Patents by Inventor Shafi Goldwasser

Shafi Goldwasser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230385437
    Abstract: An encryption and cryptosystem for fast and efficient searching of ciphertexts. Unencrypted secret data may be transformed into encoded secret data using an injective encoding such that each distinct value of the unencrypted secret data is mapped to a unique index in the encoded secret data. The encoded secret data may be homomorphically encrypted using the homomorphic encryption key to generate secret data ciphertexts. The secret data ciphertexts may be transmitted to an external system for searching the secret data ciphertexts for encoded queries. The encoded queries are encoded by the same injective encoding as the secret data, to directly search only indices of the secret data ciphertexts corresponding to query indices having non-zero query values, to detect if values of the secret data ciphertexts match values of the encoded queries at the query indices, without searching the remaining indices of the secret data ciphertexts.
    Type: Application
    Filed: March 30, 2023
    Publication date: November 30, 2023
    Applicant: Duality Technologies, Inc.
    Inventors: Kurt ROHLOFF, Vinod VAIKUNTANATHAN, Arina SHAINSKI, Shafi GOLDWASSER
  • Patent number: 10885158
    Abstract: A multi-party system, devices, and method for token-based obfuscation of secret information. A first party device may store a secret original program T and original data D, retrieve a set of secret keys SK, obfuscate the original program T with the set of secret keys SK to generate an obfuscated program T?, obfuscate the original data D with the set of secret keys SK to generate a token of the data Token(D), and transfer the obfuscated program T? and Token(D) to a second party device. The second party device may evaluate the obfuscated program T? on the token of the data Token(D) to generate a result equivalent to evaluating the original program T on the original data D if the same set of secret keys SK is used to obfuscate the original program T and the original data D, without exposing the original program T to the second party.
    Type: Grant
    Filed: June 4, 2018
    Date of Patent: January 5, 2021
    Assignee: DUALITY TECHNOLOGIES, INC.
    Inventors: Shafi Goldwasser, Vinod Vaikuntanathan
  • Publication number: 20200151356
    Abstract: An encryption and cryptosystem for fast and efficient searching of ciphertexts. Unencrypted secret data may be transformed into encoded secret data using an injective encoding such that each distinct value of the unencrypted secret data is mapped to a unique index in the encoded secret data. The encoded secret data may be homomorphically encrypted using the homomorphic encryption key to generate secret data ciphertexts. The secret data ciphertexts may be transmitted to an external system for searching the secret data ciphertexts for encoded queries. The encoded queries are encoded by the same injective encoding as the secret data, to directly search only indices of the secret data ciphertexts corresponding to query indices having non-zero query values, to detect if values of the secret data ciphertexts match values of the encoded queries at the query indices, without searching the remaining indices of the secret data ciphertexts.
    Type: Application
    Filed: August 13, 2018
    Publication date: May 14, 2020
    Applicant: Duality Technologies, Inc.
    Inventors: Kurt ROHLOFF, Vinod VAIKUNTANATHAN, Arina SHAINSKI, Shafi GOLDWASSER
  • Publication number: 20180349577
    Abstract: A multi-party system, devices, and method for token-based obfuscation of secret information. A first party device may store a secret original program T and original data D, retrieve a set of secret keys SK, obfuscate the original program T with the set of secret keys SK to generate an obfuscated program T?, obfuscate the original data D with the set of secret keys SK to generate a token of the data Token(D), and transfer the obfuscated program T? and Token(D) to a second party device. The second party device may evaluate the obfuscated program T? on the token of the data Token(D) to generate a result equivalent to evaluating the original program T on the original data D if the same set of secret keys SK is used to obfuscate the original program T and the original data D, without exposing the original program T to the second party.
    Type: Application
    Filed: June 4, 2018
    Publication date: December 6, 2018
    Inventors: Shafi GOLDWASSER, Vinod VAIKUNTANATHAN
  • Patent number: 8762736
    Abstract: A method, apparatus and computer program product for providing one-time programs is presented. A program to be converted to a new program having a predetermined lifetime is identified. The program is compiled to produce the new program having a predetermined lifetime and wherein the new program having a predetermined lifetime is guaranteed to only have the predetermined lifetime.
    Type: Grant
    Filed: April 2, 2009
    Date of Patent: June 24, 2014
    Assignee: Massachusetts Institute of Technology
    Inventors: Shafi Goldwasser, Yael Tauman Kalai, Guy Nathanel Rothblum
  • Publication number: 20050251545
    Abstract: A method includes searching in the ZN domain, for N greater than 2, for heavy Fourier coefficients of a function. The method may be implemented for any type of signal compression, such as image, video or audio compression. It may also be used to decode corrupted codewords.
    Type: Application
    Filed: May 3, 2005
    Publication date: November 10, 2005
    Inventors: Shafi Goldwasser, Adi Akavia, Shmuel Safra
  • Patent number: 5768388
    Abstract: Methods for designing encryption algorithms with different levels of security for different parties: "easier" (but requiring some work nonetheless) to break for some parties (e.g., the government) than for other parties (the adversaries at large). This is achieved by a new form of key escrow in which the government gets some information related to the secret keys of individuals but not the secret keys themselves. The information given to the government enables it to decrypt with a predetermined level of computational difficulty less than that for adversaries at large. The new key escrow methods are verifiable. Verification information can be provided to the government so that it can verify that the information escrowed is sufficient to enable it to decrypt with the predetermined level of computational difficulty. The fact that the government must perform some computation to break the encryption schemes of individual users provides a serious deterrent against massive wiretapping.
    Type: Grant
    Filed: March 21, 1996
    Date of Patent: June 16, 1998
    Inventors: Shafi Goldwasser, Mihir Bellare
  • Patent number: 4926479
    Abstract: In a multiparty verification system, a prover and a verifier are coupled to rocess respective outputs to provide a system output such as an identification verification. The prover is formed of plural units which share confidential information used to encrypt information carried by the prover. Communication between the prover units is prevented. The first prover unit encrypts the information based on additional information received from the verifier and transfers the encrypted information to the verifier. Subsequently, the verifier obtains from the second prover unit the shared confidential information required to decrypt a subset of the transmitted encrypted information.
    Type: Grant
    Filed: April 29, 1988
    Date of Patent: May 15, 1990
    Assignees: Massachusetts Institute of Technology, Yissum Research Development Company of the Hebrew University of Jerusalem
    Inventors: Shafi Goldwasser, Joseph Kilian, Avi Wigderson, Michael Ben-Or