 11368, 352--377 (2019; Zbl 1454.94112) Full Text: DOI
Boneh, Dan; Eskandarian, Saba; Fisch, Ben Post-quantum EPID signatures from symmetric primitives. (English) Zbl 1509.94152 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 251-271 (2019). MSC: 94A62 94A60 81P94 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 11405, 251--271 (2019; Zbl 1509.94152) Full Text: DOI
Boneh, Dan; Drijvers, Manu; Neven, Gregory Compact multi-signatures for smaller blockchains. (English) Zbl 1446.94105 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 435-464 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 11273, 435--464 (2018; Zbl 1446.94105) Full Text: DOI
Boneh, Dan; Ishai, Yuval; Passelègue, Alain; Sahai, Amit; Wu, David J. Exploring crypto dark matter: new simple PRF candidates and their applications. (English) Zbl 1430.94059 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 699-729 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 11240, 699--729 (2018; Zbl 1430.94059) Full Text: DOI
Boneh, Dan; Bonneau, Joseph; Bünz, Benedikt; Fisch, Ben Verifiable delay functions. (English) Zbl 1444.94046 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 757-788 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10991, 757--788 (2018; Zbl 1444.94046) Full Text: DOI
Boneh, Dan; Gennaro, Rosario; Goldfeder, Steven; Jain, Aayush; Kim, Sam; Rasmussen, Peter M. R.; Sahai, Amit Threshold cryptosystems from threshold fully homomorphic encryption. (English) Zbl 1444.94047 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 565-596 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10991, 565--596 (2018; Zbl 1444.94047) Full Text: DOI
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J. Quasi-optimal SNARGs via linear multi-prover interactive proofs. (English) Zbl 1415.94413 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10822, 222-255 (2018). MSC: 94A60 68Q17 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10822, 222--255 (2018; Zbl 1415.94413) Full Text: DOI
Boneh, Dan; Kim, Sam; Nikolaenko, Valeria Lattice-based DAPS and generalizations: self-enforcement in signature schemes. (English) Zbl 1521.94033 Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 457-477 (2017). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10355, 457--477 (2017; Zbl 1521.94033) Full Text: DOI
Boneh, Dan; Kim, Sam; Wu, David J. Constrained keys for invertible pseudorandom functions. (English) Zbl 1410.94050 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10677, 237-263 (2017). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10677, 237--263 (2017; Zbl 1410.94050) Full Text: DOI
Boneh, Dan; Zhandry, Mark Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. (English) Zbl 1405.94045 Algorithmica 79, No. 4, 1233-1285 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Zhandry}, Algorithmica 79, No. 4, 1233--1285 (2017; Zbl 1405.94045) Full Text: DOI Link
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J. Lattice-based SNARGs and their application to more efficient obfuscation. (English) Zbl 1415.94412 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10212, 247-277 (2017). MSC: 94A60 68Q17 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10212, 247--277 (2017; Zbl 1415.94412) Full Text: DOI
Boneh, Dan; Kim, Sam; Montgomery, Hart Private puncturable PRFs from standard lattice assumptions. (English) Zbl 1410.94049 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10210, 415-445 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10210, 415--445 (2017; Zbl 1410.94049) Full Text: DOI
Boneh, Dan; Lewi, Kevin; Wu, David J. Constraining pseudorandom functions privately. (English) Zbl 1400.94124 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 494-524 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10175, 494--524 (2017; Zbl 1400.94124) Full Text: DOI
Boneh, Dan; Gueron, Shay Surnaming schemes, fast verification, and applications to SGX technology. (English) Zbl 1383.94013 Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 149-164 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{S. Gueron}, Lect. Notes Comput. Sci. 10159, 149--164 (2017; Zbl 1383.94013) Full Text: DOI
Boneh, Dan; Corrigan-Gibbs, Henry; Schechter, Stuart Balloon hashing: a memory-hard function providing provable protection against sequential attacks. (English) Zbl 1404.94043 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 220-248 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10031, 220--248 (2016; Zbl 1404.94043) Full Text: DOI
Boneh, Dan; Lewi, Kevin; Raykova, Mariana; Sahai, Amit; Zhandry, Mark; Zimmerman, Joe Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. (English) Zbl 1375.94105 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 563-594 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 9057, 563--594 (2015; Zbl 1375.94105) Full Text: DOI
