D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 9,044 74 World Ranking 8901 National Ranking 4093

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His main research concerns Computer security, Verifiable secret sharing, Secret sharing, Secret ballot and Homomorphic secret sharing. His study in Computer security is interdisciplinary in nature, drawing from both Business intelligence and Internet privacy. Josh Benaloh integrates Secret ballot with Receipt in his study.

His work deals with themes such as Theoretical computer science and Shared secret, which intersect with Homomorphic secret sharing. His work carried out in the field of Theoretical computer science brings together such families of science as Plaintext, Ciphertext, Probabilistic encryption, Encryption and Attribute-based encryption. His research integrates issues of Discrete mathematics, Homomorphism, Access structure and Key distribution in his study of Secure multi-party computation.

His most cited work include:

  • Electronic online commerce card with customer generated transaction proxy number for online transactions (667 citations)
  • Generalized secret sharing and monotone functions (568 citations)
  • One-way accumulators: a decentralized alternative to digital signatures (425 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Cryptography, Verifiable secret sharing, Key and Internet privacy. His study looks at the intersection of Computer security and topics like Receipt with Coercion. Josh Benaloh has researched Verifiable secret sharing in several fields, including Theoretical computer science and Secret sharing.

His research investigates the link between Key and topics such as Cryptographic nonce that cross with problems in Secure communication. He has included themes like Mandate, Enforcement, Government, The Internet and Law enforcement in his Internet privacy study. His studies deal with areas such as Masking and Access control as well as Encryption.

He most often published in these fields:

  • Computer security (50.68%)
  • Cryptography (24.66%)
  • Verifiable secret sharing (19.18%)

What were the highlights of his more recent work (between 2014-2019)?

  • Computer security (50.68%)
  • Internet privacy (16.44%)
  • Cryptography (24.66%)

In recent papers he was focusing on the following fields of study:

Josh Benaloh focuses on Computer security, Internet privacy, Cryptography, Ballot and Adversarial system. His research in the fields of End-to-end principle overlaps with other disciplines such as Work. The Internet privacy study combines topics in areas such as Enforcement, Law enforcement, The Internet and Mandate.

The various areas that Josh Benaloh examines in his Cryptography study include Adversary and Information privacy. Representation, Public trust, Publication, Transparency and Verifiable secret sharing are fields of study that intersect with his Ballot research. His work carried out in the field of Adversarial system brings together such families of science as Secrecy and Key.

Between 2014 and 2019, his most popular works were:

  • Keys under doormats: mandating insecurity by requiring government access to all data and communications (61 citations)
  • Improving Privacy in Cryptographic Elections (23 citations)
  • Keys under doormats (17 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Computer network

Internet privacy, Law enforcement, The Internet, Enforcement and Mandate are his primary areas of study. His Internet privacy study integrates concerns from other disciplines, such as Computer security and Key escrow. The study incorporates disciplines such as Government and Data Protection Act 1998 in addition to Key escrow.

His Information privacy study combines topics from a wide range of disciplines, such as Open problem and Cryptography. Josh Benaloh connects Extension with Government in his research.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Electronic online commerce card with customer generated transaction proxy number for online transactions

D. Chase Franklin;Daniel Rosen;Josh Benaloh;Daniel R. Simon.
(1997)

1024 Citations

Generalized secret sharing and monotone functions

Josh Cohen Benaloh;Jerry Leichter.
international cryptology conference (1990)

917 Citations

One-way accumulators: a decentralized alternative to digital signatures

Josh Benaloh;Michael de Mare.
theory and application of cryptographic techniques (1994)

683 Citations

Patient controlled encryption: ensuring privacy of electronic medical records

Josh Benaloh;Melissa Chase;Eric Horvitz;Kristin Lauter.
ieee international conference on cloud computing technology and science (2009)

619 Citations

Receipt-free secret-ballot elections (extended abstract)

Josh Benaloh;Dwight Tuinstra.
symposium on the theory of computing (1994)

595 Citations

Secret sharing homomorphisms: keeping shares of a secret secret

Josh Cohen Benaloh.
international cryptology conference (1987)

546 Citations

Verifiable secret-ballot elections

Josh Daniel Cohen Benaloh.
PhD thesis, Yale University, Department of Computer Science Department (1987)

543 Citations

Receipt-Free Secret-Ballot Elections

J. C. Benaloh.
symposium on the theory of computing (1994)

431 Citations

Dense Probabilistic Encryption

Josh Benaloh.
selected areas in cryptography (1999)

349 Citations

Distributing the power of a government to enhance the privacy of voters

Josh C Benaloh;Moti Yung.
principles of distributed computing (1986)

331 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Josh Benaloh

Peter Y. A. Ryan

Peter Y. A. Ryan

University of Luxembourg

Publications: 38

Amos Beimel

Amos Beimel

Ben-Gurion University of the Negev

Publications: 36

Martin T. King

Martin T. King

Google (United States)

Publications: 30

Moti Yung

Moti Yung

Columbia University

Publications: 27

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 27

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 26

Peter D. Saunders

Peter D. Saunders

American Express (United States)

Publications: 24

James Quentin Stafford-Fraser

James Quentin Stafford-Fraser

Google (United States)

Publications: 23

Yvo Desmedt

Yvo Desmedt

The University of Texas at Dallas

Publications: 23

Lein Harn

Lein Harn

University of Missouri–Kansas City

Publications: 23

Clifford A. Kushler

Clifford A. Kushler

Google (United States)

Publications: 23

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 22

Dale L. Grover

Dale L. Grover

Google (United States)

Publications: 22

Carlo Blundo

Carlo Blundo

University of Salerno

Publications: 19

Roberto Tamassia

Roberto Tamassia

Brown University

Publications: 18

Steve Schneider

Steve Schneider

University of Surrey

Publications: 18

Trending Scientists

Hayit Greenspan

Hayit Greenspan

Tel Aviv University

Partha Pratim Pande

Partha Pratim Pande

Washington State University

Fabrizio Durante

Fabrizio Durante

University of Salento

Eric A. Bier

Eric A. Bier

Palo Alto Research Center

Sune Lehmann

Sune Lehmann

Technical University of Denmark

Walter Vetter

Walter Vetter

University of Hohenheim

Giovanni Comelli

Giovanni Comelli

University of Trieste

Martha A. Mutschler

Martha A. Mutschler

Cornell University

Michael Kosoy

Michael Kosoy

Centers for Disease Control and Prevention

Kurt Jungermann

Kurt Jungermann

University of Göttingen

Ross A. D. Bathgate

Ross A. D. Bathgate

Florey Institute of Neuroscience and Mental Health

Jean Carignan

Jean Carignan

Centre national de la recherche scientifique, CNRS

Fredric W. Taylor

Fredric W. Taylor

University of Oxford

Barbara Franke

Barbara Franke

Radboud University Nijmegen

Bennet B. Murdock

Bennet B. Murdock

University of Toronto

Frank W. Wise

Frank W. Wise

Cornell University

Something went wrong. Please try again later.