Bio


Professor Boneh's main research area is applied cryptography and network security. His focus is on building security mechanisms that are easy to use and deploy. He has developed new mechanisms for improving web security, file system security, and copyright protection. He contributed to the security and performance of the RSA cryptosystem and contributed to the study of cryptographic watermarking.

Academic Appointments


Honors & Awards


  • Packard Fellow and Sloan Fellow, Packard (present)
  • Cisco Systems Faculty Scholar, Cisco Systems (present)
  • Horizon Award, Computerworld (2006)

Professional Education


  • PhD, Princeton (1996)

2014-15 Courses


Postdoctoral Advisees


All Publications


  • A Secure Signature Scheme from Bilinear Maps. Boneh, D., Mironov, I., Shoup, V.
  • A Method for Fast Revocation of Public Key Certificates and Security Capabilities. Boneh, D., Ding, X., Tsudik, G., Wong, M.
  • Protecting Browser State from Web Privacy Attacks. Jackson, C., Bortz, A., Boneh, D., Mitchell, J.
  • Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. Boneh, D., Gentry, C., Waters, B.
  • Hierarchical Identity Based Encryption with Constant Size Ciphertext. Boneh, D., Goh, E., Boyen, X.
  • Attribute-Based Encryption for Arithmetic Circuits. Cryptology ePrint Archive: Report Boneh, D., Nikolaenko, V., Segev, G. 2013: 669
  • Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N. 2013
  • Message-Locked Encryption for Lock-Dependent Messages. Abadi, M., Boneh, D., Mironov, I., Raghunathan, A., Segev, G. 2013
  • Key Homomorphic PRFs and Their Applications. Boneh, D., Lewi, K., Montgomery, H., Raghunathan, A. 2013
  • Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. Cryptology ePrint Archive: Report Boneh, D., Zhandry, M. 2013: 642
  • Quantum-Secure Message Authentication Codes. Boneh, D., Zhandry, M. 2013
  • Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. Boneh, D., Raghunathan, A., Segev, G. 2013
  • Private Database Queries Using Somewhat Homomorphic Encryption. Boneh, D., Gentry, C., Halevi, S., Wang, F., Wu, D. 2013
  • Ensuring high-quality randomness in cryptographic key generation. Corrigan-Gibbs, H., Mu, W., Boneh, D., Ford, B. 2013
  • Function-Private Subspace-Membership Encryption and Its Applications. Boneh, D., Raghunathan, A., Segev, G. 2013
  • OSS: Using Online Scanning Services for Censorship Circumvention. Fifield, D., Nakibly, G., Boneh, D. 2013
  • Constrained Pseudorandom Functions and Their Applications. Boneh, D., Waters, B. 2013
  • Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World. Boneh, D., Zhandry, M. 2013
  • Privacy-preserving matrix factorization. Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D. 2013
  • StegoTorus: a camouflage proxy for the Tor anonymity system. Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Cheung, S., Wang, F., Boneh, D. 2012
  • Persistent OSPF Attacks. Nakibly, G., Kirshon, A., Gonikman, D., Boneh, D. 2012
  • SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking. Bursztein, E., Soman, C., Boneh, D., Mitchell, J. 2012
  • Towards Short-Lived Certificates. Topalovic, E., Saeta, B., Huang, L., S., Jackson, C., Boneh, D. 2012
  • Computing on Authenticated Data. Ahn, J., H., Boneh, D., Camenisch, J., Hohenberger, S., Shelat, A., Waters, B. 2012
  • The case for prefetching and prevalidating TLS server certificates. Stark, E., Huang, L., S., Israni, D., Jackson, C., Boneh, D. 2012
  • Who Killed My Battery: Analyzing Mobile Browser Energy Consumption Thiagarajan, N., Aggarwal, G., Nicoara, A., Boneh, D., Singh, J. 2012