Boneh, Dan; Gupta, Divya; Mironov, Ilya; Sahai, Amit Hosting services on an untrusted cloud. (English) Zbl 1371.94626 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 404-436 (2015). MSC: 94A60 68P25 68M11 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 9057, 404--436 (2015; Zbl 1371.94626) Full Text: DOI
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent Computing on authenticated data. (English) Zbl 1314.94100 J. Cryptology 28, No. 2, 351-395 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{J. H. Ahn} et al., J. Cryptology 28, No. 2, 351--395 (2015; Zbl 1314.94100) Full Text: DOI
Boneh, Dan; Corrigan-Gibbs, Henry Bivariate polynomials modulo composites and their applications. (English) Zbl 1306.94032 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 42-62 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{H. Corrigan-Gibbs}, Lect. Notes Comput. Sci. 8873, 42--62 (2014; Zbl 1306.94032) Full Text: DOI
Boneh, Dan; Zhandry, Mark Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. (English) Zbl 1310.94130 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 480-499 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Zhandry}, Lect. Notes Comput. Sci. 8616, 480--499 (2014; Zbl 1310.94130) Full Text: DOI
Boneh, Dan; Waters, Brent; Zhandry, Mark Low overhead broadcast encryption from multilinear maps. (English) Zbl 1317.94087 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 206-223 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 8616, 206--223 (2014; Zbl 1317.94087) Full Text: DOI
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. (English) Zbl 1327.94035 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 533-556 (2014). MSC: 94A60 94C05 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 8441, 533--556 (2014; Zbl 1327.94035) Full Text: DOI
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J. Private database queries using somewhat homomorphic encryption. (English) Zbl 1330.94037 Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 102-118 (2013). MSC: 94A60 68P15 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 7954, 102--118 (2013; Zbl 1330.94037) Full Text: DOI
Boneh, Dan; Raghunathan, Ananth; Segev, Gil Function-private subspace-membership encryption and its applications. (English) Zbl 1327.94036 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 255-275 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 8269, 255--275 (2013; Zbl 1327.94036) Full Text: DOI
Boneh, Dan; Waters, Brent Constrained pseudorandom functions and their applications. (English) Zbl 1314.94057 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 280-300 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{B. Waters}, Lect. Notes Comput. Sci. 8270, 280--300 (2013; Zbl 1314.94057) Full Text: DOI
Boneh, Dan; Raghunathan, Ananth; Segev, Gil Function-private identity-based encryption: hiding the function in functional encryption. (English) Zbl 1311.94071 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 461-478 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 8043, 461--478 (2013; Zbl 1311.94071) Full Text: DOI
Boneh, Dan; Zhandry, Mark Secure signatures and chosen ciphertext security in a quantum computing world. (English) Zbl 1317.81074 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 361-379 (2013). MSC: 81P94 94A62 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Zhandry}, Lect. Notes Comput. Sci. 8043, 361--379 (2013; Zbl 1317.81074) Full Text: DOI
Boneh, Dan; Lewi, Kevin; Montgomery, Hart; Raghunathan, Ananth Key homomorphic PRFs and their applications. (English) Zbl 1310.94129 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 410-428 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 8042, 410--428 (2013; Zbl 1310.94129) Full Text: DOI
Abadi, Martín; Boneh, Dan; Mironov, Ilya; Raghunathan, Ananth; Segev, Gil Message-locked encryption for lock-dependent messages. (English) Zbl 1310.94120 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 374-391 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abadi} et al., Lect. Notes Comput. Sci. 8042, 374--391 (2013; Zbl 1310.94120) Full Text: DOI
Boneh, Dan; Zhandry, Mark Quantum-secure message authentication codes. (English) Zbl 1312.94111 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 592-608 (2013). MSC: 94A62 81P68 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Zhandry}, Lect. Notes Comput. Sci. 7881, 592--608 (2013; Zbl 1312.94111) Full Text: DOI
