Patents by Inventor Roberto Tamassia

Roberto Tamassia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11468009
    Abstract: In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In embodiments, the algorithms described herein may be performed using any type of dictionary based encryption. In one embodiment, upon adding a new prefix to a dictionary table, the dictionary table may be permuted to randomize the entries into the table. The randomization may be based upon a permutation value generated by a deterministic pseudo-random generator and/or pseudo-random function. Other embodiments of randomization may be employed to provide secure compression. For example, instead of permuting the entire table upon adding a prefix, the prefix may be randomly added to the table.
    Type: Grant
    Filed: September 16, 2019
    Date of Patent: October 11, 2022
    Assignee: Brown University
    Inventors: James Kelley, Roberto Tamassia
  • Publication number: 20200012622
    Abstract: In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In embodiments, the algorithms described herein may be performed using any type of dictionary based encryption. In one embodiment, upon adding a new prefix to a dictionary table, the dictionary table may be permuted to randomize the entries into the table. The randomization may be based upon a permutation value generated by a deterministic pseudo-random generator and/or pseudo-random function. Other embodiments of randomization may be employed to provide secure compression. For example, instead of permuting the entire table upon adding a prefix, the prefix may be randomly added to the table.
    Type: Application
    Filed: September 16, 2019
    Publication date: January 9, 2020
    Inventors: James KELLEY, Roberto TAMASSIA
  • Patent number: 10417187
    Abstract: In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In embodiments, the algorithms described herein may be performed using any type of dictionary based encryption. In one embodiment, upon adding a new prefix to a dictionary table, the dictionary table may be permuted to randomize the entries into the table. The randomization may be based upon a permutation value generated by a deterministic pseudo-random generator and/or pseudo-random function. Other embodiments of randomization may be employed to provide secure compression. For example, instead of permuting the entire table upon adding a prefix, the prefix may be randomly added to the table.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: September 17, 2019
    Assignee: Brown University
    Inventors: James Kelley, Roberto Tamassia
  • Patent number: 10409845
    Abstract: Methods and apparatus are provided for authenticated pattern matching and authenticated exact path queries on outsourced data by a third party server. A source of the outsourced data computes verification information for node and suffix accumulators and sends the data, accumulation values and suffix tree or label trie information to the server; and publishes its public key and the verification digests. The verification may comprise an accumulation tree (AT) or any other public key authentication scheme, such as digital signatures, Merkle Trees and publishing the accumulation values. The server receives the query from a client and the server computes an answer ? to the query and a verification proof that are provided to the client. The client then verifies the answer.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 10, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Charalampos Papamanthou, Roberto Tamassia, Nikolaos Triandopoulos, Dimitrios Papadopoulos, Edward Joseph Tremel
  • Patent number: 9496897
    Abstract: Methods and apparatus are provided for encoding and decoding via authenticated error correcting codes, such as secure LT codes, secure Raptor codes, block codes and/or rateless codes. Encoded symbols are generated via an authenticated error correcting code by applying a Luby Transform (LT) code to a plurality of message symbols to produce one or more intermediate symbols using a pseudo random number generator (PRNG) to select the plurality of message symbols to combine to produce the intermediate symbols; encrypting the intermediate symbols to produce encrypted symbols; computing an authentication value, such as a message authentication code (MAC), over one or more of the one or more encrypted symbols; and appending the authentication value to the corresponding encrypted symbols to form the encoded symbols. Block scalable and random scalable constructions are also provided, as well as decoding techniques for all of the constructions.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: November 15, 2016
    Assignee: EMC IP Holding Company LLC
    Inventors: Nikolaos Triandopoulos, Ari Juels, Roberto Tamassia, James Alan Kelley
  • Publication number: 20160124983
    Abstract: In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In embodiments, the algorithms described herein may be performed using any type of dictionary based encryption. In one embodiment, upon adding a new prefix to a dictionary table, the dictionary table may be permuted to randomize the entries into the table. The randomization may be based upon a permutation value generated by a deterministic pseudo-random generator and/or pseudo-random function. Other embodiments of randomization may be employed to provide secure compression. For example, instead of permuting the entire table upon adding a prefix, the prefix may be randomly added to the table.