  • The most dangerous code in the world: validating SSL certificates in non-browser software. Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V. 2012
  • Evading Censorship with Browser-Based Proxies Fifield, D., Hardison, N., Ellithorpe, J., Stark, E., Boneh, D., Dingledine, R. 2012
  • Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks Bojinov, H., Sanchez, D., Reber, P., Boneh, D., Lincoln, P. 2012
  • Targeted malleability: homomorphic encryption for restricted computations. Boneh, D., Segev, G., Waters, B. 2012
  • OpenConflict: preventing real time map hacks in online games. Bursztein, E., Hamburg, M., Lagarenne, J., Boneh, D. 2011
  • Functional encryption: definitions and challenges. Boneh, D., Sahai, A., Waters, B. 2011
  • Homomorphic Signatures for Polynomial Functions. Boneh, D., Freeman, D. 2011
  • Location privacy via private proximity testing. Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D. 2011
  • Random Oracles in a Quantum World. Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M. 2011
  • Efficient lattice (H)IBE in the standard model. Agrawal, S., Boneh, D., Boyen, X. 2010
  • Algebraic pseudorandom functions with improved efficiency from the augmented cascade. Boneh, D., Montgomery, H., Raghunathan, A. 2010
  • Preventing pollution attacks in multi-source network coding. Agrawal, S., Boneh, D., Boyen, X., Freeman, D. 2010
  • Kamouflage: loss-resistant password management. Bojinov, H., Bursztein, E., Boyen, X., Boneh, D. 2010
  • Busting frame busting: a study of clickjacking vulnerabilities at popular sites. Rydstedt, G., Bursztein, E., Boneh, D., Jackson, C. 2010
  • Privacy preserving targeted advertising. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S. 2010
  • The case for ubiquitous transport-level encryption Bittau, A., Hamburg, M., Handley, M., Mazieres, D., Boneh, D. 2010
  • An analysis of private browsing modes in modern browsers. Aggarwal, G., Bursztein, E., Jackson, C., Boneh, D. 2010
  • Lattice basis delegation in fixed dimension and shorter ciphertext hierarchical IBE Agrawal, S., Boneh, D., Boyen, X. 2010
  • Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks. Rydstedt, G., Gourdin, B., Bursztein, E., Boneh, D. 2010
  • Fast symmetric cryptography in Javascript. Stark, E., Hamburg, M., Boneh, D. 2009
  • Signing a Linear Subspace: Signature Schemes for Network Coding. Boneh, D., Freeman, D., Katz, J., Waters, B. 2009
  • XCS: cross channel scripting and its impact on web applications. Bojinov, H., Bursztein, E., Boneh, D. 2009
  • Protecting Browsers from DNS Rebinding Attacks. Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D. 2009, 2007
  • Homomorphic MACs: MAC-Based Integrity for Network Coding. Agrawal, S., Boneh, D. 2009
  • Traitor Tracing with Constant Size Ciphertext. Boneh, D., Naor, M. 2008
  • Generalized Identity Based and Broadcast Encryption Schemes. Boneh, D., Hamburg, M. 2008
  • On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. Boneh, D., Papakonstantinou, A., Rackoff, C., Vahlis, Y., Waters, B. 2008
  • Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. Chen, M., Subrahmanyam, P., Waldspurger, C., Lewis, E., C., Garfinkel, T., Boneh, D. 2008
  • Circular-Secure Encryption from Decision Diffie-Hellman. Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R. 2008
  • Reducing Shoulder-surfing by Using Gaze-based Password Entry. Kumar, M., Garfinkel, T., Boneh, D., Winograd, T. 2007
  • Public Key Encryption That Allows PIR Queries. Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W. 2007
  • Transaction Generators: Root Kits for the Web. Jackson, C., Boneh, D., Mitchell, J. 2007