Boneh, Dan; Segev, Gil; Waters, Brent Targeted malleability: homomorphic encryption for restricted computations. (English) Zbl 1347.68119 Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 350-366 (2012). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., in: Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS'12, Cambridge, MA, USA, January 8--10, 2012. New York, NY: Association for Computing Machinery (ACM). 350--366 (2012; Zbl 1347.68119) Full Text: DOI
Boneh, Dan Pairing-based cryptography: past, present, and future. (English) Zbl 1292.94034 Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 1 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh}, Lect. Notes Comput. Sci. 7658, 1 (2012; Zbl 1292.94034) Full Text: DOI
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent Computing on authenticated data. (English) Zbl 1292.94017 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{J. H. Ahn} et al., Lect. Notes Comput. Sci. 7194, 1--20 (2012; Zbl 1292.94017) Full Text: DOI
Boneh, Dan; Boyen, Xavier Efficient selective identity-based encryption without random oracles. (English) Zbl 1251.94022 J. Cryptology 24, No. 4, 659-693 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{X. Boyen}, J. Cryptology 24, No. 4, 659--693 (2011; Zbl 1251.94022) Full Text: DOI Link
Boneh, Dan; Dagdelen, Özgür; Fischlin, Marc; Lehmann, Anja; Schaffner, Christian; Zhandry, Mark Random oracles in a quantum world. (English) Zbl 1227.94033 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 41-69 (2011). MSC: 94A60 81P94 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 7073, 41--69 (2011; Zbl 1227.94033) Full Text: DOI arXiv
Boneh, Dan; Freeman, David Mandell Homomorphic signatures for polynomial functions. (English) Zbl 1281.94072 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 149-168 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{D. M. Freeman}, Lect. Notes Comput. Sci. 6632, 149--168 (2011; Zbl 1281.94072) Full Text: DOI
Boneh, Dan; Sahai, Amit; Waters, Brent Functional encryption: definitions and challenges. (English) Zbl 1295.94027 Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 253-273 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 6597, 253--273 (2011; Zbl 1295.94027) Full Text: DOI
Boneh, D.; Rubin, K.; Silverberg, A. Finding composite order ordinary elliptic curves using the Cocks-Pinch method. (English) Zbl 1217.11061 J. Number Theory 131, No. 5, 832-841 (2011). MSC: 11G05 94A60 14G50 PDFBibTeX XMLCite \textit{D. Boneh} et al., J. Number Theory 131, No. 5, 832--841 (2011; Zbl 1217.11061) Full Text: DOI
Boneh, Dan; Freeman, David Mandell Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. (English) Zbl 1291.94181 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 1-16 (2011). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{D. M. Freeman}, Lect. Notes Comput. Sci. 6571, 1--16 (2011; Zbl 1291.94181) Full Text: DOI
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. (English) Zbl 1280.94035 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 98-115 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 6223, 98--115 (2010; Zbl 1280.94035) Full Text: DOI
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier Efficient lattice (H)IBE in the standard model. (English) Zbl 1227.94022 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 553-572 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 6110, 553--572 (2010; Zbl 1227.94022) Full Text: DOI
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier; Freeman, David Mandell Preventing pollution attacks in multi-source network coding. (English) Zbl 1279.94050 Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 161-176 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 6056, 161--176 (2010; Zbl 1279.94050) Full Text: DOI
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent Signing a linear subspace: Signature schemes for network coding. (English) Zbl 1227.68024 Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 68-87 (2009). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 5443, 68--87 (2009; Zbl 1227.68024) Full Text: DOI
Boneh, Dan; Hamburg, Michael Generalized identity based and broadcast encryption schemes. (English) Zbl 1206.94054 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 455-470 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Hamburg}, Lect. Notes Comput. Sci. 5350, 455--470 (2008; Zbl 1206.94054) Full Text: DOI
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail Circular-secure encryption from decision Diffie-Hellman. (English) Zbl 1183.94025 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 108-125 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 5157, 108--125 (2008; Zbl 1183.94025) Full Text: DOI
