FR3035293B1 - Procede de communication cryptographique base sur le hasard profond - Google Patents
Procede de communication cryptographique base sur le hasard profond Download PDFInfo
- Publication number
- FR3035293B1 FR3035293B1 FR1500759A FR1500759A FR3035293B1 FR 3035293 B1 FR3035293 B1 FR 3035293B1 FR 1500759 A FR1500759 A FR 1500759A FR 1500759 A FR1500759 A FR 1500759A FR 3035293 B1 FR3035293 B1 FR 3035293B1
- Authority
- FR
- France
- Prior art keywords
- information
- random
- communication channel
- entities
- entity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000006854 communication Effects 0.000 title abstract 6
- 238000013500 data storage Methods 0.000 abstract 1
- 230000002452 interceptive effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/01—Probabilistic graphical models, e.g. probabilistic networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0875—Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
Le procédé permet à deux entités reliées par un canal de communication non sûr, et ne partageant initialement aucune donnée secrète, de convenir d'une information secrète partagée de manière inconditionnellement sure. Chacune de de ces entités a la capacité de générer une nouvelle forme d'information aléatoire, appelé Hasard Profond, telle que toute entité autre qu'elle même ne peut connaître sa distribution de probabilité, en dehors d'un ensemble de caractéristiques publiques. Le système interne de chaque entité est constitué : (1) d'un Générateur de Hasard Profond (GHP) capable de générer un signal aléatoir en Hasard Profond, et d'effectuer des traitements à partir du signal généré ; et (2) d'un Module de Communication Interactive (MCI) capable de publier et de lire des informations sur le canal de communication non sûr. Ces deux entités exécutent un protocole de communication tel que : (i) elles peuvent chacune calculer leur estimation respective de l'information secrète partagée, qui soit aussi proche que souhaité de l'égalité parfaite, et (ii) toute entité passive ayant un accès complet et illimité aux informations échangées sur le canal de communication, et ayant des capacités de calcul et de stockage de données illimitées, ne peut calculer qu'une estimation de l'information secrète partagée qui peut être rendue statistiquement aussi proche que souhaité de l'incertitude absolue.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1500759A FR3035293B1 (fr) | 2015-04-14 | 2015-04-14 | Procede de communication cryptographique base sur le hasard profond |
PCT/FR2016/000070 WO2016166426A1 (fr) | 2015-04-14 | 2016-04-06 | Procédé de communication cryptographique basé sur le hasard profond |
US15/562,799 US10396983B2 (en) | 2015-04-14 | 2016-04-06 | Method for cryptographic communication based on pure chance |
CN201680030035.7A CN108093680B (zh) | 2015-04-14 | 2016-04-06 | 基于纯随机加密通信方法 |
EP16723793.2A EP3284208A1 (fr) | 2015-04-14 | 2016-04-06 | Procédé de communication cryptographique basé sur le hasard profond |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1500759A FR3035293B1 (fr) | 2015-04-14 | 2015-04-14 | Procede de communication cryptographique base sur le hasard profond |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3035293A1 FR3035293A1 (fr) | 2016-10-21 |
FR3035293B1 true FR3035293B1 (fr) | 2021-10-08 |
Family
ID=54291322
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1500759A Expired - Fee Related FR3035293B1 (fr) | 2015-04-14 | 2015-04-14 | Procede de communication cryptographique base sur le hasard profond |
Country Status (5)
Country | Link |
---|---|
US (1) | US10396983B2 (fr) |
EP (1) | EP3284208A1 (fr) |
CN (1) | CN108093680B (fr) |
FR (1) | FR3035293B1 (fr) |
WO (1) | WO2016166426A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112150581B (zh) * | 2020-08-19 | 2022-09-30 | 中国海洋大学 | 一种分布式的自适应图顶点着色方法及系统 |
GB2620973A (en) * | 2022-07-28 | 2024-01-31 | Univ Leeds Innovations Ltd | Secure communication |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7983422B2 (en) * | 2003-07-25 | 2011-07-19 | Hewlett-Packard Development Company, L.P. | Quantum cryptography |
US7526414B2 (en) * | 2003-07-25 | 2009-04-28 | Siemens Corporate Research, Inc. | Density morphing and mode propagation for Bayesian filtering |
