FR3098953B1 - Method for secure data storage and system for implementing the method - Google Patents

Method for secure data storage and system for implementing the method Download PDF

Info

Publication number
FR3098953B1
FR3098953B1 FR2007516A FR2007516A FR3098953B1 FR 3098953 B1 FR3098953 B1 FR 3098953B1 FR 2007516 A FR2007516 A FR 2007516A FR 2007516 A FR2007516 A FR 2007516A FR 3098953 B1 FR3098953 B1 FR 3098953B1
Authority
FR
France
Prior art keywords
crumbs
group
implementing
hash
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR2007516A
Other languages
French (fr)
Other versions
FR3098953A1 (en
Inventor
Cyril Dever
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Edgewhere
Original Assignee
Edgewhere
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Edgewhere filed Critical Edgewhere
Priority to PCT/FR2020/051295 priority Critical patent/WO2021014081A1/en
Publication of FR3098953A1 publication Critical patent/FR3098953A1/en
Application granted granted Critical
Publication of FR3098953B1 publication Critical patent/FR3098953B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Abstract

TITRE : « Procédé de stockage sécurisé de données et système de mise en œuvre du procédé » Procédé de stockage sécurisé d’une donnée source (DS) d’un détenteur (To) avec la participation de tiers (Tj (j=1…m)) ayant chacun une clé publique (Kj) et une clé privée ( . Le procédé caractérisé consiste à -obfusquer (Ob) la donnée source (DS) - fractionner (Fr) la donnée obfusquée (Ob (MS)) en miettes (Mi) (i = 1…n) - répartir les miettes (Mi) en groupes Gj (j=…m ou j=0,1…m), chaque miette étant présente dans au moins deux groupes Gj, le nombre de groupes étant égal au nombre de participants, - attribuer un groupe (Gj) à chaque participants (Pj) - crypter (Kj) les miettes (Mi) de chaque groupe (Gj) par le participant attributaire du groupe avec sa clé publique (Kj) - regrouper les miettes cryptées (Kj (Mi) → Σ Kj [Gj (Mi)]) - hacher (H) la donnée source (DS) par le détenteur (To) et crypter le hash - composer la donnée transformée comme message (MC) combinant le hash HX (DS) crypté et les miettes cryptées (Kj (Mi)). Figure 1TITLE: "Method for secure data storage and system for implementing the method" Method for secure storage of a source data (DS) of a holder (To) with the participation of third parties (Tj (j = 1… m )) each having a public key (Kj) and a private key (. The characterized method consists of -obfusing (Ob) the source data (DS) - splitting (Fr) the obfuscated data (Ob (MS)) into crumbs (Mi ) (i = 1… n) - divide the crumbs (Mi) into groups Gj (j =… m or j = 0.1… m), each crumb being present in at least two groups Gj, the number of groups being equal to the number of participants, - assign a group (Gj) to each participant (Pj) - encrypt (Kj) the crumbs (Mi) of each group (Gj) by the participant assigned to the group with his public key (Kj) - group the encrypted crumbs (Kj (Mi) → Σ Kj [Gj (Mi)]) - hash (H) the source data (DS) by the holder (To) and encrypt the hash - compose the transformed data as a message (MC) combining the encrypted HX (DS) hash and the encrypted crumbs (Kj (Mi)). Figure 1

FR2007516A 2019-07-19 2020-07-17 Method for secure data storage and system for implementing the method Active FR3098953B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/FR2020/051295 WO2021014081A1 (en) 2019-07-19 2020-07-17 Method for secure data storage and system for implementing said method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1908258A FR3098950B3 (en) 2019-07-19 2019-07-19 "Method for secure data storage and system for implementing the method"
FR1908258 2019-07-19

Publications (2)

Publication Number Publication Date
FR3098953A1 FR3098953A1 (en) 2021-01-22
FR3098953B1 true FR3098953B1 (en) 2021-12-10

Family

ID=73138933

Family Applications (2)

Application Number Title Priority Date Filing Date
FR1908258A Expired - Fee Related FR3098950B3 (en) 2019-07-19 2019-07-19 "Method for secure data storage and system for implementing the method"
FR2007516A Active FR3098953B1 (en) 2019-07-19 2020-07-17 Method for secure data storage and system for implementing the method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
FR1908258A Expired - Fee Related FR3098950B3 (en) 2019-07-19 2019-07-19 "Method for secure data storage and system for implementing the method"

