FR3098950B3 - "Method for secure data storage and system for implementing the method" - Google Patents

"Method for secure data storage and system for implementing the method" Download PDF

Info

Publication number
FR3098950B3
FR3098950B3 FR1908258A FR1908258A FR3098950B3 FR 3098950 B3 FR3098950 B3 FR 3098950B3 FR 1908258 A FR1908258 A FR 1908258A FR 1908258 A FR1908258 A FR 1908258A FR 3098950 B3 FR3098950 B3 FR 3098950B3
Authority
FR
France
Prior art keywords
crumbs
group
groups
implementing
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
FR1908258A
Other languages
French (fr)
Other versions
FR3098950A3 (en
Inventor
Cyril Dever
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Edgewhere
Original Assignee
Edgewhere
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Edgewhere filed Critical Edgewhere
Priority to FR1908258A priority Critical patent/FR3098950B3/en
Priority to FR2007516A priority patent/FR3098953B1/en
Priority to PCT/FR2020/051295 priority patent/WO2021014081A1/en
Publication of FR3098950A3 publication Critical patent/FR3098950A3/en
Application granted granted Critical
Publication of FR3098950B3 publication Critical patent/FR3098950B3/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

TITRE : « Procédé de stockage sécurisé de données et système de mise en œuvre du procédé » Procédé de stockage sécurisé d’une donnée source (DS) d’un détenteur (To) avec la participation de tiers (Tj (j=1…m)) ayant chacun une clé publique (Kj) et une clé privée ( . Le procédé caractérisé consiste à -obfusquer (Ob) la donnée source (DS) - fractionner (Fr) la donnée obfusquée (Ob (MS)) en miettes (Mi) (i = 1…n) - répartir les miettes (Mi) en groupes Gj (j=…m ou j=0,1…m), chaque miette étant présente dans au moins deux groupes Gj, le nombre de groupes étant égal au nombre de participants, - attribuer un groupe (Gj) à chaque participants (Pj) - crypter (Kj) les miettes (Mi) de chaque groupe (Gj) par le participant attributaire du groupe avec sa clé publique (Kj) - regrouper les miettes cryptées (Kj (Mi) → Σ Kj [Gj (Mi)]) - hacher (H) la donnée source obfusquée (Ob (DS)) par le détenteur (To) - composer la donnée transformée comme message (MC) combinant le hash H [Ob (DS)] et les miettes cryptées (Kj (Mi)) - faire sauvegarder le message combiné (MC). Figure 1TITLE: "Method for secure data storage and system for implementing the method" Method for secure storage of a source data (DS) of a holder (To) with the participation of third parties (Tj (j = 1… m )) each having a public key (Kj) and a private key (. The characterized method consists of -obfuscating (Ob) the source datum (DS) - splitting (Fr) the obfuscated datum (Ob (MS)) into crumbs (Mi ) (i = 1… n) - divide the crumbs (Mi) into groups Gj (j =… m or j = 0.1… m), each crumb being present in at least two groups Gj, the number of groups being equal to the number of participants, - assign a group (Gj) to each participant (Pj) - encrypt (Kj) the crumbs (Mi) of each group (Gj) by the participant assigned to the group with his public key (Kj) - group the encrypted crumbs (Kj (Mi) → Σ Kj [Gj (Mi)]) - hash (H) the source data obfuscated (Ob (DS)) by the holder (To) - compose the transformed data as a message (MC) combining the hash H [Ob (DS)] and crumbs cr ypties (Kj (Mi)) - save the combined message (MC). Figure 1

FR1908258A 2019-07-19 2019-07-19 "Method for secure data storage and system for implementing the method" Expired - Fee Related FR3098950B3 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
FR1908258A FR3098950B3 (en) 2019-07-19 2019-07-19 "Method for secure data storage and system for implementing the method"
FR2007516A FR3098953B1 (en) 2019-07-19 2020-07-17 Method for secure data storage and system for implementing the method
PCT/FR2020/051295 WO2021014081A1 (en) 2019-07-19 2020-07-17 Method for secure data storage and system for implementing said method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1908258A FR3098950B3 (en) 2019-07-19 2019-07-19 "Method for secure data storage and system for implementing the method"
FR1908258 2019-07-19

Publications (2)

Publication Number Publication Date
FR3098950A3 FR3098950A3 (en) 2021-01-22
FR3098950B3 true FR3098950B3 (en) 2021-07-30

Family

ID=73138933

Family Applications (2)

