WO2024256424A1 - Procédé de traitement de données personnelles, système et programme d'ordinateur associés - Google Patents
Procédé de traitement de données personnelles, système et programme d'ordinateur associés Download PDFInfo
- Publication number
- WO2024256424A1 WO2024256424A1 PCT/EP2024/066152 EP2024066152W WO2024256424A1 WO 2024256424 A1 WO2024256424 A1 WO 2024256424A1 EP 2024066152 W EP2024066152 W EP 2024066152W WO 2024256424 A1 WO2024256424 A1 WO 2024256424A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rank
- data
- personal
- candidate
- personal data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
Definitions
- the invention relates to a method for processing personal data.
- the invention also relates to an associated system and computer program.
- Identification schemes are already known in which a user presents to a trusted processing unit, for example a unit belonging to a customs office, an airport, etc., a freshly acquired biometric data on the user (called candidate biometric data) which the unit compares with one or more reference biometric data recorded in a database to which it has access.
- a trusted processing unit for example a unit belonging to a customs office, an airport, etc.
- candidate biometric data a freshly acquired biometric data on the user
- the unit compares with one or more reference biometric data recorded in a database to which it has access.
- This database collects reference biometric data of authorized individuals (such as passengers on a flight before boarding).
- a homomorphic cryptographic scheme allows certain mathematical operations to be performed on previously encrypted data instead of plain text data.
- SIMD architecture abbreviation of "Single Instruction Multiple Data” in Anglo-Saxon terminology
- a method of processing personal data implemented by a system storing a database homomorphically encrypted personal reference data in the form of reference cryptograms in a group provided with a first operation which is an addition, and a second operation which is a multiplication, the method comprising determining in the encrypted domain, for each personal reference data item of the base, a distance between the same candidate personal data item and said personal reference data item, said distance being a scalar product of the candidate personal data item and said personal reference data item.
- each reference cryptogram is a vector of components, with , And natural integers strictly greater than 1, and a multiple of .
- each reference cryptogram is the image, by an encryption function of a homomorphic cryptographic scheme, of the concatenation of all the components of personal reference data.
- This process determines in the encrypted domain the distances between the candidate personal data and reference personal data with the following steps: a) obtaining an intermediate cryptogram in the form of a vector of pluralities of components, by applying a Hadamard product between a candidate cryptogram and the reference cryptogram associated with the personal reference data, the candidate cryptogram being the image by the encryption function, of the concatenation of iterations of the candidate personal data (i.e. iterations of all components of the candidate personal data), b) obtaining a final cryptogram in the form of a vector of pluralities of components, each component of a plurality of components of the final cryptogram, resulting from the application of the first operation between all the components of the same plurality of components of the intermediate cryptogram.
- This restriction limits the speed of identification and the number of identifications that can be performed in a given time.
- the present invention proposes, according to a first aspect, a method for processing personal data implemented by a system storing a database homomorphically encrypted personal reference data in the form of reference cryptograms in a group provided with a first operation and a second operation, - said method comprising the determination in the encrypted domain, for each personal reference data item in the database, of a distance between the same candidate personal data item and said personal reference data item, and - where the first operation is an addition and the second operation is a multiplication, - for everything ranging from 1 to , the personal reference data of rank is a vector of components having respective indices ranging from 1 to , - for everything ranging from 1 to , the rank reference cryptogram is a vector of components having respective indices ranging from 1 to , And - the candidate's personal data is a vector of components having respective indices ranging from 1 to , - with , And natural integers strictly greater than 1, said method being characterized in that: - for everything ranging from 1 to
- the method further comprises a step of obtaining the reference cryptograms, during which for all ranging from 1 to and for everything ranging from 1 to , the rank reference cryptogram is obtained by applying the encryption function to the concatenation of the components of index j of each personal reference data having a rank between And ;
- the data storage module stores the reference cryptograms;
- - THE reference cryptograms constitute the homomorphically encrypted representation of the K personal reference data;
- the method further comprises a step of obtaining candidate cryptograms, during which for any ranging from 1 to , the candidate cryptogram of rank is obtained by applying the encryption function to the concatenation of components each having the value of the index component of the candidate's personal data; - the candidate personal data is acquired using an acquisition interface;
- the method further comprises a step of decrypting the final cryptograms; - the decryption of each final cryptogram is by application of a decryption function of the homomorphic cryptographic scheme, to the final cryptogram concerned or to
- the invention proposes a computer program comprising instructions executable by a processor and adapted to implement a method for processing personal data as defined above, when these instructions are executed by the processor.
