FR3098953B1 - Method for secure data storage and system for implementing the method - Google Patents
Method for secure data storage and system for implementing the method Download PDFInfo
- Publication number
- FR3098953B1 FR3098953B1 FR2007516A FR2007516A FR3098953B1 FR 3098953 B1 FR3098953 B1 FR 3098953B1 FR 2007516 A FR2007516 A FR 2007516A FR 2007516 A FR2007516 A FR 2007516A FR 3098953 B1 FR3098953 B1 FR 3098953B1
- Authority
- FR
- France
- Prior art keywords
- crumbs
- group
- implementing
- hash
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title abstract 6
- 238000013500 data storage Methods 0.000 title abstract 2
- 239000008186 active pharmaceutical agent Substances 0.000 abstract 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Abstract
TITRE : « Procédé de stockage sécurisé de données et système de mise en œuvre du procédé » Procédé de stockage sécurisé d’une donnée source (DS) d’un détenteur (To) avec la participation de tiers (Tj (j=1…m)) ayant chacun une clé publique (Kj) et une clé privée ( . Le procédé caractérisé consiste à -obfusquer (Ob) la donnée source (DS) - fractionner (Fr) la donnée obfusquée (Ob (MS)) en miettes (Mi) (i = 1…n) - répartir les miettes (Mi) en groupes Gj (j=…m ou j=0,1…m), chaque miette étant présente dans au moins deux groupes Gj, le nombre de groupes étant égal au nombre de participants, - attribuer un groupe (Gj) à chaque participants (Pj) - crypter (Kj) les miettes (Mi) de chaque groupe (Gj) par le participant attributaire du groupe avec sa clé publique (Kj) - regrouper les miettes cryptées (Kj (Mi) → Σ Kj [Gj (Mi)]) - hacher (H) la donnée source (DS) par le détenteur (To) et crypter le hash - composer la donnée transformée comme message (MC) combinant le hash HX (DS) crypté et les miettes cryptées (Kj (Mi)). Figure 1TITLE: "Method for secure data storage and system for implementing the method" Method for secure storage of a source data (DS) of a holder (To) with the participation of third parties (Tj (j = 1… m )) each having a public key (Kj) and a private key (. The characterized method consists of -obfusing (Ob) the source data (DS) - splitting (Fr) the obfuscated data (Ob (MS)) into crumbs (Mi ) (i = 1… n) - divide the crumbs (Mi) into groups Gj (j =… m or j = 0.1… m), each crumb being present in at least two groups Gj, the number of groups being equal to the number of participants, - assign a group (Gj) to each participant (Pj) - encrypt (Kj) the crumbs (Mi) of each group (Gj) by the participant assigned to the group with his public key (Kj) - group the encrypted crumbs (Kj (Mi) → Σ Kj [Gj (Mi)]) - hash (H) the source data (DS) by the holder (To) and encrypt the hash - compose the transformed data as a message (MC) combining the encrypted HX (DS) hash and the encrypted crumbs (Kj (Mi)). Figure 1
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/FR2020/051295 WO2021014081A1 (en) | 2019-07-19 | 2020-07-17 | Method for secure data storage and system for implementing said method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1908258A FR3098950B3 (en) | 2019-07-19 | 2019-07-19 | "Method for secure data storage and system for implementing the method" |
FR1908258 | 2019-07-19 |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3098953A1 FR3098953A1 (en) | 2021-01-22 |
FR3098953B1 true FR3098953B1 (en) | 2021-12-10 |
Family
ID=73138933
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1908258A Expired - Fee Related FR3098950B3 (en) | 2019-07-19 | 2019-07-19 | "Method for secure data storage and system for implementing the method" |
FR2007516A Active FR3098953B1 (en) | 2019-07-19 | 2020-07-17 | Method for secure data storage and system for implementing the method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1908258A Expired - Fee Related FR3098950B3 (en) | 2019-07-19 | 2019-07-19 | "Method for secure data storage and system for implementing the method" |
Country Status (1)
Country | Link |
---|---|
FR (2) | FR3098950B3 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10819506B2 (en) * | 2015-10-07 | 2020-10-27 | Nec Corporation | Method for storing a data file |
WO2017065209A1 (en) * | 2015-10-16 | 2017-04-20 | 国立大学法人東北大学 | Information processing system, information processing device, information processing method, and program |
