D-Index & Metrics Best Publications
Computer Science
USA
2023

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 124 Citations 86,241 341 World Ranking 69 National Ranking 43

Research.com Recognitions

Awards & Achievements

2023 - Research.com Computer Science in United States Leader Award

2021 - Fellow of the American Mathematical Society For contributions to cryptography.

2016 - Member of the National Academy of Engineering For contributions to the theory and practice of cryptography and computer security.

2016 - ACM Fellow For contributions to cryptography and computer security.

2014 - ACM Prize in Computing For ground-breaking contributions to the development of pairing-based cryptography and its application in identity-based encryption.

1999 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

Dan Boneh spends much of his time researching Computer security, Encryption, Public-key cryptography, Theoretical computer science and Random oracle. Dan Boneh has researched Computer security in several fields, including Android, Web server, Computer network and World Wide Web. His Encryption research incorporates elements of Discrete mathematics, Tamper resistance, Auxiliary memory, Identity and Abstract machine.

His studies deal with areas such as Cryptosystem, Signature and Scheme, Ciphertext as well as Public-key cryptography. His biological study spans a wide range of topics, including Key generation, Probabilistic encryption, Cryptography, Multilinear map and Attribute-based encryption. The concepts of his Random oracle study are interwoven with issues in Algorithm, Standard model, ID-based encryption and Functional encryption.

His most cited work include:

  • Identity-Based Encryption from the Weil Pairing (5100 citations)
  • Identity-Based Encryption from the Weil Pairing (3054 citations)
  • Public Key Encryption with Keyword Search (2206 citations)

What are the main themes of his work throughout his whole career to date?

Dan Boneh spends much of his time researching Computer security, Encryption, Cryptography, Theoretical computer science and Public-key cryptography. His work deals with themes such as World Wide Web and Internet privacy, which intersect with Computer security. Ciphertext, Probabilistic encryption, Attribute-based encryption, Homomorphic encryption and Functional encryption are the core of his Encryption study.

The various areas that Dan Boneh examines in his Cryptography study include Set, Multilinear map and Server. Dan Boneh studied Theoretical computer science and Random oracle that intersect with Standard model. His Public-key cryptography study frequently links to adjacent areas such as Discrete mathematics.

He most often published in these fields:

  • Computer security (32.35%)
  • Encryption (24.83%)
  • Cryptography (22.78%)

What were the highlights of his more recent work (between 2015-2021)?

  • Cryptography (22.78%)
  • Computer security (32.35%)
  • Theoretical computer science (21.87%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Cryptography, Computer security, Theoretical computer science, Discrete mathematics and Encryption. His Cryptography study incorporates themes from Computer network, Server, Multilinear map and Lattice. His Computer security study which covers JavaScript that intersects with Web storage, Web navigation and Trusted path.

His Theoretical computer science research is multidisciplinary, incorporating perspectives in Signature, Mathematical proof and Public-key cryptography. The concepts of his Discrete mathematics study are interwoven with issues in Leader election, Gas meter prover, Pseudorandom number generator, Security parameter and Verifiable secret sharing. His work on Homomorphic encryption as part of general Encryption study is frequently linked to Transport layer, therefore connecting diverse disciplines of science.

Between 2015 and 2021, his most popular works were:

  • Ensemble Adversarial Training: Attacks and Defenses (1082 citations)
  • The Space of Transferable Adversarial Examples (264 citations)
  • Bulletproofs: Short Proofs for Confidential Transactions and More (179 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

His scientific interests lie mostly in Theoretical computer science, Cryptography, Computer security, Adversarial system and Robustness. His Theoretical computer science research incorporates themes from Scalability, Mathematical proof, Zero-knowledge proof and Pseudorandom number generator. His Cryptography research integrates issues from Multilinear map, Lattice, Functional encryption and Puncturing.

Many of his studies involve connections with topics such as Internet privacy and Computer security. His study explores the link between Robustness and topics such as Perturbation that cross with problems in Affine transformation and Algorithm. His study in Finite field is interdisciplinary in nature, drawing from both Homomorphic encryption and Encryption.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Short Signatures from the Weil Pairing

Dan Boneh;Ben Lynn;Hovav Shacham.
Journal of Cryptology (2004)

5271 Citations

Identity-Based Encryption from the Weil Pairing

Dan Boneh;Matthew Franklin.
SIAM Journal on Computing (2003)

3765 Citations

Public Key Encryption with Keyword Search

Dan Boneh;Giovanni Di Crescenzo;Rafail Ostrovsky;Giuseppe Persiano.
theory and application of cryptographic techniques (2004)

3738 Citations

A fully homomorphic encryption scheme

Dan Boneh;Craig Gentry.
(2009)

2974 Citations

Short Group Signatures.

Dan Boneh;Xavier Boyen;Hovav Shacham.
IACR Cryptology ePrint Archive (2004)

2481 Citations

Aggregate and verifiably encrypted signatures from bilinear maps

Dan Boneh;Craig Gentry;Ben Lynn;Hovav Shacham.
theory and application of cryptographic techniques (2003)

2356 Citations

On the importance of checking cryptographic protocols for faults

Dan Boneh;Richard A. DeMillo;Richard J. Lipton.
theory and application of cryptographic techniques (1997)

2294 Citations

Hierarchical identity based encryption with constant size ciphertext

Dan Boneh;Xavier Boyen;Eu-Jin Goh.
Lecture Notes in Computer Science (2005)

2179 Citations

Efficient selective-ID secure identity-based Encryption without random oracles

Dan Boneh;Xavier Boyen.
Lecture Notes in Computer Science (2004)

2142 Citations

Evaluating 2-DNF formulas on ciphertexts

Dan Boneh;Eu-Jin Goh;Kobbi Nissim.
theory of cryptography conference (2005)

2016 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Dan Boneh

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 350

Yi Mu

Yi Mu

Fujian Normal University

Publications: 277

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 167

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 161

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 127

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 123

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 118

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 111

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 110

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 108

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 106

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 98

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 98

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 96

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 96

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 92

Trending Scientists

Gesualdo Scutari

Gesualdo Scutari

Purdue University West Lafayette

Andy Crabtree

Andy Crabtree

University of Nottingham

Shilun Qiu

Shilun Qiu

Jilin University

Jayaraman Chandrasekhar

Jayaraman Chandrasekhar

Indian Institute of Science

Gabriele Centi

Gabriele Centi

University of Messina

Katharine N. Suding

Katharine N. Suding

University of Colorado Boulder

Peter Lund

Peter Lund

Aarhus University

Markus Kaiser

Markus Kaiser

University of Duisburg-Essen

Hilmar Bading

Hilmar Bading

Heidelberg University

Jeffrey D. Laskin

Jeffrey D. Laskin

Rutgers, The State University of New Jersey

Stephen V. Smith

Stephen V. Smith

University of Hawaii at Manoa

Janet E. McElhaney

Janet E. McElhaney

Health Sciences North

Josep Font

Josep Font

University of Barcelona

Wendy J. Mack

Wendy J. Mack

University of Southern California

Ron T. Gansevoort

Ron T. Gansevoort

University Medical Center Groningen

Mary S. Wolff

Mary S. Wolff

Icahn School of Medicine at Mount Sinai

Something went wrong. Please try again later.