His main research concerns Computer security, Verifiable secret sharing, Secret sharing, Secret ballot and Homomorphic secret sharing. His study in Computer security is interdisciplinary in nature, drawing from both Business intelligence and Internet privacy. Josh Benaloh integrates Secret ballot with Receipt in his study.
His work deals with themes such as Theoretical computer science and Shared secret, which intersect with Homomorphic secret sharing. His work carried out in the field of Theoretical computer science brings together such families of science as Plaintext, Ciphertext, Probabilistic encryption, Encryption and Attribute-based encryption. His research integrates issues of Discrete mathematics, Homomorphism, Access structure and Key distribution in his study of Secure multi-party computation.
His primary areas of study are Computer security, Cryptography, Verifiable secret sharing, Key and Internet privacy. His study looks at the intersection of Computer security and topics like Receipt with Coercion. Josh Benaloh has researched Verifiable secret sharing in several fields, including Theoretical computer science and Secret sharing.
His research investigates the link between Key and topics such as Cryptographic nonce that cross with problems in Secure communication. He has included themes like Mandate, Enforcement, Government, The Internet and Law enforcement in his Internet privacy study. His studies deal with areas such as Masking and Access control as well as Encryption.
Josh Benaloh focuses on Computer security, Internet privacy, Cryptography, Ballot and Adversarial system. His research in the fields of End-to-end principle overlaps with other disciplines such as Work. The Internet privacy study combines topics in areas such as Enforcement, Law enforcement, The Internet and Mandate.
The various areas that Josh Benaloh examines in his Cryptography study include Adversary and Information privacy. Representation, Public trust, Publication, Transparency and Verifiable secret sharing are fields of study that intersect with his Ballot research. His work carried out in the field of Adversarial system brings together such families of science as Secrecy and Key.
Internet privacy, Law enforcement, The Internet, Enforcement and Mandate are his primary areas of study. His Internet privacy study integrates concerns from other disciplines, such as Computer security and Key escrow. The study incorporates disciplines such as Government and Data Protection Act 1998 in addition to Key escrow.
His Information privacy study combines topics from a wide range of disciplines, such as Open problem and Cryptography. Josh Benaloh connects Extension with Government in his research.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Electronic online commerce card with customer generated transaction proxy number for online transactions
D. Chase Franklin;Daniel Rosen;Josh Benaloh;Daniel R. Simon.
(1997)
Generalized secret sharing and monotone functions
Josh Cohen Benaloh;Jerry Leichter.
international cryptology conference (1990)
One-way accumulators: a decentralized alternative to digital signatures
Josh Benaloh;Michael de Mare.
theory and application of cryptographic techniques (1994)
Patient controlled encryption: ensuring privacy of electronic medical records
Josh Benaloh;Melissa Chase;Eric Horvitz;Kristin Lauter.
ieee international conference on cloud computing technology and science (2009)
Receipt-free secret-ballot elections (extended abstract)
Josh Benaloh;Dwight Tuinstra.
symposium on the theory of computing (1994)
Secret sharing homomorphisms: keeping shares of a secret secret
Josh Cohen Benaloh.
international cryptology conference (1987)
Verifiable secret-ballot elections
Josh Daniel Cohen Benaloh.
PhD thesis, Yale University, Department of Computer Science Department (1987)
Receipt-Free Secret-Ballot Elections
J. C. Benaloh.
symposium on the theory of computing (1994)
Dense Probabilistic Encryption
Josh Benaloh.
selected areas in cryptography (1999)
Distributing the power of a government to enhance the privacy of voters
Josh C Benaloh;Moti Yung.
principles of distributed computing (1986)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Luxembourg
MIT
Microsoft (United States)
Rice University
Facebook (United States)
University of Michigan–Ann Arbor
Harvard University
University of Cambridge
Columbia University
Columbia University
Tel Aviv University
Washington State University
University of Salento
Palo Alto Research Center
Technical University of Denmark
University of Hohenheim
University of Trieste
Cornell University
Centers for Disease Control and Prevention
University of Göttingen
Florey Institute of Neuroscience and Mental Health
Centre national de la recherche scientifique, CNRS
University of Oxford
Radboud University Nijmegen
University of Toronto
Cornell University