FR3098950B3 - "Method for secure data storage and system for implementing the method" - Google Patents
"Method for secure data storage and system for implementing the method" Download PDFInfo
- Publication number
- FR3098950B3 FR3098950B3 FR1908258A FR1908258A FR3098950B3 FR 3098950 B3 FR3098950 B3 FR 3098950B3 FR 1908258 A FR1908258 A FR 1908258A FR 1908258 A FR1908258 A FR 1908258A FR 3098950 B3 FR3098950 B3 FR 3098950B3
- Authority
- FR
- France
- Prior art keywords
- crumbs
- group
- groups
- implementing
- data storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
TITRE : « Procédé de stockage sécurisé de données et système de mise en œuvre du procédé » Procédé de stockage sécurisé d’une donnée source (DS) d’un détenteur (To) avec la participation de tiers (Tj (j=1…m)) ayant chacun une clé publique (Kj) et une clé privée ( . Le procédé caractérisé consiste à -obfusquer (Ob) la donnée source (DS) - fractionner (Fr) la donnée obfusquée (Ob (MS)) en miettes (Mi) (i = 1…n) - répartir les miettes (Mi) en groupes Gj (j=…m ou j=0,1…m), chaque miette étant présente dans au moins deux groupes Gj, le nombre de groupes étant égal au nombre de participants, - attribuer un groupe (Gj) à chaque participants (Pj) - crypter (Kj) les miettes (Mi) de chaque groupe (Gj) par le participant attributaire du groupe avec sa clé publique (Kj) - regrouper les miettes cryptées (Kj (Mi) → Σ Kj [Gj (Mi)]) - hacher (H) la donnée source obfusquée (Ob (DS)) par le détenteur (To) - composer la donnée transformée comme message (MC) combinant le hash H [Ob (DS)] et les miettes cryptées (Kj (Mi)) - faire sauvegarder le message combiné (MC). Figure 1TITLE: "Method for secure data storage and system for implementing the method" Method for secure storage of a source data (DS) of a holder (To) with the participation of third parties (Tj (j = 1… m )) each having a public key (Kj) and a private key (. The characterized method consists of -obfuscating (Ob) the source datum (DS) - splitting (Fr) the obfuscated datum (Ob (MS)) into crumbs (Mi ) (i = 1… n) - divide the crumbs (Mi) into groups Gj (j =… m or j = 0.1… m), each crumb being present in at least two groups Gj, the number of groups being equal to the number of participants, - assign a group (Gj) to each participant (Pj) - encrypt (Kj) the crumbs (Mi) of each group (Gj) by the participant assigned to the group with his public key (Kj) - group the encrypted crumbs (Kj (Mi) → Σ Kj [Gj (Mi)]) - hash (H) the source data obfuscated (Ob (DS)) by the holder (To) - compose the transformed data as a message (MC) combining the hash H [Ob (DS)] and crumbs cr ypties (Kj (Mi)) - save the combined message (MC). Figure 1
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1908258A FR3098950B3 (en) | 2019-07-19 | 2019-07-19 | "Method for secure data storage and system for implementing the method" |
FR2007516A FR3098953B1 (en) | 2019-07-19 | 2020-07-17 | Method for secure data storage and system for implementing the method |
PCT/FR2020/051295 WO2021014081A1 (en) | 2019-07-19 | 2020-07-17 | Method for secure data storage and system for implementing said method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1908258A FR3098950B3 (en) | 2019-07-19 | 2019-07-19 | "Method for secure data storage and system for implementing the method" |
FR1908258 | 2019-07-19 |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3098950A3 FR3098950A3 (en) | 2021-01-22 |
FR3098950B3 true FR3098950B3 (en) | 2021-07-30 |
Family
ID=73138933
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1908258A Expired - Fee Related FR3098950B3 (en) | 2019-07-19 | 2019-07-19 | "Method for secure data storage and system for implementing the method" |
FR2007516A Active FR3098953B1 (en) | 2019-07-19 | 2020-07-17 | Method for secure data storage and system for implementing the method |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR2007516A Active FR3098953B1 (en) | 2019-07-19 | 2020-07-17 | Method for secure data storage and system for implementing the method |
Country Status (1)
Country | Link |
---|---|
FR (2) | FR3098950B3 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3360033B1 (en) * | 2015-10-07 | 2023-03-15 | Nec Corporation | Method for storing a data file |