  • Cryptographic Methods for Storing Ballots on a Voting Machine. Bethencourt, J., Boneh, D., Waters, B. 2007
  • Covert Channels in Privacy-Preserving Identification Systems. Bailley, D., Boneh, D., Goh, E., Juels, A. 2007
  • Conjunctive, subset, and range queries on encrypted data. Boneh, D., Waters, B. 2007
  • Exposing private information by timing web applications. Bortz, A., Boneh, D., Nandy, P. 2007
  • Space-Efficient Identity Based Encryption Without Pairings. Boneh, D., Gentry, C., Hamburg, M. 2007
  • Geoencryption using Loran. Qiu, D., Lo, S., Enge, P., Boneh, D. 2007
  • Private Web Search Saint-Jean, F., Johnson, A., Boneh, D., Feigenbaum, J. 2007
  • Fully Collusion Resistant Traitor Tracing With Short Ciphertexts and Private Keys. Boneh, D., Sahai, A., Waters, B. 2006
  • Private encrypted content distribution using private broadcast encryption. Barth, A., Boneh, D., Waters, B. 2006
  • On the impossibility of efficiently combining collision resistant hash functions. Boneh, D., Boyen, X. 2006
  • A collusion resistant broadcast, trace and revoke system. Boneh, D., Waters, B. 2006
  • Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. Boneh, D., Boyen, X., Halevi, S. 2006
  • Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Boneh, D., Shen, E., Waters, B. 2006
  • SANE: A protection architecture for enterprise networks. Casado, M., Garfinkel, T., Akella, A., Freedman, M., Boneh, D., McKeown, N. 2006
  • Secure function evaluation with ordered binary decision diagrams. Kruger, L., Jha, S., Goh, E., Boneh, D. 2006
  • Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption. Boneh, D., Katz, J. 2005
  • Evaluating 2-DNF Formulas on Ciphertexts. Boneh, D., Goh, E., Nissim, K. 2005
  • Stronger Password Authentication Using Browser Extensions. Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J. 2005
  • Short Signatures Without Random Oracles. Boneh, D., Boyen, X. 2004
  • On the Effectiveness of Address-Space Randomization Shacham, H., Page, M., Pfaff, B., Goh, E., Modadugu, N., Boneh, D. 2004
  • Efficient Selective Identity-Based Encryption Without Random Oracles. Boneh, D., Boyen, X. 2004
  • Short Group Signatures. Boneh, D., Boyen, X., Shacham, H. 2004
  • Secure Identity Based Encryption Without Random Oracles. Boneh, D., Boyen, X. 2004
  • Group Signatures with Verifier-Local Revocation. Boneh, D., Shacham, H. 2004
  • Public key encryption with keyword search. Boneh, D., Crescenzo, G., Di, Ostrovsky, R., Persiano, G. 2004
  • The Design and Implementation of Protocol-based Hidden Key Recovery. Goh, E., Boneh, D., Golle, P., Pinkas, B. 2003
  • SiRiUS: Securing Remote Untrusted Storage. Goh, E., Shacham, H., Modadugu, N., Boneh, D. 2003
  • Oblivious Signature-Based Envelope. Li, N., Du, W., Boneh, D. 2003
  • Remote timing attacks are practical. Boneh, D., Brumley, D. 2003
  • A Survey of Two Signature Aggregation Techniques. In CryptoBytes Boneh, D., Gentry, C., Lynn, B., Shacham, H. 2003; 6 (2)
  • Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Boneh, D., Gentry, C., Shacham, H., Lynn, B. 2003
  • Flexible OS support and applications for trusted computing. In the 9th Hot Topics in Operating Systems (HOTOS-IX) Garfinkel, T., Rosenblum, M., Boneh, D. 2003
  • Applications of Multilinear Forms to Cryptography. Contemporary Mathematics, American Mathematical Society Boneh, D., Silverberg, A. 2003; 324
  • Terra: A Virtual Machine-Based Platform for Trusted Computing. Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D. 2003
  • Almost entirely correct mixing with applications to voting. Boneh, D., Golle, P. 2002
  • Attacking an obfuscated cipher by injecting faults. Jacob, M., Boneh, D., Felten, E. 2002