EP3379767B1 (en) * | 2017-03-24 | 2021-01-13 | Hewlett-Packard Development Company, L.P. | Distributed authentication |
-
2019
- 2019-07-19 FR FR1908258A patent/FR3098950B3/en not_active Expired - Fee Related
-
2020
- 2020-07-17 FR FR2007516A patent/FR3098953B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
FR3098953A1 (en) | 2021-01-22 |
FR3098950B3 (en) | 2021-07-30 |
FR3098950A3 (en) | 2021-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Owen et al. | Acalabrutinib monotherapy in patients with Waldenström macroglobulinemia: a single-arm, multicentre, phase 2 study | |
Thiebaut et al. | Adult acute lymphocytic leukemia study testing chemotherapy and autologous and allogeneic transplantation: a follow-up report of the French protocol LALA 87 | |
Kantarjian et al. | Hepatic adverse event profile of inotuzumab ozogamicin in adult patients with relapsed or refractory acute lymphoblastic leukaemia: results from the open-label, randomised, phase 3 INO-VATE study | |
Marks et al. | Management of adults with T-cell lymphoblastic leukemia | |
Aguayo et al. | Combination therapy with methotrexate, vincristine, polyethylene‐glycol conjugated‐asparaginase, and prednisone in the treatment of patients with refractory or recurrent acute lymphoblastic leukemia | |
CN1160898C (en) | Distributed group key management scheme for secure many-to-many communication | |
Ruiz-Camps et al. | Risk of infection associated with targeted therapies for solid organ and hematological malignancies | |
US20050031119A1 (en) | Method and communications device for secure group communication | |
Mato et al. | A retrospective comparison of venetoclax alone or in combination with an anti-CD20 monoclonal antibody in R/R CLL | |
Durrant et al. | The Medical Research Council trials in adult acute lymphocytic leukemia | |
Epperla et al. | Postrelapse survival in diffuse large B-cell lymphoma after therapy failure following autologous transplantation | |
Vijayakumar et al. | Rotation based secure multicast key management for batch rekeying operations | |
FR3098953B1 (en) | Method for secure data storage and system for implementing the method | |
Lee et al. | Reduced-intensity conditioning with busulfan, fludarabine, and antithymocyte globulin for hematopoietic cell transplantation from unrelated or haploidentical family donors in patients with acute myeloid leukemia in remission | |
Carroll et al. | Therapies on the horizon for childhood acute lymphoblastic leukemia | |
Kato et al. | Comparison of chemotherapeutic agents as a myeloablative conditioning with total body irradiation for pediatric acute lymphoblastic leukemia: A study from the pediatric ALL working group of the Japan Society for Hematopoietic Cell Transplantation | |
Zulian et al. | Treatment in juvenile scleroderma | |
Burke et al. | Phase 1b study of carfilzomib with induction chemotherapy in pediatric relapsed/refractory acute lymphoblastic leukemia | |
Tavernier et al. | Secondary or concomitant neoplasms among adults diagnosed with acute lymphoblastic leukemia and treated according to the LALA‐87 and LALA‐94 trials | |
Rossini et al. | Cutaneous adverse reaction to 2‐chlorodeoxyadenosine with histological flame figures in patients with chronic lymphocytic leukaemia | |
Zhang et al. | Collusion-resistant query anonymization for location-based services | |
Bachow et al. | Emerging therapies in relapsed and refractory peripheral T-cell lymphoma | |
Gelfand et al. | Integrating negotiation and culture research | |
Baek et al. | Pediatric-inspired regimen with late intensification and increased dose of L-asparaginase for adult acute lymphoblastic leukemia: the KALLA 1406/1407 study | |
Rossi et al. | Long‐term haematological reconstitution following BEAM and autologous transplantation of circulating progenitor cells in non‐Hodgkin's lymphoma |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLSC | Publication of the preliminary search report |
Effective date: 20210402 |
|
PLFP | Fee payment |
Year of fee payment: 2 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
PLFP | Fee payment |
Year of fee payment: 5 |