Boneh, Dan; Boyen, Xavier Short signatures without random oracles and the SDH assumption in bilinear groups. (English) Zbl 1140.94373 J. Cryptology 21, No. 2, 149-177 (2008). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{X. Boyen}, J. Cryptology 21, No. 2, 149--177 (2008; Zbl 1140.94373) Full Text: DOI
Boneh, Dan; Kushilevitz, Eyal; Ostrovsky, Rafail; Skeith, William E. III Public key encryption that allows PIR queries. (English) Zbl 1215.68096 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 50-67 (2007). MSC: 68P25 68P15 68P20 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 4622, 50--67 (2007; Zbl 1215.68096) Full Text: DOI
Boneh, Dan Bilinear groups of composite order. (English) Zbl 1151.94484 Takagi, Tsuyoshi (ed.) et al., Pairing-based cryptography – Pairing 2007. First international conference, Tokyo, Japan, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73488-8/pbk). Lecture Notes in Computer Science 4575, 1 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh}, Lect. Notes Comput. Sci. 4575, 1 (2007; Zbl 1151.94484) Full Text: DOI
Boneh, Dan; Waters, Brent Conjunctive, subset, and range queries on encrypted data. (English) Zbl 1156.94335 Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 535-554 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{B. Waters}, Lect. Notes Comput. Sci. 4392, 535--554 (2007; Zbl 1156.94335) Full Text: DOI
Barth, Adam; Boneh, Dan; Waters, Brent Privacy in encrypted content distribution using private broadcast encryption. (English) Zbl 1152.94402 Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 52-64 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Barth} et al., Lect. Notes Comput. Sci. 4107, 52--64 (2006; Zbl 1152.94402) Full Text: DOI
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan Chosen-ciphertext security from identity-based encryption. (English) Zbl 1138.94010 SIAM J. Comput. 36, No. 5, 1301-1328 (2006). Reviewer: Nicolae Constantinescu (Craiova) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Boneh} et al., SIAM J. Comput. 36, No. 5, 1301--1328 (2006; Zbl 1138.94010) Full Text: DOI
Boneh, Dan; Sahai, Amit; Waters, Brent Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 4004, 573--592 (2006; Zbl 1140.94326) Full Text: DOI
Boneh, Dan; Boyen, Xavier On the impossibility of efficiently combining collision resistant hash functions. (English) Zbl 1138.94347 Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 570-583 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{X. Boyen}, Lect. Notes Comput. Sci. 4117, 570--583 (2006; Zbl 1138.94347) Full Text: DOI
Boneh, Dan; Shen, Emily; Waters, Brent Strongly unforgeable signatures based on computational Diffie-Hellman. (English) Zbl 1151.94485 Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 229-240 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3958, 229--240 (2006; Zbl 1151.94485) Full Text: DOI
Boneh, Dan; Boyen, Xavier; Halevi, Shai Chosen ciphertext secure public key threshold encryption without random oracles. (English) Zbl 1125.94012 Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 226-243 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3860, 226--243 (2006; Zbl 1125.94012) Full Text: DOI
Li, Ninghui; Du, Wenliang; Boneh, Dan Oblivious signature-based envelope. (English) Zbl 1264.94101 Distrib. Comput. 17, No. 4, 293-302 (2005). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{N. Li} et al., Distrib. Comput. 17, No. 4, 293--302 (2005; Zbl 1264.94101) Full Text: DOI
Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin Hierarchical identity based encryption with constant size ciphertext. (English) Zbl 1137.94340 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 440-456 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3494, 440--456 (2005; Zbl 1137.94340) Full Text: DOI
Boneh, Dan; Gentry, Craig; Waters, Brent Collusion resistant broadcast encryption with short ciphertexts and private keys. (English) Zbl 1145.94434 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 258-275 (2005). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3621, 258--275 (2005; Zbl 1145.94434) Full Text: DOI
Boneh, Dan; Katz, Jonathan Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. (English) Zbl 1079.94535 Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 87-103 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{J. Katz}, Lect. Notes Comput. Sci. 3376, 87--103 (2005; Zbl 1079.94535) Full Text: DOI
Boneh, Dan; Goh, Eu-Jin; Nissim, Kobbi Evaluating 2-DNF formulas on ciphertexts. (English) Zbl 1079.94534 Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 325-341 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3378, 325--341 (2005; Zbl 1079.94534) Full Text: DOI
