18379384. ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)
Contents
ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF
Organization Name
Inventor(s)
JU-YOUNG Jung of Cheonan-si (KR)
PILSANG Yoon of Hwaseong-si (KR)
MYUNGHOON Choi of Suwon-si (KR)
ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF - A simplified explanation of the abstract
This abstract first appeared for US patent application 18379384 titled 'ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF
Simplified Explanation
The abstract of the patent application describes an electronic device that includes a memory for storing data, an application processing unit (APU) that transmits a secret key and a command for generating a public key, an isolated execution environment (IEE) that generates a secret key and a public key based on the secret key, and a non-volatile memory that performs read and write operations based on the APU's request. When data is stored in the memory, the APU requests the public key from the IEE, which is transferred through a mailbox protocol. The APU then performs homomorphic encryption on the data using the encryption key in the public key, and stores the public key and the ciphertext in the non-volatile memory.
- The electronic device includes a memory, APU, IEE, and non-volatile memory.
- The APU transmits a secret key and a command for generating a public key.
- The IEE generates a secret key and a public key based on the secret key.
- The non-volatile memory performs read and write operations based on the APU's request.
- The APU requests the public key from the IEE and receives it through a mailbox protocol.
- The APU performs homomorphic encryption on the data using the encryption key in the public key.
- The public key and the ciphertext are stored in the non-volatile memory.
Potential applications of this technology:
- Secure data storage and transmission
- Secure communication systems
- Cryptographic protocols and algorithms
- Privacy-preserving computation
Problems solved by this technology:
- Protection of sensitive data from unauthorized access
- Secure generation and storage of secret and public keys
- Secure encryption and decryption of data
- Mitigation of data breaches and privacy violations
Benefits of this technology:
- Enhanced data security and privacy
- Improved protection against cyber threats
- Secure and efficient cryptographic operations
- Facilitation of secure communication and data sharing
Original Abstract Submitted
An electronic device includes a memory storing data from an external source, an application processing unit (APU) transmitting a secret key and public key generation command, an isolated execution environment (IEE) generating a secret key in response to the secret key generation command, generating a public key based on the secret key in response to the public key generation command, and storing the secret key, and a non-volatile memory performing write and read operations depending on a request of the APU. When the data are stored in the memory, the APU transmits a public key request to the IEE and in response the IEE transfers the public key to the APU through a mailbox protocol. The APU generates a ciphertext by performing homomorphic encryption on the data based on an encryption key in the public key, and classifies and stores the public key and the ciphertext in the non-volatile memory.