-
公开(公告)号:US20230379134A1
公开(公告)日:2023-11-23
申请号:US17968368
申请日:2022-10-18
申请人: SEOUL NATIONAL UNIVERSITY R&DB FOUNDATION , INDUSTRY-ACADEMIC COOPERATION FOUNDATION, CHOSUN UNIVERSITY
发明人: Joon-Woo LEE , Jong-Seon NO , Yong-Woo LEE , Seung-Jae CHAE , Young-Sik KIM
CPC分类号: H04L9/008 , H04L9/0631
摘要: A method of performing a homomorphic permutation by a server includes: generating, via a ciphertext generation portion, a first ciphertext by adding noise to the basic ciphertext; transmitting, via a transmission portion, the first ciphertext to a client; performing, via an operation portion, a predetermined operation on the noise; receiving, via a reception portion, a second ciphertext from the client; and extracting, via an extraction portion, the basic ciphertext on which the predetermined operation is performed, by removing, from the second ciphertext, the noise on which the predetermined operation is performed, wherein the second ciphertext is a ciphertext that is re-encrypted by the client after decrypting the first ciphertext and performing the predetermined operation on the decrypted first ciphertext.
-
公开(公告)号:US20240106632A1
公开(公告)日:2024-03-28
申请号:US18521187
申请日:2023-11-28
申请人: Samsung Electronics Co., Ltd. , Seoul National University R&DB Foundation , Industry Academic Cooperation Foundation, Chosun University
发明人: Jong-Seon NO , Yongwoo LEE , Young-Sik KIM
CPC分类号: H04L9/0825 , G06F7/523 , G06F7/766 , G06F17/16 , H04L9/008 , H04L9/0618
摘要: A processor-implemented method with homomorphic encryption includes: receiving a first ciphertext corresponding to a first modulus; generating a second ciphertext corresponding to a second modulus by performing modulus raising on the first ciphertext; and performing bootstrapping by encoding the second ciphertext using a commutative property and an associative property of operations included in a rotation operation.
-
公开(公告)号:US20230188317A1
公开(公告)日:2023-06-15
申请号:US17888836
申请日:2022-08-16
申请人: Samsung Electronics Co., Ltd. , Seoul National University R&DB Foundation , Industry Academic Cooperation Foundation, Chosun University , Daegu Gyeongbuk Institute of Science and Technology
发明人: Woosuk CHOI , Joon-Woo LEE , Eunsang LEE , Young-Sik KIM , Yongjune KIM , Jong-Seon NO , Junghyun LEE
IPC分类号: H04L9/00
摘要: An apparatus includes: one or more processors configured to: generate packed data by performing data packing on an encrypted image; and perform a homomorphic encryption operation based on the packed data and a weight.
-
4.
公开(公告)号:US20180145832A1
公开(公告)日:2018-05-24
申请号:US15817293
申请日:2017-11-20
申请人: Seoul National University R&DB Foundation , Industry-Academic Cooperation Foundation, Chosun University
发明人: Jong-Seon NO , Wijik LEE , Young-Sik KIM
CPC分类号: H04L9/304 , H03M13/136 , H03M13/616 , H03M13/6362 , H04L9/0861
摘要: Disclosed are a data encryption apparatus and a data encryption method using an encryption key based on puncturing of a generator matrix. Bit values located in a column at a specific point are punctured from a generator matrix of a Reed-Muller (RM) code and thereafter, encryption of a message is performed through a public key generated by using the punctured generator matrix to defend an attack from a third party based on a structure of the RM code by change of the structure of the generator matrix, thereby solving security vulnerability caused as the existing McEliece encryption system uses the generator matrix of the RM code having a special structure as it is.
-
公开(公告)号:US20220271922A1
公开(公告)日:2022-08-25
申请号:US17516924
申请日:2021-11-02
申请人: Samsung Electronics Co., Ltd. , Seoul National University R&DB Foundation , Industry Academic Cooperation Foundation, Chosun University
发明人: Jong-Seon NO , Yongwoo LEE , Young-Sik KIM
摘要: A processor-implemented method with homomorphic encryption includes: receiving a first ciphertext corresponding to a first modulus; generating a second ciphertext corresponding to a second modulus by performing modulus raising on the first ciphertext; and performing bootstrapping by encoding the second ciphertext using a commutative property and an associative property of operations included in a rotation operation.
-
公开(公告)号:US20220150047A1
公开(公告)日:2022-05-12
申请号:US17367252
申请日:2021-07-02
申请人: SEOUL NATIONAL UNIVERSITY R&DB FOUNDATION , INDUSTRY-ACADEMIC COOPERATION FOUNDATION, CHOSUN UNIVERSITY
发明人: Eunsang LEE , Joon-Woo LEE , Jong-Seon NO , Young-Sik KIM
IPC分类号: H04L9/00
摘要: Disclosed is an electronic apparatus. The electronic apparatus includes a memory storing a composite function in which at least two polynomials are composed and a processor configured to, based on a comparison operation command being received for a plurality of homomorphic ciphertexts, perform operation by reflecting the plurality of homomorphic ciphertexts to the composite function, and obtain a comparison result of the plurality of homomorphic ciphertexts based on the operation result, each of the at least two polynomials may output a value in a preset range for a value in a preset domain, and a domain of one of the at least two polynomials may be determined based on a range of a previous polynomial.
-
7.
公开(公告)号:US20210351912A1
公开(公告)日:2021-11-11
申请号:US17192162
申请日:2021-03-04
申请人: SAMSUNG ELECTRONICS CO., LTD. , SNU R&DB FOUNDATION , Industry-Academic Cooperation Foundation, Chosun University
发明人: Jung-Seon NO , Joonwoo LEE , Young-Sik KIM , Youngwoo LEE , Eunsang LEE
IPC分类号: H04L9/00
摘要: An encryption method and apparatus based on homomorphic encryption using an odd function property. The encryption method includes generating a ciphertext by encrypting data, and bootstrapping the ciphertext by performing a modular reduction based on an odd function property for a modulus corresponding to the ciphertext.
-
公开(公告)号:US20210351913A1
公开(公告)日:2021-11-11
申请号:US17218790
申请日:2021-03-31
申请人: Samsung Electronics Co., Ltd , SNU R&DB FOUNDATION , Industry-Academic Cooperation Foundation, Chosun University
发明人: Jong-Seon NO , Joonwoo LEE , Young-Sik KIM , Yongwoo LEE , Eunsang LEE
IPC分类号: H04L9/00
摘要: Disclosed is an encryption method and apparatus. The encryption method using homomorphic encryption may include generating a ciphertext by encrypting data, and bootstrapping the ciphertext by performing a modular reduction based on a selection of one or more target points for a modulus corresponding to the ciphertext.
-
-
-
-
-
-
-