- Yahoo Finance
This question was first formalized by Adi Shamir, the co-inventor of the Rivest-Shamir-Adleman algorithm, or RSA, in 1984. The resulting cryptographic concept was called “identity-based encryption.” It took another 17 years until this concept was proven to be secure by Dan Boneh and Matt Franklin using the Weil Pairing.
Lattice-based cryptography, built on the mathematical hard problems in (high-dimensional) lattice theory, is a promising post-quantum cryptography family due to its excellent efficiency, moderate size and strong security. This survey aims to give a general overview on lattice-based cryptography. To this end, the authors begin with the ...
Learn more about what cryptography involves from Dan Boneh, Professor of Computer Science at Stanford University: What does a cryptographer do? Depending on the organization you work for, your day-to-day tasks as a cryptographer might include: Developing cryptographic code
2. Boneh–Franklin scheme. The Boneh-Franklin scheme was the first practical identity-based encryption (IBE) scheme. Proposed in 2001 by Dan Boneh and Matthew K. Franklin, the Boneh-Franklin scheme is based on bilinear maps between groups, such as the Weil pairing on elliptic curves.
Dan Boneh; Patrick Mcdaniel; Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. Ensemble adversarial training: Attacks and defenses. In ...
Boneh, D. (2024). Blum–Goldwasser Public Key Encryption System. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy.
Last Updated: 17 Nov 2023. Download Citation | On Nov 17, 2023, Dan Boneh published Blum–Goldwasser Public Key Encryption System | Find, read and cite all the research you need on ResearchGate.
Dan Boneh. Authors Info & Claims. CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2023 Pages 2785–2799 https://doi.org/10.1145/3576915.3623157. Published: 21 November 2023 Publication History. 0. 25. Metrics. Total Citations 0. Total Downloads 25.
Chicago style: Boneh, Dan, and Matthew Franklin. Identity Based Encryption from the Weil Pairing In Lecture Notes in Computer Science ., 2001.
Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In Proceedings of Eurocrypt'97, volume 1233 of LNCS, pages 37-51.