• The BonehFranklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
    6 KB (1,142 words) - 11:11, 13 February 2024
  • Thumbnail for Dan Boneh
    identity. Boneh, with Matt Franklin, proposed one of the first identity-based encryption schemes based on the Weil pairing. The Boneh-Franklin scheme remains...
    14 KB (1,150 words) - 21:08, 25 July 2025
  • an open problem for many years. The pairing-based BonehFranklin scheme and Cocks's encryption scheme based on quadratic residues both solved the IBE problem...
    16 KB (1,942 words) - 00:54, 12 April 2025
  • Boneh or Beneh may refer to: Dan Boneh (b. 1969), Israeli computer scientist BonehFranklin scheme, an identity-based encryption system Boneh-Lynn-Shacham...
    5 KB (952 words) - 10:00, 16 February 2025
  • 2014, Franklin was editor-in-chief of the Journal of Cryptology. Franklin is particularly known for the BonehFranklin scheme, a cryptography scheme he developed...
    6 KB (514 words) - 07:31, 7 February 2021
  • identity based encryption. Tate pairing Pairing-based cryptography BonehFranklin scheme Homomorphic Signatures for Network Coding Silverman, Joseph (1986)...
    5 KB (805 words) - 04:07, 13 December 2024
  • 2003. Alongside the BonehFranklin scheme, this is one of a small number of commercially implemented identity-based encryption schemes. It is an application...
    10 KB (1,588 words) - 05:29, 14 June 2025
  • Thumbnail for Gödel Prize
    (1–2): 166–196. CiteSeerX 10.1.1.21.1731. doi:10.1006/game.1999.0790. Boneh, Dan; Franklin, Matthew (2003). "Identity-based encryption from the Weil pairing"...
    31 KB (2,200 words) - 21:16, 23 June 2025
  • Girault’s self-certified public key model (1991) and Boneh and Franklin’s identity-based scheme (2001). One disadvantage of this is that the identity...
    4 KB (606 words) - 17:20, 16 February 2025
  • rely on multilinear hardness assumptions include: Boneh-Franklin scheme (bilinear Diffie-Hellman) Boneh–Lynn–Shacham (bilinear Diffie-Hellman)...
    27 KB (3,302 words) - 01:29, 9 July 2025
  • Sakai–Kasahara Identity Based Encryption BonehFranklin Shamir, Adi (1985). "Identity-Based Cryptosystems and Signature Schemes" (PDF). In Blakley, George Robert;...
    8 KB (868 words) - 04:06, 26 July 2025
  • the following theorem, if the random padding is too short. ROCA attack Boneh, Dan (1999). "Twenty years of attacks on the RSA cryptosystem". Notices...
    8 KB (1,466 words) - 22:47, 1 May 2025
  • Thumbnail for Proprietary software
    remain secure against NSA surveillance". The Guardian. Jacob, Matthias; Boneh, Dan; Felten, Edward (30 October 2003). "Attacking an Obfuscated Cipher...
    44 KB (4,905 words) - 22:42, 11 July 2025
  • Cryptology, 10 (3–4): 157–180, doi:10.1515/jmc-2016-0030, S2CID 33121117 Boneh, Dan; Franklin, Matthew (2003), "Identity-based encryption from the Weil pairing"...
    18 KB (2,181 words) - 05:03, 17 April 2025
  • Applications, Volume 125, Number 3, 20 November 2002 , pp. 533–542. Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM J. of Computing...
    6 KB (1,096 words) - 19:35, 13 March 2025