Application Number Title Priority Date Filing Date
FR1908258A Expired - Fee Related FR3098950B3 (en) 2019-07-19 2019-07-19 "Method for secure data storage and system for implementing the method"
FR2007516A Active FR3098953B1 (en) 2019-07-19 2020-07-17 Method for secure data storage and system for implementing the method

Family Applications After (1)

Application Number Title Priority Date Filing Date
FR2007516A Active FR3098953B1 (en) 2019-07-19 2020-07-17 Method for secure data storage and system for implementing the method

Country Status (1)

Country Link
FR (2) FR3098950B3 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3360033B1 (en) * 2015-10-07 2023-03-15 Nec Corporation Method for storing a data file
EP3364328A1 (en) * 2015-10-16 2018-08-22 Tohoku Techno Arch Co., Ltd. Information processing system, information processing device, information processing method, and program
EP3379767B1 (en) * 2017-03-24 2021-01-13 Hewlett-Packard Development Company, L.P. Distributed authentication

Also Published As

Publication number Publication date
FR3098953A1 (en) 2021-01-22
FR3098953B1 (en) 2021-12-10
FR3098950A3 (en) 2021-01-22

Similar Documents

Publication Publication Date Title
Thiebaut et al. Adult acute lymphocytic leukemia study testing chemotherapy and autologous and allogeneic transplantation: a follow-up report of the French protocol LALA 87
Hallböök et al. Treatment outcome in young adults and children> 10 years of age with acute lymphoblastic leukemia in Sweden: a comparison between a pediatric protocol and an adult protocol
Aguayo et al. Combination therapy with methotrexate, vincristine, polyethylene‐glycol conjugated‐asparaginase, and prednisone in the treatment of patients with refractory or recurrent acute lymphoblastic leukemia
Gupta et al. Ruxolitinib therapy followed by reduced-intensity conditioning for hematopoietic cell transplantation for myelofibrosis: Myeloproliferative Disorders Research Consortium 114 Study
Donadieu et al. Critical study of prognostic factors in childhood acute lymphoblastic leukaemia: differences in outcome are poorly explained by the most significant prognostic variables
Ribera et al. Treatment of young patients with P hiladelphia chromosome‐positive acute lymphoblastic leukaemia using increased dose of imatinib and deintensified chemotherapy before allogeneic stem cell transplantation
Scaglione et al. Pharmacodynamics of levofloxacin and ciprofloxacin in a murine pneumonia model: peak concentration/MIC versus area under the curve/MIC ratios
Mato et al. A retrospective comparison of venetoclax alone or in combination with an anti-CD20 monoclonal antibody in R/R CLL
Saadeh et al. Hematopoietic stem cell transplant in adults with acute lymphoblastic leukemia: the present state
Havelange et al. Patterns of genomic aberrations suggest that Burkitt lymphomas with complex karyotype are distinct from other aggressive B‐cell lymphomas with MYC rearrangement
FR3098950B3 (en) "Method for secure data storage and system for implementing the method"
Advani et al. Acute leukemia in adolescents and young adults
Zulian et al. Treatment in juvenile scleroderma
Rossini et al. Cutaneous adverse reaction to 2‐chlorodeoxyadenosine with histological flame figures in patients with chronic lymphocytic leukaemia
Tavernier et al. Secondary or concomitant neoplasms among adults diagnosed with acute lymphoblastic leukemia and treated according to the LALA‐87 and LALA‐94 trials
Rodriguez et al. Cyclosporine and mycophenolate mofetil prophylaxis with fludarabine and melphalan conditioning for unrelated donor transplantation: a prospective study of 22 patients with hematologic malignancies
Yi et al. Allogeneic hematopoietic cell transplantation in patients with juvenile myelomonocytic leukemia in Korea: a report of the Korean Pediatric Hematology-Oncology Group
Engvall Russia's War in Ukraine: Implications for Central Asia
Gelfand et al. Integrating negotiation and culture research
Rossi et al. Long‐term haematological reconstitution following BEAM and autologous transplantation of circulating progenitor cells in non‐Hodgkin's lymphoma
Morris et al. The working patterns and retirement plans of general dental practitioners in a Midlands Health Authority
Ganesan et al. How I Treat Adult Acute Lymphoblastic Leukemia in India
Maude et al. Update in Pediatric Oncology: Section A-New Developments in the Treatment of Pediatric Acute Lymphoblastic Leukemia
Hendaoui et al. Cgk: A collaborative group key management scheme
De et al. Should silence be heard? fair rational secret sharing with silent and non-silent players

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

ST Notification of lapse

Effective date: 20220305