- This program may use any programming language, and may be in the form of source code, object code, or code intermediate between source code and object code, such as in a partially compiled form, or in any other desirable form.
- the invention proposes a non-transitory medium readable by a computer and storing instructions executable by a processor for the execution of a personal data processing method as defined above.
- a tangible or non-transitory medium may include a storage medium such as a hard disk drive, a magnetic tape device, or a solid-state memory device and the like.
- the present invention may take the form of an all-hardware embodiment, an all-software embodiment (including firmware, resident software, microcode, etc.), or an embodiment combining software and hardware aspects, all of which may be collectively referred to herein as a "module.”
- the invention proposes a personal data processing system comprising: - a data storage module storing a database homomorphically encrypted personal reference data in the form of reference cryptograms in a group provided with a first operation and a second operation, and - a data processing module configured to determine in the encrypted domain, for each personal reference data item in the database, a distance between the same candidate personal data item and said personal reference data item, Or : - the first operation is an addition and the second operation is a multiplication, -for everything ranging from 1 to , the personal reference data of rank is a vector of components having respective indices ranging from 1 to , - for everything ranging from 1 to , the rank reference cryptogram is a vector of components having respective indices ranging from 1 to , And - the candidate's personal data is a vector of components having respective indices ranging from 1 to , - with , And natural integers strictly greater than 1, the system being characterized in that: - for everything ranging from 1 to and for
- This personal data processing system may further comprise an acquisition interface configured to acquire the candidate personal data.
- the personal data is biometric data and the system comprises a biometric acquisition means for obtaining the candidate personal data.
- the data processing module is provided with parallelism capacity, for example the data processing module is according to a SIMD architecture, allowing the same operation to be carried out on data.
- the homomorphic cryptographic scheme when the homomorphic cryptographic scheme is the Brakerski-Fan-Vercauteren scheme, And preferably have the same value, when the homomorphic cryptographic scheme is the Cheon-Kim-Kim-Song scheme, preferably has the value .
- This system can be configured to implement each of the possibilities envisaged for the personal data processing method as defined above.
- System 1 typically implements an identification of a candidate individual, i.e. compares a candidate personal data (newly acquired on the candidate individual), to all the personal reference data of a base, in order to determine the identity of the candidate individual.
- candidate personal data is meant here personal data intended to be acquired in a controlled and voluntary manner by an acquisition interface, for example using a biometric acquisition means, a user interface or by optical reading.
- Candidate personal data is a vector of components having respective indices ranging from 1 to , with a natural integer strictly greater than 1.
- the base contains personal reference data, with a natural integer strictly greater than 1, and for all ranging from 1 to , the personal reference data of rank in the base, is a vector of components having respective indices ranging from 1 to .
- Personal data means in particular biometric data (and this example will be taken in the remainder of this description), but it will be understood that it can be any data specific to an individual on the basis of which a user can be identified, such as alphanumeric data, a signature, etc.
- This system 1 is equipment owned and controlled by an entity with whom identification must be carried out, for example a government entity, customs, a company, etc. In the remainder of this description, we will take the example of an airport, system 1 typically aiming to control access for passengers on a flight before they board.
- the system 1 comprises a data processing module 11, that is to say a calculator such as for example a processor, a microprocessor, a controller, a microcontroller, an FPGA etc.
