Dan Boneh

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Dan Boneh
Dan Boneh 1.jpg
Dan Boneh
Born 1969
Israel
Residence U.S
Fields Cryptography
Institutions Stanford University
Alma mater Princeton, 1996
Doctoral advisor Richard J. Lipton
Known for pairing-based cryptography
ID-based encryption
Notable awards Packard Award
Sloan Research Fellowship
Terman Award
RSA Award
Gödel Prize

Dan Boneh (/bˈn/; Hebrew: דן בונה‎‎) is a teacher and researcher in applied cryptography and computer security.

Biography[edit]

Born in Israel in 1969, Boneh obtained his Ph.D. in Computer Science from Princeton University in 1996 under the supervision of Richard J. Lipton.[1][2]

Boneh is one of the principal contributors to the development of pairing-based cryptography from the Weil Pairing, along with Matt Franklin of the University of California, Davis.[3] He joined the faculty of Stanford University in 1997, and became professor of computer science and electrical engineering.[4][5] He teaches massive open online courses on the online learning platform Coursera.[6] In 1999 he was awarded a fellowship from the David and Lucile Packard Foundation.[7] In 2002 he co-founded a company called Voltage Security with three of his students.[8] The company was acquired by Hewlett Packard in 2015.[9][10]

The Association for Computing Machinery awarded him the ACM-Infosys Foundation award in 2014, and he became a Fellow of the Association for Computing Machinery in 2016.[11][12]

Some of Boneh's results in cryptography include:

  • 2015 Privacy-preserving proofs of solvency for Bitcoin exchanges[13]
  • 2010 He was involved in designing tcpcrypt, TCP extensions for transport-level security[14][15]
  • 2005 The first broadcast encryption system with full collusion resistance (with Craig Gentry and Brent Waters)
  • 2003 A timing attack on OpenSSL (with David Brumley)
  • 2001 An efficient identity-based encryption system (with Matt Franklin) based on the Weil pairing.[16]
  • 1999 Cryptanalysis of RSA when the private key is less than N0.292 (with Glenn Durfee)
  • 1997 Fault-based cryptanalysis of public-key systems (with Richard J. Lipton and Richard DeMillo)
  • 1995 Collision resistant fingerprinting codes for digital data (with James Shaw)
  • 1995 Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)

Some of his contributions in computer security include:

  • 2007 "Show[ing] that the time web sites take to respond to HTTP requests can leak private information."[17]
  • 2005 PwdHash a browser extension that transparently produces a different password for each site[18][19]

Boneh's awards include:

References[edit]

  1. ^ "Cryptography Is Dead?". March 2013. 
  2. ^ Dan Boneh at the Mathematics Genealogy Project
  3. ^ "Google Scholar citations of Boneh-Franklin paper". 
  4. ^ "Dan Boneh's Publications by Topic". 
  5. ^ "Dan Boneh's Google Scholar Profile". 
  6. ^ "Dan Boneh". Coursera instructor profile. Retrieved March 10, 2017. 
  7. ^ "Dan Boneh: 1999 Fellow". David and Lucile Packard Foundation. Retrieved March 10, 2017. 
  8. ^ "Voltage Security, Inc., Corporate Fact Sheet". Old web site. Archived from the original on July 18, 2004. Retrieved March 10, 2017. 
  9. ^ Mary Azevedo (February 20, 2015). "HP set to acquire encryption firm Voltage Security". RCR Wireless news. Retrieved March 10, 2017. 
  10. ^ Jeremy C. Owens (February 9, 2015). "Hewlett-Packard buys Cupertino's Voltage Security for data protection". San Jose Mercury News. Retrieved March 10, 2017. 
  11. ^ "ACM Recognizes New Fellows", Communications of the ACM, 60 (3): 23, March 2017, doi:10.1145/3039921 .
  12. ^ "Dan Boneh". Award web page. ACM. Retrieved March 10, 2017. 
  13. ^ Gaby G. Dagher; Benedikt Bünz; Joseph Bonneau; Jeremy Clark; Dan Boneh (26 October 2015). "Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges" (PDF). International Association for Cryptologic Research. Retrieved 23 February 2016. 
  14. ^ A. Bittau; et al. (July 2010). "Cryptographic protection of TCP Streams (tcpcrypt)". IETF draft. Archived from the original on 2010-08-21. 
  15. ^ Andrea Bittau; et al. (2010-08-13). The case for ubiquitous transport-level encryption (PDF). 19th USENIX Security Symposium. 
  16. ^ D. Boneh and M. Franklin. Identity based encryption from the Weil pairing SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in proc. of Crypto '2001, LNCS Vol. 2139, Springer-Verlag, pp. 213-229, 2001.
  17. ^ A. Bortz, D. Boneh, and P. Nandy Exposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628
  18. ^ B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell Stronger Password Authentication Using Browser Extensions Usenix security 2005
  19. ^ "Security experts unveil defense against phishing". 
  20. ^ Alfred P. Sloan Foundation, 1999 Annual Report, February 17, 2014.
  21. ^ http://www.securityinfowatch.com/press_release/10610184/co-founder-of-voltage-security-wins-rsa-award (Archive)
  22. ^ ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve Security, Association for Computing Machinery, May 29, 2013.

External links[edit]