  • Fast variants of RSA. CryptoBytes Boneh, D., Shacham, H. 2002; 5 (1): 1-9
  • On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. Boneh, D., Shparlinski, I. 2001
  • Lower Bounds for Multicast Message Authentication. Boneh, D., Durfee, G., Franklin, M. 2001
  • Simplified OAEP for the RSA and Rabin functions. Boneh, D. 2001
  • The Modular Inversion Hidden Number Problem. Boneh, D., Halevi, S., Howgrave-Graham, N. 2001
  • On the importance of checking cryptographic protocols for faults. Journal of Cryptology, Springer-Verlag Boneh, D., DeMillo, R., Lipton, R. 2001; 14 (2): 101-119
  • Improving SSL Handshake Performance via Batching. Boneh, D., Shacham, H. 2001
  • Generating RSA Keys on a Handheld Using an Untrusted Server. Modadugu, N., Boneh, D., Kim, M. 2000
  • Why Textbook ElGamal and RSA Encryption are Insecure. Boneh, D., Joux, A., Nguyen, P. 2000
  • Anonymous authentication with subset queries. Boneh, D., Franklin, M. 1999
  • Experimenting with electronic commerce on the PalmPilot. Boneh, D., Daswani, N. 1999
  • Experimenting with Shared Generation of RSA keys. Malkin, M., Wu, T., Boneh, D. 1999
  • Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) Boneh, D. 1999; 46 (2): 203-213
  • Factoring N=prq for large r. Boneh, D., Durfee, G., Howgrave-Graham, N. 1999
  • Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Biham, E., Boneh, D., Reingold, O. 1999
  • Building intrusion tolerant applications. Wu, T., Malkin, M., Boneh, D. 1999
  • An efficient public key traitor tracing scheme. Boneh, D., Franklin, M. 1999
  • A generalized wallet architecture. Daswani, N., Boneh, D., Gracia-Molina, H., Ketchpel, S., Paepcke, A. 1998
  • Cryptanalysis of RSA with private key d less than N0.292. Boneh, D., Durfee, G. 1998
  • An attack on RSA given a small fraction of the private key bits. Boneh, D., Durfee, G., Frankel, Y. 1998
  • Breaking RSA may not be equivalent to factoring. Boneh, D., Venkatesan, R. 1998
  • The decision Diffie-Hellman problem. Boneh, D. 1998
  • Generating a Product of Three Primes With an Unknown Factorization. Boneh, D., Horwitz, J. 1998
  • Revocation of unread E-mail in an untrusted network. Rubin, A., Boneh, D., Fu, K. 1997
  • Rounding in lattices and its cryptographic applications. Boneh, D., Venkatesan, R. 1997
  • Effect of operators on straight line complexity. Boneh, D., Lipton, R. 1997
  • On the importance of checking cryptographic protocols for faults. Boneh, D., DeMillo, R., Lipton, R. 1997
  • A revocable backup system. Boneh, D., Lipton, R. 1996
  • Running dynamic programming algorithms on a DNA computer. Baum, E., Boneh, D. 1996
  • Algorithms for black box fields and their application to cryptography. Boneh, D., Lipton, R. 1996
  • Making DNA computers error resistant. Boneh, D., Lipton, R. 1996
  • Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. Boneh, D., Venkatesan, R. 1996
  • On the computational power of DNA. In Discrete Applied Mathematics, Special Issue on Computational Molecular Biology Boneh, D., Dunworth, C., Lipton, R., Sgall, J. 1996; 71: 79-94
  • Quantum cryptanalysis of hidden linear forms. Boneh, D., Lipton, R. 1995
  • Breaking DES using a molecular computer. Boneh, D., Dunworth, C., Lipton, R. 1995
  • Learning using group representations. Boneh, D. 1995
  • Collusion secure fingerprinting for digital data. Boneh, D., Shaw, J. 1995
  • Amplification of weak learning over the uniform distribution. Boneh, D., Lipton, R. 1993
  • Client side caching for TLS. ACM Trans. Info. and Sys. Security Boneh, D., Shacham, H., Rescrola, E. 2,004; 4 (7): 553-75