- a calculator such as for example a processor, a microprocessor, a controller, a microcontroller, an FPGA etc.
- This calculator is configured to execute code instructions to implement certain steps of the personal data processing method which will be presented below.
- the data processing module 11 is provided with parallelism capacity, for example the data processing module 11 is according to a SIMD architecture, allowing the same operation to be carried out on data, being a natural integer strictly greater than 1.
- the system 1 also comprises a data storage module 12 (a memory, for example a hard disk or a flash memory) and, where appropriate, a user interface 13 (typically a screen and/or a keyboard) and/or biometric acquisition means 14 (see below).
- a data storage module 12 a memory, for example a hard disk or a flash memory
- a user interface 13 typically a screen and/or a keyboard
- biometric acquisition means 14 see below.
- the system 1 is capable of generating a so-called candidate biometric data from a biometric trait of an individual.
- the biometric trait may for example be the shape of the face, one or more fingerprints, or one or more irises of the individual.
- the extraction of the biometric data is implemented by processing the image of the biometric trait which depends on the nature of the biometric trait.
- Various image processing operations for extracting biometric data are known to those skilled in the art.
- the extraction of the biometric data may comprise an extraction (in particular by a neural network) of a vector representative of particular points, or of a shape of the face in the case where the image is an image of the individual's face.
- the biometric acquisition means 14 typically consist of an image sensor, for example a digital camera or a digital camera, adapted to acquire at least one image of a biometric trait of an individual, see below.
- the candidate personal data item can simply be entered on the user interface 13 or, for example, obtained by optical reading from an image.
- the data storage module 12 stores a reference personal database, i.e. at least one “expected” personal data of an authorized individual, for example the passengers checked in for the flight.
- Each reference personal data is advantageously a data item recorded in an identity document of the individual.
- the personal data item may be the biometric data item obtained from a facial image appearing on an identity document (for example a passport), or from a facial image, at least one fingerprint, or at least one iris of the individual recorded in a radiofrequency chip contained in the document.
- Each personal reference data is stored homomorphically encrypted, i.e. according to a homomorphic cryptographic scheme.
- Any homomorphic cryptographic scheme with the required properties may be used, for example the Brakerski-Fan-Vercauteren (BFV) scheme or the Cheon-Kim-Kim-Song (CKKS) scheme.
- BFV Brakerski-Fan-Vercauteren
- CKKS Cheon-Kim-Kim-Song
- the personal reference database is created in advance. For example, passengers may have presented their identity document in advance.
- system 1 may also comprise an enrollment module 20, another user interface 23 (typically a screen and/or a keyboard), and/or other biometric acquisition means 24 and/or a document reader 26 to constitute the personal reference database.
- the enrollment module 20 is another calculator, configured to execute code instructions to implement certain steps of the personal data processing method which will be presented below.
- biometric acquisition means 14 applies to other biometric acquisition means 24.
- Said other biometric acquisition means 24 make it possible to obtain at least one reference biometric data.
- a reference biometric data item is generated by the enrollment module 20 from a biometric trait provided by one of the other biometric acquisition means 24, but the other biometric acquisition means 24 may comprise their own processing means for extracting the reference biometric data item.
- Such another biometric acquisition means may, if necessary, encrypt the reference biometric data item on the fly by applying an encryption function of the homomorphic cryptographic scheme in the form of a reference cryptogram (see the method described below).
- the enrollment module 20 may encrypt the reference biometric data by applying an encryption function of the homomorphic cryptographic scheme in the form of a reference cryptogram.
- the document reader 26 is typically an image sensor, such as for example a digital camera or a digital camera, adapted to acquire an image of an identity document (for example a passport), and/or a contact-type or contactless-type communication means (for example NFC, UHF, etc.) adapted to read the content of a chip of an identity document.
- an image sensor such as for example a digital camera or a digital camera, adapted to acquire an image of an identity document (for example a passport), and/or a contact-type or contactless-type communication means (for example NFC, UHF, etc.) adapted to read the content of a chip of an identity document.