EP3364328A1 (en) * | 2015-10-16 | 2018-08-22 | Tohoku Techno Arch Co., Ltd. | Information processing system, information processing device, information processing method, and program |
EP3379767B1 (en) * | 2017-03-24 | 2021-01-13 | Hewlett-Packard Development Company, L.P. | Distributed authentication |
-
2019
- 2019-07-19 FR FR1908258A patent/FR3098950B3/en not_active Expired - Fee Related
-
2020
- 2020-07-17 FR FR2007516A patent/FR3098953B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
FR3098953A1 (en) | 2021-01-22 |
FR3098953B1 (en) | 2021-12-10 |
FR3098950A3 (en) | 2021-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thiebaut et al. | Adult acute lymphocytic leukemia study testing chemotherapy and autologous and allogeneic transplantation: a follow-up report of the French protocol LALA 87 | |
Hallböök et al. | Treatment outcome in young adults and children> 10 years of age with acute lymphoblastic leukemia in Sweden: a comparison between a pediatric protocol and an adult protocol | |
Aguayo et al. | Combination therapy with methotrexate, vincristine, polyethylene‐glycol conjugated‐asparaginase, and prednisone in the treatment of patients with refractory or recurrent acute lymphoblastic leukemia | |
Gupta et al. | Ruxolitinib therapy followed by reduced-intensity conditioning for hematopoietic cell transplantation for myelofibrosis: Myeloproliferative Disorders Research Consortium 114 Study | |
Donadieu et al. | Critical study of prognostic factors in childhood acute lymphoblastic leukaemia: differences in outcome are poorly explained by the most significant prognostic variables | |
Ribera et al. | Treatment of young patients with P hiladelphia chromosome‐positive acute lymphoblastic leukaemia using increased dose of imatinib and deintensified chemotherapy before allogeneic stem cell transplantation | |
Scaglione et al. | Pharmacodynamics of levofloxacin and ciprofloxacin in a murine pneumonia model: peak concentration/MIC versus area under the curve/MIC ratios | |
Mato et al. | A retrospective comparison of venetoclax alone or in combination with an anti-CD20 monoclonal antibody in R/R CLL | |
Saadeh et al. | Hematopoietic stem cell transplant in adults with acute lymphoblastic leukemia: the present state | |
Havelange et al. | Patterns of genomic aberrations suggest that Burkitt lymphomas with complex karyotype are distinct from other aggressive B‐cell lymphomas with MYC rearrangement | |
FR3098950B3 (en) | "Method for secure data storage and system for implementing the method" | |
Advani et al. | Acute leukemia in adolescents and young adults | |
Zulian et al. | Treatment in juvenile scleroderma | |
Rossini et al. | Cutaneous adverse reaction to 2‐chlorodeoxyadenosine with histological flame figures in patients with chronic lymphocytic leukaemia | |
Tavernier et al. | Secondary or concomitant neoplasms among adults diagnosed with acute lymphoblastic leukemia and treated according to the LALA‐87 and LALA‐94 trials | |
Rodriguez et al. | Cyclosporine and mycophenolate mofetil prophylaxis with fludarabine and melphalan conditioning for unrelated donor transplantation: a prospective study of 22 patients with hematologic malignancies | |
Yi et al. | Allogeneic hematopoietic cell transplantation in patients with juvenile myelomonocytic leukemia in Korea: a report of the Korean Pediatric Hematology-Oncology Group | |
Engvall | Russia's War in Ukraine: Implications for Central Asia | |
Gelfand et al. | Integrating negotiation and culture research | |
Rossi et al. | Long‐term haematological reconstitution following BEAM and autologous transplantation of circulating progenitor cells in non‐Hodgkin's lymphoma | |
Morris et al. | The working patterns and retirement plans of general dental practitioners in a Midlands Health Authority | |
Ganesan et al. | How I Treat Adult Acute Lymphoblastic Leukemia in India | |
Maude et al. | Update in Pediatric Oncology: Section A-New Developments in the Treatment of Pediatric Acute Lymphoblastic Leukemia | |
Hendaoui et al. | Cgk: A collaborative group key management scheme | |
De et al. | Should silence be heard? fair rational secret sharing with silent and non-silent players |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 2 |
|
ST | Notification of lapse |
Effective date: 20220305 |