Patents by Inventor Yehuda LINDELL

Yehuda LINDELL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180357427
    Abstract: The subject matter discloses a method operated on a computerizing system comprising generating two secret shares of at least some of the data fields in a database, loading data fields of the database into two database copies, wherein one secret share of the two secret shares is loaded into one database copy and another secret share of the two secret shares is loaded into another database copy, receiving a request to perform a query in the database, processing said query on the database copies, wherein the database fields employed by the query process and the query results remain secret during processing, and revealing the secret query results.
    Type: Application
    Filed: November 30, 2016
    Publication date: December 13, 2018
    Applicants: Unbound Tech Ltd., Bar-Ilan University
    Inventors: Yehuda LINDELL, Guy PE'ER, Michael KRAITSBERG, Valery OSHETER, Alex PRESMAN
  • Publication number: 20180359097
    Abstract: Described herein is a method and system for digital signing by utilizing Elliptic Curve Digital Signature Algorithm (ECDSA) with a group generator of an elliptic-curve group of order and an elliptic curve point Q. The method may be configured to receive a digital message and associated with a request from a third-party in order to sign the digital message. The system designed to sign such messages may comprise two parties denoted P1 and P2 configured to conduct a multiparty signing procedure by utilizing ECDSA. The digital signing procedure may follow preliminary steps configured to set the system with the necessary conditions for the multiparty signing procedure. Such preliminary steps may set the parties P1, and P2, in accordance with the configuration defined herein.
    Type: Application
    Filed: October 9, 2017
    Publication date: December 13, 2018
    Inventor: Yehuda Lindell
  • Publication number: 20180205547
    Abstract: Securing data by dividing a secret key into multiple secret key shares, storing each of the secret key shares in a different server of a group of servers so that none of the servers has access to the secret key and to the secret key share stored in another of the servers, using a server of the group of servers to execute a secure computation protocol to determine a value of a function responsive to all of the secret key shares without providing any of the servers with access to the secret key and to the secret key share stored in another of the servers, and using the calculated value of the function to secure the data.
    Type: Application
    Filed: February 26, 2018
    Publication date: July 19, 2018
    Inventor: YEHUDA LINDELL
  • Patent number: 9960919
    Abstract: A method of securing data, the method comprising: dividing a secret key into a plurality of secret key shares; storing each of the plurality of secret key shares in a different server of a plurality of servers so that none of the servers has access to the secret key and to the secret key share stored in another of the servers; using a server of the plurality of servers to execute a secure computation protocol to determine a value of a function responsive to all of the plurality of secret key shares without providing any of the plurality of servers with access to the secret key and to the secret key share stored in another of the servers; and using the calculated value of the function to secure the data.
    Type: Grant
    Filed: January 8, 2014
    Date of Patent: May 1, 2018
    Assignee: BAR-ILAN UNIVERSITY
    Inventor: Yehuda Lindell
  • Patent number: 9906511
    Abstract: Techniques of performing impersonation detection involve using encrypted access request data. Along these lines, an impersonation detection server stores historical access request data only in encrypted form and has no way to decrypt such data. When a new access request is received by a client, the client sends the username associated with the request to the server, which in turns sends the client the encrypted historical access request data. In addition, the server sends the client instructions to perform impersonation detection. The client then carries out the instructions based on the encrypted historical access request data and data contained in the new access request.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: February 27, 2018
    Assignees: Bar-Ilan University, EMC IP Holding Company LLC
    Inventors: Eyal Kolman, Alon Kaufman, Yehuda Lindell, Binyamin Pinkas
  • Publication number: 20180034810
    Abstract: The subject matter discloses a computerized system for securing information, comprising a client application installed on a computerized device, said client application stores a first share of the information, a server communicating with the client application, said server stores a second share of the information, an MPC module installed on the client application and on the server, wherein a request to use the information activates the MPC module, such that computation performed by the MPC module enables use of the information while only a share of the information resides on the server or on the computerized device, wherein the server verifies the identity of the computerized device in response to a request to use the information
    Type: Application
    Filed: February 28, 2016
    Publication date: February 1, 2018
    Inventors: Guy PE'ER, Yehuda LINDELL
  • Publication number: 20180019868
    Abstract: The subject matter discloses a computerized system, comprising a computerized device communicating with a third party server, that comprises a memory unit that stores a representation of a Boolean circuit and a processing unit for calculating a result of the Boolean circuit according to a string used as input for the Boolean circuit and calculating a first predefined function on the result of the Boolean circuit. The system also comprises a first auxiliary server communicating with the computerized device, the first auxiliary server comprises a processing unit for calculating a second predefined function on the result of the Boolean circuit received from the computerized device and a second auxiliary server communicating with the computerized device comprises a processing unit for comparing the result of the first predefined function and the result of the second predefined function.
    Type: Application
    Filed: February 28, 2016
    Publication date: January 18, 2018
    Applicant: Dyadic Security Ltd.
    Inventors: GUY PE'ER, YEHUDA LINDELL
  • Publication number: 20150349958
    Abstract: A method of securing data, the method comprising: dividing a secret key into a plurality of secret key shares; storing each of the plurality of secret key shares in a different server of a plurality of servers so that none of the servers has access to the secret key and to the secret key share stored in another of the servers; using a server of the plurality of servers to execute a secure computation protocol to determine a value of a function responsive to all of the plurality of secret key shares without providing any of the plurality of servers with access to the secret key and to the secret key share stored in another of the servers; and using the calculated value of the function to secure the data.
    Type: Application
    Filed: January 8, 2014
    Publication date: December 3, 2015
    Inventor: Yehuda LINDELL