18379384. ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

JU-YOUNG Jung of Cheonan-si (KR)

JIYOUP Kim of Suwon-si (KR)

CHANGKYU Seol of Osan-si (KR)

PILSANG Yoon of Hwaseong-si (KR)

JINSOO Lim of Seoul (KR)

MYUNGHOON Choi of Suwon-si (KR)

ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 18379384 titled 'ELECTRONIC DEVICE USING HOMOMORPHIC ENCRYPTION AND ENCRYPTED DATA PROCESSING METHOD THEREOF

Simplified Explanation

The abstract of the patent application describes an electronic device that includes a memory for storing data, an application processing unit (APU) that transmits a secret key and a command for generating a public key, an isolated execution environment (IEE) that generates a secret key and a public key based on the secret key, and a non-volatile memory that performs read and write operations based on the APU's request. When data is stored in the memory, the APU requests the public key from the IEE, which is transferred through a mailbox protocol. The APU then performs homomorphic encryption on the data using the encryption key in the public key, and stores the public key and the ciphertext in the non-volatile memory.

  • The electronic device includes a memory, APU, IEE, and non-volatile memory.
  • The APU transmits a secret key and a command for generating a public key.
  • The IEE generates a secret key and a public key based on the secret key.
  • The non-volatile memory performs read and write operations based on the APU's request.
  • The APU requests the public key from the IEE and receives it through a mailbox protocol.
  • The APU performs homomorphic encryption on the data using the encryption key in the public key.
  • The public key and the ciphertext are stored in the non-volatile memory.

Potential applications of this technology:

  • Secure data storage and transmission
  • Secure communication systems
  • Cryptographic protocols and algorithms
  • Privacy-preserving computation

Problems solved by this technology:

  • Protection of sensitive data from unauthorized access
  • Secure generation and storage of secret and public keys
  • Secure encryption and decryption of data
  • Mitigation of data breaches and privacy violations

Benefits of this technology:

  • Enhanced data security and privacy
  • Improved protection against cyber threats
  • Secure and efficient cryptographic operations
  • Facilitation of secure communication and data sharing


Original Abstract Submitted

An electronic device includes a memory storing data from an external source, an application processing unit (APU) transmitting a secret key and public key generation command, an isolated execution environment (IEE) generating a secret key in response to the secret key generation command, generating a public key based on the secret key in response to the public key generation command, and storing the secret key, and a non-volatile memory performing write and read operations depending on a request of the APU. When the data are stored in the memory, the APU transmits a public key request to the IEE and in response the IEE transfers the public key to the APU through a mailbox protocol. The APU generates a ciphertext by performing homomorphic encryption on the data based on an encryption key in the public key, and classifies and stores the public key and the ciphertext in the non-volatile memory.