17931438. SECURE MULTIPARTY COMPUTE USING HOMOMORPHIC ENCRYPTION simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

SECURE MULTIPARTY COMPUTE USING HOMOMORPHIC ENCRYPTION

Organization Name

Intel Corporation

Inventor(s)

Kylan Race of Austin TX (US)

Ernesto Zamora Ramos of Folsom CA (US)

Jeremy Bottleson of North Plains OR (US)

Jingyi Jin of San Jose CA (US)

SECURE MULTIPARTY COMPUTE USING HOMOMORPHIC ENCRYPTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17931438 titled 'SECURE MULTIPARTY COMPUTE USING HOMOMORPHIC ENCRYPTION

Simplified Explanation

The method described in the abstract involves receiving encrypted data from a remote device, performing computations on the encrypted data, encrypting the results using a different encryption scheme, sending the encrypted results back to the remote device, receiving decrypted results, and finally decrypting them using a decryption algorithm.

  • Receiving encrypted data set from a remote device
  • Performing computations on the encrypted data set
  • Encrypting the results using a different encryption scheme
  • Sending the encrypted results back to the remote device
  • Receiving decrypted results
  • Decrypting the results using a decryption algorithm

Potential Applications

The technology described in this patent application could be applied in secure communication systems, data encryption services, and remote data processing applications.

Problems Solved

This technology solves the problem of securely transmitting and processing sensitive data between remote devices while maintaining data integrity and confidentiality.

Benefits

The benefits of this technology include enhanced data security, protection against unauthorized access, and efficient data processing and transmission.

Potential Commercial Applications

  • Secure Data Transmission and Communication Services: Companies can use this technology to securely transmit sensitive data between remote devices.
  • Data Encryption Software: This technology can be integrated into data encryption software to provide enhanced security features.

Unanswered Questions

How does the method ensure the security of the encryption and decryption processes?

The article does not provide specific details on the security measures implemented to protect the encryption and decryption processes.

What are the potential limitations or vulnerabilities of this method?

The article does not address any potential limitations or vulnerabilities that may exist in the described method.


Original Abstract Submitted

A method comprises receiving, from a remote device, a first encrypted data set encrypted using a first encryption scheme, performing a set of computations on the first encrypted data set to generate a first set of encrypted results, encrypting the first set of encrypted results using a second encryption scheme to generate a second set of encrypted results, sending the second set of encrypted results to the remote device, receiving, from the remote device, third set of encrypted results in which the first encryption scheme has been decrypted, and generating a set of decrypted results by applying a decryption algorithm to the third set of encrypted results to decrypt the second encryption scheme.