Invention Title:

STORAGE DEVICE, HOST DEVICE AND DATA TRANSFER METHOD THEREOF

Publication number:

US20250342260

Publication date:
Section:

Physics

Class:

G06F21/602

Inventors:

Assignee:

Applicant:

Smart overview of the Invention

A novel data transfer method is proposed, leveraging homomorphic encryption in storage devices to enable secure data operations without decryption. The technique involves encrypting original data using a homomorphic encryption algorithm, generating a parameter for regenerating a ciphertext of a higher operation level, and transmitting both the encrypted data and parameter to an external host device. This approach aims to address the challenge of large ciphertext sizes in homomorphic encryption by optimizing data transfer processes.

Key Components

The system comprises a storage device with non-volatile memory and a controller, which includes control pins, a security module, buffer memory, and at least one processor. The security module is responsible for encrypting original data into a ciphertext of a first operation level and generating parameters for higher-level ciphertext regeneration. The processor oversees the overall operation, including various management tasks such as cache management and power loss protection.

Host Device Operations

Upon receiving the ciphertext and parameter from the storage device, the host device regenerates ciphertexts of multiple levels using the provided data. It then performs operations on these regenerated ciphertexts, maintaining the integrity of encrypted operations without requiring decryption. This method enhances security while reducing the amount of data transferred.

Cloud Integration

The method extends to cloud services, where encrypted data is transmitted alongside table data for bootstrapping. The cloud server receives this information, regenerates appropriate ciphertext levels using the table data, performs necessary operations on them, and returns the result to the originating electronic device. This facilitates secure cloud computing operations without compromising on encryption.

Implementation Examples

Diagrams illustrate various embodiments, including storage devices with vertical NAND flash memory and controllers with advanced encryption capabilities. These examples demonstrate practical applications in IoT devices and network systems. The detailed diagrams and flowcharts provide insights into the operational workflows, ensuring clarity in implementing this homomorphic encryption-based data transfer method.