    Type: Application
    Filed: June 3, 2014
    Publication date: May 5, 2016
    Inventors: James KELLY, Roberto TAMASSIA
  • Patent number: 9152716
    Abstract: An improved search engine technique allows a user to ensure that an untrusted search engine provides complete and correct search results without requiring large proofs for large data collections. Thus techniques are presented for a trusted crawler to index a distributed collection of documents and create an authenticated search structure that allows an untrusted search server to return reliably complete and correct search results.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: October 6, 2015
    Assignee: EMC Corporation
    Inventors: Nikolaos Triandopoulos, Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Cristina Videira Lopes
  • Patent number: 9098725
    Abstract: In one exemplary embodiment, an apparatus includes a memory storing data and a processor performing operations. The apparatus generates or maintains an accumulation tree for the stored data—an ordered tree structure with a root node, leaf nodes and internal nodes. Each leaf node corresponds to a portion of the data. A depth of the tree remains constant. A bound on a degree of each internal node is a function of a number of leaf nodes of a subtree rooted at the internal node. Each node of the tree has an accumulation value. Accumulation values of the root and internal nodes are determined by hierarchically employing an accumulator over the accumulation values of the nodes lying one level below the node in question. The accumulation value of the root node is a digest for the tree.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: August 4, 2015
    Assignee: Brown University
    Inventors: Charalampos Papamanthou, Roberto Tamassia, Nikolaos Triandopoulos
  • Patent number: 8997198
    Abstract: A method is performed by a data server of a plurality of data servers connected to a network, the data server including data storage managed by a remote metadata server, the metadata server managing storage of data across the plurality of data servers. The method includes (a) receiving, via the network, an access request from a client, the access request requesting access to a portion of the data storage of the data server, (b) testing whether the access request includes a data server specific token authenticating that the client has been authorized by the metadata server to access the portion of data storage, and (c) in response to testing, providing the client with access to the portion of data storage on condition that the access request includes the token authenticating that the client has been authorized by the metadata server to access the portion of data storage.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: March 31, 2015
    Assignee: EMC Corporation
    Inventors: James Alan Kelley, Roberto Tamassia, Nikolaos Triandopoulos
  • Patent number: 8978155
    Abstract: In one exemplary embodiment, a method includes: storing data for a file, organized as blocks, each having a portion of the file; and maintaining a skip list for the data. The skip list is an ordered tree structure having a root node, internal nodes and leaf nodes. Each leaf node corresponds to a block. Each node has a rank value corresponding to size of a subtree rooted at the node. The skip list employs a hashing scheme. The hash value of the root node and internal nodes is computed from a level of the node, the rank value and an interval between the node and another linked node to the right of or below the node. The hash value of the leaf nodes is computed from a level of the node, the rank value and an interval associated with the node.
    Type: Grant
    Filed: July 24, 2009
    Date of Patent: March 10, 2015
    Assignee: Brown University
    Inventors: Charles Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia
  • Publication number: 20140245006
    Abstract: In one exemplary embodiment, an apparatus includes a memory storing data and a processor performing operations. The apparatus generates or maintains an accumulation tree for the stored data—an ordered tree structure with a root node, leaf nodes and internal nodes. Each leaf node corresponds to a portion of the data. A depth of the tree remains constant. A bound on a degree of each internal node is a function of a number of leaf nodes of a subtree rooted at the internal node. Each node of the tree has an accumulation value. Accumulation values of the root and internal nodes are determined by hierarchically employing an accumulator over the accumulation values of the nodes lying one level below the node in question. The accumulation value of the root node is a digest for the tree.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 28, 2014
    Applicant: Brown University
    Inventors: Charalampos Papamanthou, Roberto Tamassia, Nikolaos Triandopoulos
  • Patent number: 8726034
    Abstract: In one exemplary embodiment, an apparatus includes a memory storing data and a processor performing operations. The apparatus generates or maintains an accumulation tree for the stored data—an ordered tree structure with a root node, leaf nodes and internal nodes. Each leaf node corresponds to a portion of the data. A depth of the tree remains constant. A bound on a degree of each internal node is a function of a number of leaf nodes of a subtree rooted at the internal node. Each node of the tree has an accumulation value. Accumulation values of the root and internal nodes are determined by hierarchically employing an accumulator over the accumulation values of the nodes lying one level below the node in question. The accumulation value of the root node is a digest for the tree.
    Type: Grant
    Filed: August 28, 2009
    Date of Patent: May 13, 2014
    Assignee: Brown University
    Inventors: Charalampos Papamanthou, Roberto Tamassia, Nikolaos Triandopoulos
  • Patent number: 8572385
    Abstract: A system and method for cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic collection of sets that are owned (and updated) by a trusted source is disclosed. The system and method provides new authentication mechanisms that allow any entity to publicly verify a proof attesting the correctness of primitive set operations such as intersection, union, subset and set difference. Based on a novel extension of the security properties of bilinear-map accumulators as well as on a primitive called accumulation tree, the system and method achieves optimal verification and proof complexity, as well as optimal update complexity, while incurring no extra asymptotic space overhead. The method provides an efficient proof construction, adding a logarithmic overhead to the computation of the answer of a set-operation query. Applications of interest include efficient verification of keyword search and database queries.
    Type: Grant
    Filed: July 29, 2011
    Date of Patent: October 29, 2013
    Assignees: Brown University, Boston University
    Inventors: Charalampos Papamanthou, Roberto Tamassia, Nikolaos Triandopoulos
  • Publication number: 20130198854
    Abstract: In one exemplary embodiment, a method includes: storing data for a file, organized as blocks, each having a portion of the file; and maintaining a skip list for the data. The skip list is an ordered tree structure having a root node, internal nodes and leaf nodes. Each leaf node corresponds to a block. Each node has a rank value corresponding to size of a subtree rooted at the node. The skip list employs a hashing scheme. The hash value of the root node and internal nodes is computed from a level of the node, the rank value and an interval between the node and another linked node to the right of or below the node. The hash value of the leaf nodes is computed from a level of the node, the rank value and an interval associated with the node.
