Biography:Dan Boneh

From HandWiki
Short description: Israeli–American professor
Dan Boneh
Dan Boneh 1.jpg
Boneh in 2007
Born1969 (age 54–55)
Alma materPrinceton University (PhD)
Known for
Awards
  • Gödel Prize
  • Selfridge Prize
  • ACM Prize in Computing
  • Sloan Research Fellowship
Scientific career
FieldsCryptography
InstitutionsStanford University
ThesisStudies in Computational Number Theory with Applications to Cryptography (1996)
Doctoral advisorRichard J. Lipton
Doctoral students
  • Craig Gentry

Dan Boneh (/bˈn/; Hebrew: דן בונה‎) is an Israeli–American professor in applied cryptography and computer security at Stanford University.

In 2016, Boneh was elected a member of the National Academy of Engineering for contributions to the theory and practice of cryptography and computer security.

Biography

Born in Israel in 1969,[citation needed] Boneh obtained his Ph.D. in computer science from Princeton University in 1996 under the supervision of Richard J. Lipton.[1][2]

Boneh is one of the principal contributors to the development of pairing-based cryptography, along with Matt Franklin of the University of California, Davis.[3] He joined the faculty of Stanford University in 1997, and became professor of computer science and electrical engineering.[4][5] He teaches massive open online courses on the online learning platform Coursera.[6] In 1999, he was awarded a fellowship from the David and Lucile Packard Foundation.[7] In 2002, he co-founded a company called Voltage Security with three of his students.[8] The company was acquired by Hewlett-Packard in 2015.[9][10]

In 2018, Boneh became co-director (with David Mazières) of the newly founded Center for Blockchain Research at Stanford, predicting at the time that "Blockchains will become increasingly critical to doing business globally."[11] Dr. Boneh is also known for putting his entire introductory cryptography course online for free.[12] The course is also available via Coursera.[13]

Awards

  • 2021 Fellow of the American Mathematical Society[14]
  • 2020 Selfridge Prize with Jonathan Love
  • 2016 Elected to the US National Academy of Engineering
  • 2016 Fellow of the Association for Computing Machinery[15]
  • 2014 ACM Prize in Computing[16] (formerly called the ACM-Infosys Foundation award[17])
  • 2013 Gödel Prize, with Matthew K. Franklin and Antoine Joux, for his work on the Boneh–Franklin scheme[18]
  • 2005 RSA Award[19]
  • 1999 Sloan Research Fellowship[20]
  • 1999 Packard Award[21]

Publications

Some of Boneh's results in cryptography include:

  • 2018: Verifiable Delay Functions[22]
  • 2015: Privacy-preserving proofs of solvency for Bitcoin exchanges[23]
  • 2010: Efficient Identity-Based Encryption from Learning with Errors Assumption (with Shweta Agrawal and Xavier Boyen)[24]
  • 2010: He was involved in designing tcpcrypt, TCP extensions for transport-level security[25][26]
  • 2005: A partially homomorphic cryptosystem (with Eu-Jin Goh and Kobbi Nissim)[27]
  • 2005: The first broadcast encryption system with full collision resistance (with Craig Gentry and Brent Waters)
  • 2003: A timing attack on OpenSSL (with David Brumley)
  • 2001: An efficient identity-based encryption system (with Matt Franklin) based on the Weil pairing.[28]
  • 1999: Cryptanalysis of RSA when the private key is less than N0.292 (with Glenn Durfee)
  • 1997: Fault-based cryptanalysis of public-key systems (with Richard J. Lipton and Richard DeMillo)
  • 1995: Collision resistant fingerprinting codes for digital data (with James Shaw)
  • 1995: Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)

Some of his contributions in computer security include:

  • 2007: "Show[ing] that the time web sites take to respond to HTTP requests can leak private information."[29]
  • 2005: PwdHash a browser extension that transparently produces a different password for each site[30][31]

