Patents by Inventor Kurt Rohloff

Kurt Rohloff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230385437
    Abstract: An encryption and cryptosystem for fast and efficient searching of ciphertexts. Unencrypted secret data may be transformed into encoded secret data using an injective encoding such that each distinct value of the unencrypted secret data is mapped to a unique index in the encoded secret data. The encoded secret data may be homomorphically encrypted using the homomorphic encryption key to generate secret data ciphertexts. The secret data ciphertexts may be transmitted to an external system for searching the secret data ciphertexts for encoded queries. The encoded queries are encoded by the same injective encoding as the secret data, to directly search only indices of the secret data ciphertexts corresponding to query indices having non-zero query values, to detect if values of the secret data ciphertexts match values of the encoded queries at the query indices, without searching the remaining indices of the secret data ciphertexts.
    Type: Application
    Filed: March 30, 2023
    Publication date: November 30, 2023
    Applicant: Duality Technologies, Inc.
    Inventors: Kurt ROHLOFF, Vinod VAIKUNTANATHAN, Arina SHAINSKI, Shafi GOLDWASSER
  • Publication number: 20220414235
    Abstract: Methods and system for risk determination and risk categorization using encrypted data are provided. The risk determination can involve determining an inner product operation between a generalized weight table and an encrypted incidence vector, summing the result of the inner product operation and/or decrypting the results. Method and systems for encrypting data for use in homomorphic risk determination are also provided.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 29, 2022
    Applicant: Duality Technologies, Inc.
    Inventors: Kurt ROHLOFF, Yuriy POLYAKOV
  • Patent number: 11038672
    Abstract: A device, system, and method for decentralized management of a distributed proxy re-encryption key ledger by multiple devices in a distributed peer-to-peer network. A network device may receive shared data defining access to a proxy re-encryption key. The network device may locally generate a hash code based on the shared data. The network device may receive a plurality of hash codes generated based on versions of the shared data at a respective plurality of the other devices in the network. If the locally generated hash code matches the received plurality of hash codes, the network device may validate that the shared data is the same across the network devices and may add the received proxy re-encryption key access data and locally generated hash code to a local copy of the distributed proxy re-encryption key ledger.
    Type: Grant
    Filed: June 3, 2019
    Date of Patent: June 15, 2021
    Assignee: DUALITY TECHNOLOGIES, INC.
    Inventors: Arina Shainski, Kurt Rohloff
  • Publication number: 20200151356
    Abstract: An encryption and cryptosystem for fast and efficient searching of ciphertexts. Unencrypted secret data may be transformed into encoded secret data using an injective encoding such that each distinct value of the unencrypted secret data is mapped to a unique index in the encoded secret data. The encoded secret data may be homomorphically encrypted using the homomorphic encryption key to generate secret data ciphertexts. The secret data ciphertexts may be transmitted to an external system for searching the secret data ciphertexts for encoded queries. The encoded queries are encoded by the same injective encoding as the secret data, to directly search only indices of the secret data ciphertexts corresponding to query indices having non-zero query values, to detect if values of the secret data ciphertexts match values of the encoded queries at the query indices, without searching the remaining indices of the secret data ciphertexts.
    Type: Application
    Filed: August 13, 2018
    Publication date: May 14, 2020
    Applicant: Duality Technologies, Inc.
    Inventors: Kurt ROHLOFF, Vinod VAIKUNTANATHAN, Arina SHAINSKI, Shafi GOLDWASSER
  • Patent number: 10581812
    Abstract: A device, system and method for fast and secure Proxy Re-Encryption (PRE) using key switching. A first user is assigned first encryption and decryption keys and a second user is assigned second encryption and decryption keys. First encrypted data encrypted with the first encryption key may be re-encrypted using a proxy re-encryption key to simultaneously switch encryption keys by adding the second encryption key and cancelling the first encryption key by the first decryption key to transform the first encrypted data encrypted by the first encryption key to second encrypted data encrypted by the second encryption key, without decrypting the underlying data. The second user may be the sole system device that possesses the (e.g., private) second decryption key to decrypt the second encrypted data.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: March 3, 2020
    Assignee: Duality Technologies, Inc.
