Dan Boneh
Dan Boneh (/boʊˈneɪ/; Hebrew: דן בונה) is an Israeli-American professor in applied cryptography and computer security at Stanford University.
Dan Boneh | |
---|---|
![]() Boneh in 2007 | |
Born | 1969 (age 51–52) |
Alma mater | Princeton University (PhD) |
Known for | |
Awards | |
Scientific career | |
Fields | Cryptography |
Institutions | Stanford University |
Thesis | Studies in Computational Number Theory with Applications to Cryptography (1996) |
Doctoral advisor | Richard J. Lipton |
Doctoral students |
Biography
Born in Israel in 1969, Boneh obtained his Ph.D. in Computer Science from Princeton University in 1996 under the supervision of Richard J. Lipton.[1][2]
Boneh is one of the principal contributors to the development of pairing-based cryptography from the Weil Pairing, along with Matt Franklin of the University of California, Davis.[3] He joined the faculty of Stanford University in 1997, and became professor of computer science and electrical engineering.[4][5] He teaches massive open online courses on the online learning platform Coursera.[6] In 1999 he was awarded a fellowship from the David and Lucile Packard Foundation.[7] In 2002, he co-founded a company called Voltage Security with three of his students.[8] The company was acquired by Hewlett-Packard in 2015.[9][10]
In 2018, Boneh became co-director (with David Mazières) of the newly founded Center for Blockchain Research at Stanford, predicting at the time that "Blockchains will become increasingly critical to doing business globally."[11] Dr. Boneh is also known for putting his entire introductory cryptography course online for free.[12] The course is also available via Coursera.[13]
Awards
- 2021 Fellow of the American Mathematical Society[14]
- 2016 Elected to the US National Academy of Engineering
- 2016 Fellow of the Association for Computing Machinery[15]
- 2014 ACM Prize in Computing[16] (formerly called the ACM-Infosys Foundation award[17])
- 2013 Gödel Prize, with Matthew K. Franklin and Antoine Joux, for his work on the Boneh–Franklin scheme[18]
- 2005 RSA Award[19]
- 1999 Sloan Research Fellowship[20]
- 1999 Packard Award[21]
Publications
Some of Boneh's results in cryptography include:
- 2018: Verifiable Delay Functions[22]
- 2015: Privacy-preserving proofs of solvency for Bitcoin exchanges[23]
- 2010: Efficient Identity-Based Encryption from Learning with Errors Assumption (with Shweta Agrawal and Xavier Boyen)[24]
- 2010: He was involved in designing tcpcrypt, TCP extensions for transport-level security[25][26]
- 2005: A partially homomorphic cryptosystem (with Eu-Jin Goh and Kobbi Nissim) [27]
- 2005: The first broadcast encryption system with full collision resistance (with Craig Gentry and Brent Waters)
- 2003: A timing attack on OpenSSL (with David Brumley)
- 2001: An efficient identity-based encryption system (with Matt Franklin) based on the Weil pairing.[28]
- 1999: Cryptanalysis of RSA when the private key is less than N0.292 (with Glenn Durfee)
- 1997: Fault-based cryptanalysis of public-key systems (with Richard J. Lipton and Richard DeMillo)
- 1995: Collision resistant fingerprinting codes for digital data (with James Shaw)
- 1995: Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)
Some of his contributions in computer security include:
References
- "Cryptography Is Dead?". March 2013.
- Dan Boneh at the Mathematics Genealogy Project
- "Google Scholar citations of Boneh-Franklin paper".
- "Dan Boneh's Publications by Topic".
- "Dan Boneh's Google Scholar Profile".
- "Dan Boneh". Coursera instructor profile. Retrieved April 8, 2018.
- "Dan Boneh: 1999 Fellow". David and Lucile Packard Foundation. Retrieved March 10, 2017.
- "Voltage Security, Inc., Corporate Fact Sheet". Old web site. Archived from the original on July 18, 2004. Retrieved March 10, 2017.
- Mary Azevedo (February 20, 2015). "HP set to acquire encryption firm Voltage Security". RCR Wireless news. Retrieved March 10, 2017.
- Jeremy C. Owens (February 9, 2015). "Hewlett-Packard buys Cupertino's Voltage Security for data protection". San Jose Mercury News. Retrieved March 10, 2017.
- "Stanford computer scientists launch the Center for Blockchain Research". Stanford School of Engineering. 2018-06-20. Retrieved 2018-09-01.
- Dan Boneh. "Online Cryptography Course". Stanford University.
- "Cryptography I". Coursera.
- 2021 Class of Fellows of the AMS, American Mathematical Society, retrieved 2020-11-02
- Cacm Staff (March 2017), "ACM Recognizes New Fellows", Communications of the ACM, 60 (3): 23, doi:10.1145/3039921, S2CID 31701275.
- ACM Prize in Computing Award Winners, April 11, 2018.
- "Dan Boneh". Award web page. ACM. Retrieved July 12, 2019.
- ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve Security Archived 2013-06-01 at the Wayback Machine, Association for Computing Machinery, May 29, 2013.
- http://www.securityinfowatch.com/press_release/10610184/co-founder-of-voltage-security-wins-rsa-award (Archive)
- Alfred P. Sloan Foundation, 1999 Annual Report Archived 2014-08-21 at the Wayback Machine, February 17, 2014.
- Boneh, Dan -- The David and Lucile Packard Foundation, April 11, 2018.
- Dan Boneh; Joseph Bonneau; Benedikt Bünz; Ben Fisch (12 June 2018). "Verifiable Delay Functions" (PDF). International Association for Cryptologic Research. Retrieved 23 February 2018.
- Gaby G. Dagher; Benedikt Bünz; Joseph Bonneau; Jeremy Clark; Dan Boneh (26 October 2015). "Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges" (PDF). International Association for Cryptologic Research. Retrieved 23 February 2016.
- Agrawal, Shweta; Boneh, Dan; Boyen, Xavier (2010-05-30). Efficient Lattice (H)IBE in the Standard Model. Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. pp. 553–572. doi:10.1007/978-3-642-13190-5_28. ISBN 9783642131899.
- A. Bittau; et al. (July 2010). "Cryptographic protection of TCP Streams (tcpcrypt)". IETF draft. Archived from the original on 2010-08-21.
- Andrea Bittau; et al. (2010-08-13). The case for ubiquitous transport-level encryption (PDF). 19th USENIX Security Symposium.
- D Boneh, EJ Goh, K Nissim (April 2006). "Evaluating 2-DNF Formulas on Ciphertexts" (PDF).CS1 maint: multiple names: authors list (link)
- D. Boneh and M. Franklin. Identity based encryption from the Weil pairing SIAM Journal on Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in proc. of Crypto '2001, LNCS Vol. 2139, Springer-Verlag, pp. 213-229, 2001.
- A. Bortz, D. Boneh, and P. Nandy Exposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628
- B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell Stronger Password Authentication Using Browser Extensions Usenix security 2005
- "Security experts unveil defense against phishing". 2005-07-27.