    Type: Application
    Filed: July 24, 2009
    Publication date: August 1, 2013
    Inventors: Charles Christopher Erway, Alptekin küpçü, Charalampos Papamanthou, Roberto Tamassia
  • Publication number: 20120030468
    Abstract: A system and method for cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic collection of sets that are owned (and updated) by a trusted source is disclosed. The system and method provides new authentication mechanisms that allow any entity to publicly verify a proof attesting the correctness of primitive set operations such as intersection, union, subset and set difference. Based on a novel extension of the security properties of bilinear-map accumulators as well as on a primitive called accumulation tree, the system and method achieves optimal verification and proof complexity, as well as optimal update complexity, while incurring no extra asymptotic space overhead. The method provides an efficient proof construction, adding a logarithmic overhead to the computation of the answer of a set-operation query. Applications of interest include efficient verification of keyword search and database queries.
    Type: Application
    Filed: July 29, 2011
    Publication date: February 2, 2012
    Inventors: Charalampos Papamanthou, Roberto Tamassia, Nikolaos Triandopoulos
  • Publication number: 20110225429
    Abstract: In one exemplary embodiment, an apparatus includes a memory storing data and a processor performing operations. The apparatus generates or maintains an accumulation tree for the stored data—an ordered tree structure with a root node, leaf nodes and internal nodes. Each leaf node corresponds to a portion of the data. A depth of the tree remains constant. A bound on a degree of each internal node is a function of a number of leaf nodes of a subtree rooted at the internal node. Each node of the tree has an accumulation value. Accumulation values of the root and internal nodes are determined by hierarchically employing an accumulator over the accumulation values of the nodes lying one level below the node in question. The accumulation value of the root node is a digest for the tree.
    Type: Application
    Filed: August 28, 2009
    Publication date: September 15, 2011
    Inventors: Charalampos Papamanthou, Roberto Tamassia, Nikolaos Triandopoulos
  • Patent number: 7974221
    Abstract: In one exemplary embodiment, a method includes: providing an abstract tree structure having a root node, tree nodes, and leaf nodes, each leaf node corresponds to a portion of data; mapping first network nodes of a distributed network to the tree nodes; mapping second network nodes to the leaf nodes; assigning unique identifiers to the root node, tree nodes, and leaf nodes; storing, at each first network node, the unique identifier of the corresponding tree node, the unique identifier of a parent, and the unique identifiers of children; storing, at each second network node, the portion of data and path information; providing a distributed hash tree wherein the DHT includes a hash value for each node of the ATS signing the top hash value for the root node; and storing, at each second network node, the corresponding hash value of the tree node and the hash values of children.
    Type: Grant
    Filed: January 24, 2007
    Date of Patent: July 5, 2011
    Assignee: Brown Universtiy
    Inventors: Roberto Tamassia, Nikolaos Triandopoulos
  • Publication number: 20100110935
    Abstract: A method and distributed network are provided.
    Type: Application
    Filed: January 24, 2007
    Publication date: May 6, 2010
    Applicant: BROWN UNIVERSITY
    Inventors: Roberto Tamassia, Nikolaos Triandopoulos
  • Patent number: 7257711
    Abstract: An efficient and practical method for dynamically maintaining an authenticated dictionary uses a skip list data structure and communicative hash functions to provide a dictionary database (201) that stores information objects so that any individual object can be authenticated as belonging or not belonging to the dictionary. The authentication consists of a short sequence of vales that begin with an element and a sequence of values that, when hashed in order using a cryptographic associative hash function, create the same value as the hashed digest of the entire dictionary. Rather than hashing up a dynamic 2-3 tree, hashes are created in a skip list. Validation of the result of the authenticating step is provided if the hash of the short sequence matches a signed hash of the entire skip list.
    Type: Grant
    Filed: November 8, 2001
    Date of Patent: August 14, 2007
    Assignees: The Johns Hopkins University, Brown University
    Inventors: Michael T. Goodrich, Roberto Tamassia
  • Publication number: 20040107346
    Abstract: An efficient and practical method for dynamically maintaining an authenticated dictionary uses a skip list data structure and communicative hash functions to provide a dictionary database (201) that stores information objects so that any individual object can be authenticated as belonging or not belonging to the dictionary. The authentication consists of a short sequence of vales that begin with an element and a sequence of values that, when hashed in order using a cryptographic associative hash function, create the same value as the hashed digest of the entire dictionary. Rather than hashing up a dynamic 2-3 tree, hashes are created in a skip list. Validation of the result of the authenticating step is provided if the hash of the short sequence matches a signed hash of the entire skip list.
    Type: Application
    Filed: May 7, 2003
    Publication date: June 3, 2004
    Inventors: Michael T Goodrich, Roberto Tamassia