Country Status (1)

Country Link
FR (2) FR3098950B3 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10819506B2 (en) * 2015-10-07 2020-10-27 Nec Corporation Method for storing a data file
WO2017065209A1 (en) * 2015-10-16 2017-04-20 国立大学法人東北大学 Information processing system, information processing device, information processing method, and program
EP3379767B1 (en) * 2017-03-24 2021-01-13 Hewlett-Packard Development Company, L.P. Distributed authentication

Also Published As

Publication number Publication date
FR3098953A1 (en) 2021-01-22
FR3098950B3 (en) 2021-07-30
FR3098950A3 (en) 2021-01-22

Similar Documents

Publication Publication Date Title
Owen et al. Acalabrutinib monotherapy in patients with Waldenström macroglobulinemia: a single-arm, multicentre, phase 2 study
Thiebaut et al. Adult acute lymphocytic leukemia study testing chemotherapy and autologous and allogeneic transplantation: a follow-up report of the French protocol LALA 87
Kantarjian et al. Hepatic adverse event profile of inotuzumab ozogamicin in adult patients with relapsed or refractory acute lymphoblastic leukaemia: results from the open-label, randomised, phase 3 INO-VATE study
Marks et al. Management of adults with T-cell lymphoblastic leukemia
Aguayo et al. Combination therapy with methotrexate, vincristine, polyethylene‐glycol conjugated‐asparaginase, and prednisone in the treatment of patients with refractory or recurrent acute lymphoblastic leukemia
CN1160898C (en) Distributed group key management scheme for secure many-to-many communication
Ruiz-Camps et al. Risk of infection associated with targeted therapies for solid organ and hematological malignancies
US20050031119A1 (en) Method and communications device for secure group communication
Mato et al. A retrospective comparison of venetoclax alone or in combination with an anti-CD20 monoclonal antibody in R/R CLL
Durrant et al. The Medical Research Council trials in adult acute lymphocytic leukemia
Epperla et al. Postrelapse survival in diffuse large B-cell lymphoma after therapy failure following autologous transplantation
Vijayakumar et al. Rotation based secure multicast key management for batch rekeying operations
FR3098953B1 (en) Method for secure data storage and system for implementing the method
Lee et al. Reduced-intensity conditioning with busulfan, fludarabine, and antithymocyte globulin for hematopoietic cell transplantation from unrelated or haploidentical family donors in patients with acute myeloid leukemia in remission
Carroll et al. Therapies on the horizon for childhood acute lymphoblastic leukemia
Kato et al. Comparison of chemotherapeutic agents as a myeloablative conditioning with total body irradiation for pediatric acute lymphoblastic leukemia: A study from the pediatric ALL working group of the Japan Society for Hematopoietic Cell Transplantation
Zulian et al. Treatment in juvenile scleroderma
Burke et al. Phase 1b study of carfilzomib with induction chemotherapy in pediatric relapsed/refractory acute lymphoblastic leukemia
Tavernier et al. Secondary or concomitant neoplasms among adults diagnosed with acute lymphoblastic leukemia and treated according to the LALA‐87 and LALA‐94 trials
Rossini et al. Cutaneous adverse reaction to 2‐chlorodeoxyadenosine with histological flame figures in patients with chronic lymphocytic leukaemia
Zhang et al. Collusion-resistant query anonymization for location-based services
Bachow et al. Emerging therapies in relapsed and refractory peripheral T-cell lymphoma
Gelfand et al. Integrating negotiation and culture research
Baek et al. Pediatric-inspired regimen with late intensification and increased dose of L-asparaginase for adult acute lymphoblastic leukemia: the KALLA 1406/1407 study
Rossi et al. Long‐term haematological reconstitution following BEAM and autologous transplantation of circulating progenitor cells in non‐Hodgkin's lymphoma

Legal Events

Date Code Title Description
PLSC Publication of the preliminary search report

Effective date: 20210402

PLFP Fee payment

Year of fee payment: 2

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4

PLFP Fee payment

Year of fee payment: 5