References

  1. "Cryptography Is Dead?". March 2013. http://rjlipton.wordpress.com/2013/03/02/cryptography-is-dead/. 
  2. Dan Boneh at the Mathematics Genealogy Project
  3. "Google Scholar citations of Boneh-Franklin paper". https://scholar.google.com/scholar?cites=1257489057529642161&as_sdt=2005&sciodt=0,5&hl=en. 
  4. "Dan Boneh's Publications by Topic". http://crypto.stanford.edu/~dabo/pubs/pubsbytopic.html. 
  5. "Dan Boneh's Google Scholar Profile". https://scholar.google.com/scholar?q=%22Dan+Boneh%22. 
  6. "Dan Boneh". Coursera instructor profile. https://en.coursera.org/instructor/~774. 
  7. "Dan Boneh: 1999 Fellow". David and Lucile Packard Foundation. https://www.packard.org/what-we-fund/conservation-and-science/science/packard-fellowships-for-science-and-engineering/fellowship-directory/boneh-dan/. 
  8. "Voltage Security, Inc., Corporate Fact Sheet". Old web site. http://www.voltage.com/about/factsheet.htm. 
  9. Mary Azevedo (February 20, 2015). "HP set to acquire encryption firm Voltage Security". RCR Wireless news. http://www.rcrwireless.com/20150220/telecom-software/hp-set-acquire-voltage-security. 
  10. Jeremy C. Owens (February 9, 2015). "Hewlett-Packard buys Cupertino's Voltage Security for data protection". San Jose Mercury News. http://www.mercurynews.com/2015/02/09/biz-break-hewlett-packard-buys-cupertinos-voltage-security-for-data-protection/. 
  11. "Stanford computer scientists launch the Center for Blockchain Research" (in en). Stanford School of Engineering. 2018-06-20. https://engineering.stanford.edu/news/stanford-computer-scientists-launch-center-blockchain-research. 
  12. Dan Boneh. "Online Cryptography Course". Stanford University. https://crypto.stanford.edu/~dabo/courses/OnlineCrypto. 
  13. "Cryptography I". https://www.coursera.org/learn/crypto. 
  14. 2021 Class of Fellows of the AMS, American Mathematical Society, https://www.ams.org/cgi-bin/fellows/fellows_by_year.cgi?year=2021, retrieved 2020-11-02 
  15. Cacm Staff (March 2017), "ACM Recognizes New Fellows", Communications of the ACM 60 (3): 23, doi:10.1145/3039921 .
  16. ACM Prize in Computing Award Winners, April 11, 2018.
  17. "Dan Boneh". Award web page. ACM. https://awards.acm.org/award_winners/boneh_4125431. 
  18. ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve Security , Association for Computing Machinery, May 29, 2013.
  19. http://www.securityinfowatch.com/press_release/10610184/co-founder-of-voltage-security-wins-rsa-award (Archive)
  20. Alfred P. Sloan Foundation, 1999 Annual Report , February 17, 2014.
  21. Boneh, Dan -- The David and Lucile Packard Foundation, April 11, 2018.
  22. "Verifiable Delay Functions". International Association for Cryptologic Research. 12 June 2018. https://eprint.iacr.org/2018/601.pdf. 
  23. "Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges". International Association for Cryptologic Research. 26 October 2015. https://eprint.iacr.org/2015/1008.pdf. 
  24. Agrawal, Shweta; Boneh, Dan; Boyen, Xavier (2010-05-30). "Efficient Lattice (H)IBE in the Standard Model" (in en). Advances in Cryptology – EUROCRYPT 2010. Lecture Notes in Computer Science. 6110. Springer, Berlin, Heidelberg. pp. 553–572. doi:10.1007/978-3-642-13190-5_28. ISBN 9783642131899. 
  25. A. Bittau (July 2010). "Cryptographic protection of TCP Streams (tcpcrypt)". IETF draft. http://tcpcrypt.org/draft-bittau-tcp-crypt.txt. 
  26. Andrea Bittau (2010-08-13). "The case for ubiquitous transport-level encryption". 19th USENIX Security Symposium. http://www.usenix.org/events/sec10/tech/full_papers/Bittau.pdf. 
  27. D Boneh, EJ Goh, K Nissim (April 2006). "Evaluating 2-DNF Formulas on Ciphertexts". https://crypto.stanford.edu/~dabo/papers/2dnf.pdf. 
  28. D. Boneh and M. Franklin. Identity based encryption from the Weil pairing SIAM Journal on Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in proc. of Crypto '2001, LNCS Vol. 2139, Springer-Verlag, pp. 213-229, 2001.
  29. A. Bortz, D. Boneh, and P. Nandy Exposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628
  30. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell Stronger Password Authentication Using Browser Extensions Usenix security 2005
  31. "Security experts unveil defense against phishing". 2005-07-27. http://news.stanford.edu/news/2005/july27/phish-072705.html. 

External links