Boneh, Dan; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe Public key encryption with keyword search. (English) Zbl 1122.68424 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 506-522 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3027, 506--522 (2004; Zbl 1122.68424) Full Text: DOI
Boneh, Dan; Boyen, Xavier Efficient selective-id secure identity-based encryption without random oracles. (English) Zbl 1122.94355 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 223-238 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{X. Boyen}, Lect. Notes Comput. Sci. 3027, 223--238 (2004; Zbl 1122.94355) Full Text: DOI
Boneh, Dan; Boyen, Xavier Short signatures without random oracles. (English) Zbl 1122.94354 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 56-73 (2004). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{X. Boyen}, Lect. Notes Comput. Sci. 3027, 56--73 (2004; Zbl 1122.94354) Full Text: DOI
Boneh, Dan; Boyen, Xavier; Shacham, Hovav Short group signatures. (English) Zbl 1104.94044 Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 41-55 (2004). MSC: 94A62 11T71 14G50 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 3152, 41--55 (2004; Zbl 1104.94044) Full Text: DOI
Boneh, Dan; Boyen, Xavier Secure identity based encryption without random oracles. (English) Zbl 1104.94019 Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 443-459 (2004). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{X. Boyen}, Lect. Notes Comput. Sci. 3152, 443--459 (2004; Zbl 1104.94019) Full Text: DOI
Boneh, Dan; Lynn, Ben; Shacham, Hovav Short signatures from the Weil pairing. (English) Zbl 1070.94010 J. Cryptology 17, No. 4, 297-319 (2004). Reviewer: Carlos Munuera (Valladolid) MSC: 94A62 11T71 14G50 PDFBibTeX XMLCite \textit{D. Boneh} et al., J. Cryptology 17, No. 4, 297--319 (2004; Zbl 1070.94010) Full Text: DOI
Li, Ninghui; Du, Wenliang; Boneh, Dan Oblivious signature-based envelope. (English) Zbl 1321.94075 Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC ’03, Boston, MA, USA, July 13–16, 2003. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-708-7). 182-189 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{N. Li} et al., in: Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC '03, Boston, MA, USA, July 13--16, 2003. New York, NY: Association for Computing Machinery (ACM). 182--189 (2003; Zbl 1321.94075) Full Text: DOI
Jacob, Matthias; Boneh, Dan; Felten, Edward Attacking an obfuscated cipher by injecting faults. (English) Zbl 1327.94054 Feigenbaum, Joan (ed.), Digital rights management. ACM CCS-9 workshop, DRM 2002, Washington, DC, USA, November 18, 2002. Revised papers. Berlin: Springer (ISBN 3-540-40410-4/pbk). Lecture Notes in Computer Science 2696, 16-31 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Jacob} et al., Lect. Notes Comput. Sci. 2696, 16--31 (2003; Zbl 1327.94054) Full Text: DOI
Goh, Eu-Jin; Boneh, Dan; Pinkas, Benny; Golle, Philippe The design and implementation of protocol-based hidden key recovery. (English) Zbl 1255.94055 Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 165-179 (2003). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{E.-J. Goh} et al., Lect. Notes Comput. Sci. 2851, 165--179 (2003; Zbl 1255.94055) Full Text: DOI
Boneh, Dan (ed.) Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. (English) Zbl 1027.00041 Lecture Notes in Computer Science. 2729. Berlin: Springer. xii, 631 p. (2003). MSC: 00B25 94-06 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{D. Boneh} (ed.), Advances in cryptology -- CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17--21, 2003. Proceedings. Berlin: Springer (2003; Zbl 1027.00041) Full Text: DOI Link
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav Aggregate and verifiably encrypted signatures from bilinear maps. (English) Zbl 1038.94553 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 416-432 (2003). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 2656, 416--432 (2003; Zbl 1038.94553) Full Text: Link
Boneh, Dan; Silverberg, Alice Applications of multilinear forms to cryptography. (English) Zbl 1030.94032 Melles, Caroline Grant (ed.) et al., Topics in algebraic and noncommutative geometry. Proceedings in memory of Ruth Michler, Luminy, France, July 20-22, 2001 and Annapolis, MD, USA, October 25-28, 2001. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 324, 71-90 (2003). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{A. Silverberg}, Contemp. Math. 324, 71--90 (2003; Zbl 1030.94032)
Boneh, Dan; Mironov, Ilya; Shoup, Victor A secure signature scheme from bilinear maps. (English) Zbl 1039.94522 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 98-110 (2003). MSC: 94A62 68Q25 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 2612, 98--110 (2003; Zbl 1039.94522) Full Text: Link
