Dan Boneh

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Dan Boneh
Dan Boneh 1.jpg
Dan Boneh
Born 1969
Residence U.S
Fields Cryptography
Institutions Stanford University
Alma mater Princeton, 1996
Doctoral advisor Richard J. Lipton
Known for pairing-based cryptography
ID-based encryption
Notable awards Packard Award
Sloan Research Fellowship
Terman Award
RSA Award
Gödel Prize

Dan Boneh (/bˈn/; Hebrew: דן בונה‎‎) is a teacher and researcher in applied cryptography and computer security.


Born in Israel in 1969, Boneh obtained his Ph.D. in Computer Science from Princeton University in 1996 under the supervision of Richard J. Lipton.[1][2]

Boneh is one of the principal contributors to the development of pairing-based cryptography from the Weil Pairing, along with Matt Franklin of the University of California, Davis.[3] He joined the faculty of Stanford University in 1997, and became professor of computer science and electrical engineering.[4][5] He teaches massive open online courses on the online learning platform Coursera.[6] In 1999 he was awarded a fellowship from the David and Lucile Packard Foundation.[7] In 2002 he co-founded a company called Voltage Security with three of his students.[8] The company was acquired by Hewlett Packard in 2015.[9][10]

The Association for Computing Machinery awarded him the ACM-Infosys Foundation award in 2014, and he became a Fellow of the Association for Computing Machinery in 2016.[11][12]

Some of Boneh's results in cryptography include:

  • 2015 Privacy-preserving proofs of solvency for Bitcoin exchanges[13]
  • 2010 He was involved in designing tcpcrypt, TCP extensions for transport-level security[14][15]
  • 2005 The first broadcast encryption system with full collusion resistance (with Craig Gentry and Brent Waters)
  • 2003 A timing attack on OpenSSL (with David Brumley)
  • 2001 An efficient identity-based encryption system (with Matt Franklin) based on the Weil pairing.[16]
  • 1999 Cryptanalysis of RSA when the private key is less than N0.292 (with Glenn Durfee)
  • 1997 Fault-based cryptanalysis of public-key systems (with Richard J. Lipton and Richard DeMillo)
  • 1995 Collision resistant fingerprinting codes for digital data (with James Shaw)
  • 1995 Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)

Some of his contributions in computer security include:

  • 2007 "Show[ing] that the time web sites take to respond to HTTP requests can leak private information."[17]
  • 2005 PwdHash a browser extension that transparently produces a different password for each site[18][19]

Boneh's awards include:


  1. ^ "Cryptography Is Dead?". March 2013. 
  2. ^ Dan Boneh at the Mathematics Genealogy Project
  3. ^ "Google Scholar citations of Boneh-Franklin paper". 
  4. ^ "Dan Boneh's Publications by Topic". 
  5. ^ "Dan Boneh's Google Scholar Profile". 
  6. ^ "Dan Boneh". Coursera instructor profile. Retrieved March 10, 2017. 
  7. ^ "Dan Boneh: 1999 Fellow". David and Lucile Packard Foundation. Retrieved March 10, 2017. 
  8. ^ "Voltage Security, Inc., Corporate Fact Sheet". Old web site. Archived from the original on July 18, 2004. Retrieved March 10, 2017. 
  9. ^ Mary Azevedo (February 20, 2015). "HP set to acquire encryption firm Voltage Security". RCR Wireless news. Retrieved March 10, 2017. 
  10. ^ Jeremy C. Owens (February 9, 2015). "Hewlett-Packard buys Cupertino's Voltage Security for data protection". San Jose Mercury News. Retrieved March 10, 2017. 
  11. ^ "ACM Recognizes New Fellows", Communications of the ACM, 60 (3): 23, March 2017, doi:10.1145/3039921 .
  12. ^ "Dan Boneh". Award web page. ACM. Retrieved March 10, 2017. 
  13. ^ Gaby G. Dagher; Benedikt Bünz; Joseph Bonneau; Jeremy Clark; Dan Boneh (26 October 2015). "Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges" (PDF). International Association for Cryptologic Research. Retrieved 23 February 2016. 
  14. ^ A. Bittau; et al. (July 2010). "Cryptographic protection of TCP Streams (tcpcrypt)". IETF draft. Archived from the original on 2010-08-21. 
  15. ^ Andrea Bittau; et al. (2010-08-13). The case for ubiquitous transport-level encryption (PDF). 19th USENIX Security Symposium. 
  16. ^ D. Boneh and M. Franklin. Identity based encryption from the Weil pairing SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in proc. of Crypto '2001, LNCS Vol. 2139, Springer-Verlag, pp. 213-229, 2001.
  17. ^ A. Bortz, D. Boneh, and P. Nandy Exposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628
  18. ^ B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell Stronger Password Authentication Using Browser Extensions Usenix security 2005
  19. ^ "Security experts unveil defense against phishing". 
  20. ^ Alfred P. Sloan Foundation, 1999 Annual Report, February 17, 2014.
  21. ^ http://www.securityinfowatch.com/press_release/10610184/co-founder-of-voltage-security-wins-rsa-award (Archive)
  22. ^ ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve Security, Association for Computing Machinery, May 29, 2013.

External links[edit]