Abstract: A system for verifying the execution of requested computation tasks, delegated by a computerized delegator device, to one or more computerized devices executing the tasks, comprising one or more computerized devices that contain one or more processors being adapted to define an input data for each delegated computation task; add to the input data, one or more computation fingerprints being executable encrypted input control bits, capable of detecting deviation from each requested computation task; allow the delegator to calculate the computation fingerprints once, by executing the requested computation tasks on predetermined random base values, to obtain an a-priori fingerprint result; couple the base values to each requested computation task; allow the one or more computerized devices to execute each requested computation task along with the base values, for returning an output consisting of a combination of a computed task result section and a calculated fingerprint result section; verify the returned outpu
Abstract: A method for providing secure connection between vehicles over channels of a wireless communication network, according to which, a first unique pair of digitally signed public key and private key is provided to each vehicle, along with additional vehicle-related data including a visually static collection of attributes of the vehicle. A unique certificate number is generated for each vehicle and monolithic data consisting of the public key, the certificate number and the attributes is signed by a trusted certificate generating authority. Prior to wireless communication between a first vehicle and a second vehicle, a verification step is performed during which the first vehicle sends its unique certificate number to a second vehicle over a communication channel; the second vehicle verifies the authenticity of received unique certificate number of the first vehicle and attributes by a camera that captures attributes which are visible, using image processing means.
Type:
Application
Filed:
June 20, 2014
Publication date:
February 19, 2015
Inventors:
Shlomi DOLEV, Nisha PANWAR, Michael SEGAL, Lukasz KRZYWIECKI
Abstract: A system and method for providing secure communication between a source and a destination that is secured by secret sharing, during a vulnerability window in which all secret shares are collected in one or more points along the communication paths. Accordingly, during the regular operation of the communication protocol, a common random secret OTP is created by sending random bits from the sender to the receiver and the source is allowed to perform bitwise XOR operation between the information to be sent and the common random secret OTP, prior to using secret sharing. The results of the bitwise XOR operation are sent to the destination using secret sharing and the destination reconstructs the random secret and decrypts the received data, using the common established random secret. The common random secret is based on polynomial randomization being transferred from the source to the destination using secret sharing.
Abstract: A system and method for providing secure communication between a source and a destination that is secured by secret sharing, during a vulnerability window in which all secret shares are collected in one or more points along the communication paths. Accordingly, during the regular operation of the communication protocol, a common random secret OTP is created by sending random bits from the sender to the receiver and the source is allowed to perform bitwise XOR operation between the information to be sent and the common random secret OTP, prior to using secret sharing. The results of the bitwise XOR operation are sent to the destination using secret sharing and the destination reconstructs the random secret and decrypts the received data, using the common established random secret. The common random secret is based on polynomial randomization being transferred from the source to the destination using secret sharing.
Abstract: A system for performing real-time quantum-safe computation of a digital transaction using in a blockchain consensus protocol, comprising a plurality of permissioned verification servers being a plurality of distributed participants that are adapted to create common randomization to all of said participants which remains unrevealed until being used by said participants, by assigning to each participant a unique polynomial having a maximal degree being common to all participants; allowing each participant to select a random value; allowing each participant to send his selected random value to all other participants using a secret sharing scheme based on points on his unique polynomial, such that said secret hides the details of said selected random value and all other participants that receive shares of said selected random value will not be able to reconstruct said selected random value from the received shares; create a pool of all shares of all participants; build a quantum-safe consensus of honest participa
Abstract: A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users. Accordingly, during a Setup stage, a Key Service generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users. The broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a Cipher Text (CT), which is sent to all users. During a Key Gen stage, whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the Key Service. The Key Service generates a corresponding secret key SKID1 and the secret key SKID1 is sent to the user ID1 via a secure data channel.
Type:
Application
Filed:
May 10, 2018
Publication date:
June 11, 2020
Inventors:
Shlomi DOLEV, Niv GILBOA, Dan BROWNSTEIN
Abstract: A motor-driven chair has a central drive wheel located beneath the seat and linked so as to be aligned with the facing direction of the seat. A user turns the direction of motion by rotating the seat relative to a surrounding stabilizer assembly so as to turn the seat and the drive wheel towards a direction in which he wishes to move. A suspension arrangement maintains a desired distribution of user load between the drive wheel and the stabilizer assembly. A combination of fixed-axis wheels with castered wheels provides angular anchoring of the stabilizer assembly to facilitate the seat steering process. The entire structure is preferably foldable for easy transportation and storage.
Abstract: A motor-driven chair has a central drive wheel located beneath the seat and linked so as to be aligned with the facing direction of the seat. A user turns the direction of motion by rotating the seat relative to a surrounding stabilizer assembly so as to turn the seat and the drive wheel towards a direction in which he wishes to move. A suspension arrangement maintains a desired distribution of user load between the drive wheel and the stabilizer assembly. A combination of fixed-axis wheels with castered wheels provides angular anchoring of the stabilizer assembly to facilitate the seat steering process. The entire structure is preferably foldable for easy transportation and storage.