Boneh, Dan; Franklin, Matthew Identity-based encryption from the Weil pairing. (English) Zbl 1046.94008 SIAM J. Comput. 32, No. 3, 586-615 (2003). Reviewer: Tanja Lange (Bochum) MSC: 94A60 11T71 68P25 14G50 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Franklin}, SIAM J. Comput. 32, No. 3, 586--615 (2003; Zbl 1046.94008) Full Text: DOI
Golle, Philippe; Zhong, Sheng; Boneh, Dan; Jakobsson, Markus; Juels, Ari Optimistic mixing for exit-polls. (English) Zbl 1065.94548 Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 451-465 (2002). MSC: 94A60 91B10 68P25 PDFBibTeX XMLCite \textit{P. Golle} et al., Lect. Notes Comput. Sci. 2501, 451--465 (2002; Zbl 1065.94548) Full Text: DOI
Boneh, Dan Finding smooth integers in short intervals using CRT decoding. (English) Zbl 1052.68036 J. Comput. Syst. Sci. 64, No. 4, 768-784 (2002). MSC: 68P30 94B35 PDFBibTeX XMLCite \textit{D. Boneh}, J. Comput. Syst. Sci. 64, No. 4, 768--784 (2002; Zbl 1052.68036) Full Text: DOI Link
Boneh, Dan; Franklin, Matthew Efficient generation of shared RSA keys. (English) Zbl 1127.94340 J. ACM 48, No. 4, 702-722 (2001). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Franklin}, J. ACM 48, No. 4, 702--722 (2001; Zbl 1127.94340) Full Text: DOI
Boneh, Dan; Lynn, Ben; Shacham, Hovav Short signatures from the Weil pairing. (English) Zbl 1064.94554 Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 514-532 (2001). MSC: 94A62 14G50 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 2248, 514--532 (2001; Zbl 1064.94554) Full Text: Link
Boneh, Dan; Halevi, Shai; Howgrave-Graham, Nick The modular inversion hidden number problem. (English) Zbl 1062.94545 Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 36-51 (2001). MSC: 94A60 11T71 68Q25 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 2248, 36--51 (2001; Zbl 1062.94545) Full Text: Link
Boneh, Dan Simplified OAEP for the RSA and Rabin functions. (English) Zbl 1002.94526 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 275-291 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh}, Lect. Notes Comput. Sci. 2139, 275--291 (2001; Zbl 1002.94526) Full Text: Link
Boneh, Dan; Franklin, Matt Identity-based encryption from the Weil pairing. (English) Zbl 1002.94023 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 213-229 (2001). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Franklin}, Lect. Notes Comput. Sci. 2139, 213--229 (2001; Zbl 1002.94023) Full Text: Link
Boneh, Dan; Shparlinski, Igor E. On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme. (English) Zbl 1002.94025 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 201-212 (2001). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{I. E. Shparlinski}, Lect. Notes Comput. Sci. 2139, 201--212 (2001; Zbl 1002.94025) Full Text: Link
Boneh, Dan; Durfee, Glenn; Franklin, Matt Lower bounds for multicast message authentication. (English) Zbl 0981.94037 Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 437-452 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 2045, 437--452 (2001; Zbl 0981.94037) Full Text: Link
Shacham, Hovav; Boneh, Dan Improving SSL handshake performance via batching. (English) Zbl 0972.68071 Naccache, David (ed.), Topics in cryptology - CT-RSA 2001. The cryptographer’s track at RSA conference 2001, San Francisco, CA, USA, April 8-12, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2020, 28-43 (2001). MSC: 68P25 PDFBibTeX XMLCite \textit{H. Shacham} and \textit{D. Boneh}, Lect. Notes Comput. Sci. 2020, 28--43 (2001; Zbl 0972.68071)
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J. On the importance of eliminating errors in cryptographic computations. (English) Zbl 1018.94014 J. Cryptology 14, No. 2, 101-119 (2001). Reviewer: Josef Vyskoč (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., J. Cryptology 14, No. 2, 101--119 (2001; Zbl 1018.94014) Full Text: DOI
Boneh, Dan Finding smooth integers in short intervals using CRT decoding. (English) Zbl 1296.94165 Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 265-272 (2000). MSC: 94B35 PDFBibTeX XMLCite \textit{D. Boneh}, in: Proceedings of the thirty-second annual ACM symposium on theory of computing, STOC 2000. Portland, Oregon, USA, May 21--23, 2000. New York, NY: ACM Press. 265--272 (2000; Zbl 1296.94165) Full Text: DOI
Boneh, Dan; Naor, Moni Timed commitments. (Extended abstract). (English) Zbl 0989.94517 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 236-254 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Naor}, Lect. Notes Comput. Sci. 1880, 236--254 (2000; Zbl 0989.94517)