US20060200660A1 (en) * | 2004-12-29 | 2006-09-07 | My-T Llc | Apparatus, method, and computer program product for secured communication channel |
US20070106754A1 (en) * | 2005-09-10 | 2007-05-10 | Moore James F | Security facility for maintaining health care data pools |
US8874477B2 (en) * | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
CN101018125B (zh) * | 2007-03-02 | 2010-06-16 | 中兴通讯股份有限公司 | 一种基于椭圆曲线公钥密码的无线终端安全锁网锁卡方法 |
CN101977112B (zh) * | 2010-11-04 | 2013-10-09 | 厦门大学 | 一种基于神经网络混沌吸引子的公钥密码加密和解密方法 |
WO2012177282A1 (fr) * | 2011-06-23 | 2012-12-27 | Intel Corporation | Tramage stochastique avec élimination sélective |
WO2013006836A1 (fr) * | 2011-07-06 | 2013-01-10 | D-Wave Systems Inc. | Systèmes basés sur un processeur quantique et méthodes minimisant une fonction économique |
FR3002349A1 (fr) * | 2013-02-20 | 2014-08-22 | Arnaud Pernel | Procede de cryptographie ordinale : methode de base n°5 et systeme d'identification associe, procede d'echange de cle |
US9367815B2 (en) * | 2013-03-15 | 2016-06-14 | Microsoft Technology Licensing, Llc | Monte-Carlo approach to computing value of information |
CN103281259B (zh) * | 2013-05-20 | 2016-05-18 | 中国科学院信息工程研究所 | 一种基于动态自调节的域间访问控制方法 |
-
2015
- 2015-04-14 FR FR1500759A patent/FR3035293B1/fr not_active Expired - Fee Related
-
2016
- 2016-04-06 CN CN201680030035.7A patent/CN108093680B/zh not_active Expired - Fee Related
- 2016-04-06 WO PCT/FR2016/000070 patent/WO2016166426A1/fr active Application Filing
- 2016-04-06 US US15/562,799 patent/US10396983B2/en active Active
- 2016-04-06 EP EP16723793.2A patent/EP3284208A1/fr not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
EP3284208A1 (fr) | 2018-02-21 |
CN108093680B (zh) | 2021-07-13 |
US20180287781A1 (en) | 2018-10-04 |
CN108093680A (zh) | 2018-05-29 |
FR3035293A1 (fr) | 2016-10-21 |
WO2016166426A1 (fr) | 2016-10-20 |
US10396983B2 (en) | 2019-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110033258B (zh) | 基于区块链的业务数据加密方法及装置 | |
CN105871543B (zh) | 多数据拥有者背景下基于属性的多关键字密文检索方法 | |
Shankar et al. | Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm | |
SG10201802554YA (en) | Blockchain-based digital identity management method | |
CN112434313A (zh) | 数据共享方法、系统、电子设备及存储介质 | |
CN110688673B (zh) | 基于云服务器及区块链的医疗数据共享方法、装置及系统 | |
Cui et al. | Harnessing encrypted data in cloud for secure and efficient mobile image sharing | |
WO2014138753A3 (fr) | Procédé et système pour une recommandation à préservation de confidentialité à des utilisateurs contribuant à une évaluation sur la base d'une factorisation matricielle | |
US10417442B2 (en) | Server device, data search system, search method, and recording medium for extracting concealed data | |
CN109344640B (zh) | 一种基于同态加密和多项式计算的子图匹配方法 | |
CN105592085A (zh) | 面向位置感知推荐系统的隐私保护方法 | |
CN108092766A (zh) | 一种密文搜索权限验证方法及其系统 | |
Rajput et al. | Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN | |
Tan et al. | A blockchain-based Shamir's threshold cryptography for data protection in industrial internet of things of smart city | |
CN112199697A (zh) | 基于共享根密钥的信息处理方法、装置、设备及介质 | |
Alhazmi et al. | Towards big data security framework by leveraging fragmentation and blockchain technology | |
Song et al. | Design and implementation of HDFS data encryption scheme using ARIA algorithm on Hadoop | |
CN116938449A (zh) | 防止欺诈的计算机实现的方法、存储介质、设备及系统 | |
Jin et al. | Private video foreground extraction through chaotic mapping based encryption in the cloud | |
CN110995419A (zh) | 一种基于链上数据对称加密解密方法及设备、介质 | |
FR3035293B1 (fr) | Procede de communication cryptographique base sur le hasard profond | |
JP2023524356A (ja) | 分類の正確さを改善するための機械学習モデリングデータの処理 | |
CN111596890A (zh) | 一种基于分布式协议的区块链随机数种子生成方法、设备及介质 | |
Yao et al. | A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain | |
CN108632257B (zh) | 支持分层搜索的加密健康记录的获取方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 2 |
|
PLSC | Publication of the preliminary search report |
Effective date: 20161021 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
ST | Notification of lapse |
Effective date: 20191206 |
|
PLFP | Fee payment |
Year of fee payment: 6 |
|
FC | Decision of inpi director general to approve request for restoration |
Effective date: 20200604 |
|
RN | Application for restoration |
Effective date: 20200604 |
|
PLFP | Fee payment |
Year of fee payment: 8 |
|
ST | Notification of lapse |
Effective date: 20231205 |