Skip to main content

and
  1. No Access

    Article

    Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation

    In this work, we show how to use indistinguishability obfuscation to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several interesting properti...

    Dan Boneh, Mark Zhandry in Algorithmica (2017)

  2. Article

    Computing on Authenticated Data

    In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slightly homomorphic signatures, or ...

    Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger in Journal of Cryptology (2015)

  3. Article

    Efficient Selective Identity-Based Encryption Without Random Oracles

    We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE...

    Dan Boneh, Xavier Boyen in Journal of Cryptology (2011)

  4. Article

    Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups

    We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an effici...

    Dan Boneh, Xavier Boyen in Journal of Cryptology (2008)

  5. No Access

    Article

    Oblivious signature-based envelope

    We propose a new cryptographic primitive called oblivious signature-based envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a receiver, and has the followi...

    Ninghui Li, Wenliang Du, Dan Boneh in Distributed Computing (2005)

  6. Article

    Short Signatures from the Weil Pairing

    We introduce a short signature scheme based on the Computational Diffie–Hellman assumption on certain elliptic and hyperelliptic curves. For standard security parameters, the signature length is about half t...

    Dan Boneh, Ben Lynn, Hovav Shacham in Journal of Cryptology (2004)

  7. Article

    On the Importance of Eliminating Errors in Cryptographic Computations

    We present a model for attacking various cryptographic schemes by taking advantage of random hardware faults. The model consists of a black-box containing some cryptographic secret. The box interacts with the...

    Dan Boneh, Richard A. DeMillo, Richard J. Lipton in Journal of Cryptology (2001)