    Inventors: Kurt Rohloff, Vinod Vaikuntanathan
  • Publication number: 20190372762
    Abstract: A device, system, and method for decentralized management of a distributed proxy re-encryption key ledger by multiple devices in a distributed peer-to-peer network. A network device may receive shared data defining access to a proxy re-encryption key. The network device may locally generate a hash code based on the shared data. The network device may receive a plurality of hash codes generated based on versions of the shared data at a respective plurality of the other devices in the network. If the locally generated hash code matches the received plurality of hash codes, the network device may validate that the shared data is the same across the network devices and may add the received proxy re-encryption key access data and locally generated hash code to a local copy of the distributed proxy re-encryption key ledger.
    Type: Application
    Filed: June 3, 2019
    Publication date: December 5, 2019
    Applicant: Duality Technologies, Inc.
    Inventors: Arina SHAINSKI, Kurt ROHLOFF
  • Patent number: 9893880
    Abstract: A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute algorithms on these symbols without access the original data or encryption keys such that the result of running the algorithm on the encrypted data can be decrypted to a result which is equivalent to the result of running the algorithm on the original unencrypted data. In one embodiment the untrusted third party may perform a sequence of operations on the encrypted symbols to produce an encrypted result which, when decrypted by a trusted party, indicates whether the two symbols are the same.
    Type: Grant
    Filed: November 15, 2013
    Date of Patent: February 13, 2018
    Assignee: RAYTHEON BBN TECHNOLOGIES CORP.
    Inventors: Kurt Rohloff, David Bruce Cousins, Richard Schantz
  • Publication number: 20170155628
    Abstract: A device, system and method for fast and secure Proxy Re-Encryption (PRE) using key switching. A first user is assigned first encryption and decryption keys and a second user is assigned second encryption and decryption keys. First encrypted data encrypted with the first encryption key may be re-encrypted using a proxy re-encryption key to simultaneously switch encryption keys by adding the second encryption key and cancelling the first encryption key by the first decryption key to transform the first encrypted data encrypted by the first encryption key to second encrypted data encrypted by the second encryption key, without decrypting the underlying data. The second user may be the sole system device that possesses the (e.g., private) second decryption key to decrypt the second encrypted data.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 1, 2017
    Inventors: Kurt ROHLOFF, Vinod VAIKUNTANATHAN
  • Publication number: 20140233727
    Abstract: A system and method for secure substring search, using fully homomorphic encryption, or somewhat homomorphic encryption. In one embodiment, a first string is homomorphically compared to trial substrings of a second string, each comparison producing a ciphertext containing an encrypted indication of whether the first string matches the trial substrings. These ciphertexts are then combined in a homomorphic logical OR operation to produce a ciphertext which contains an encrypted indication of whether the first string matches any of the trial substrings, i.e., whether the first string is contained in the second string.
    Type: Application
    Filed: November 15, 2013
    Publication date: August 21, 2014
    Inventors: Kurt Rohloff, David Bruce Cousins, Richard Schantz
  • Publication number: 20140233728
    Abstract: A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute algorithms on these symbols without access the original data or encryption keys such that the result of running the algorithm on the encrypted data can be decrypted to a result which is equivalent to the result of running the algorithm on the original unencrypted data. In one embodiment the untrusted third party may perform a sequence of operations on the encrypted symbols to produce an encrypted result which, when decrypted by a trusted party, indicates whether the two symbols are the same.
    Type: Application
    Filed: November 15, 2013
    Publication date: August 21, 2014
    Applicant: RAYTHEON BBN TECHNOLOGIES CORP.
    Inventors: Kurt Rohloff, David Bruce Cousins, Richard Schantz