- the document reader 26 allows obtaining personal reference data from an individual’s identity document.
- the reference personal data can simply be entered on the other user interface 23 or, for example, be obtained by optical reading from an image.
- the system 1 can be arranged locally (for example in the airport), but can be separated into one or more remote “cloud” type servers hosting the data processing module 11, the data storage module 12 and the enrollment module 20, the data processing module 11 being connected to the biometric acquisition means 14 which must necessarily remain on site (typically at the boarding gate for boarding control).
- the enrollment module 20 and the data storage module 12 are remote.
- the communication between the servers can be wired or wireless, and uses any communication protocol (Wi-Fi, Bluetooth, etc.).
- the user interface 13 and the biometric acquisition means 14 are connected to the data processing module 11 by any type of connection means, wired or not (Wi-Fi, Bluetooth, Ethernet, USB, etc.).
- the other user interface 23, the other biometric acquisition means 24 and the document reader 26 are connected to the enrollment module 20 by any type of connection means, wired or not (Wi-Fi, Bluetooth, Ethernet, USB, etc.).
- System 1 implements an identification of the individual, that is to say compares the so-called candidate personal data (freshly acquired on the individual in the case of biometric data, or otherwise simply requested from the individual if it is alphanumeric data for example), to all the reference personal data of said database, in order to determine the identity of the individual.
- candidate personal data freshly acquired on the individual in the case of biometric data, or otherwise simply requested from the individual if it is alphanumeric data for example
- the system 1 can finally include access control means (for example an automatic door P in the ) ordered based on the identification result: if an authorized user is recognized, access is allowed.
- access control means for example an automatic door P in the
- Said biometric acquisition means 14 can be directly mounted on said access control means.
- the biometric acquisition means 14 enable candidate biometric data to be obtained.
- the candidate biometric data is generated by the data processing module 11 from a biometric trait provided by the biometric acquisition means 14, but the biometric acquisition means 14 may comprise their own processing means and for example take the form of an automatic device provided by the control authorities (in the airport) to extract the candidate biometric data.
- Such a biometric acquisition means may, if necessary, encrypt the candidate biometric data on the fly by applying an encryption function of the homomorphic cryptographic scheme in the form of candidate cryptograms (see the method described below).
- the candidate biometric data are also completely protected.
- the data processing module 11 may encrypt the candidate biometric data by applying an encryption function of the homomorphic cryptographic scheme in the form of candidate cryptograms.
- the biometric acquisition means 14 are capable of detecting the living, so as to ensure that the candidate biometric data comes from a “real” trait.
- the comparison involves calculating a distance between the data.
- the distance between the data advantageously involves calculating a scalar product.
- the individual is identified if the comparison reveals a rate of similarity between the candidate personal data and a reference personal data exceeding a certain threshold, the definition of which depends on the type of personal data.
- This process is implemented here by system 1 and determines in the encrypted domain, for each personal reference data of a base, a distance between the same candidate personal data and said personal reference data.
- the distance between a candidate personal data and a reference personal data is here the scalar product of the candidate personal data by said reference personal data.
- Candidate personal data is a vector of components having respective indices ranging from 1 to , with a natural integer strictly greater than 1.
- the personal reference database may have been created in advance.
- System 1 stores a database of personal reference data homomorphically encrypted in the form of reference cryptograms in a group provided with a first operation and a second operation, the first operation being an addition and the second operation being a multiplication, with And natural integers strictly greater than 1.
- Each personal reference data, personal reference data, is therefore stored homomorphically encrypted, typically by the data storage module 12.
- the personal reference data of rank is a vector of components having respective indices ranging from 1 to .
- the reference cryptogram of rank is a vector of components having respective indices ranging from 1 to .
- the invention is distinguished in that for all ranging from 1 to , that is to say for everything ranging from 1 to the upper integer part of , and for everything ranging from 1 to , the reference cryptogram of rank , is the image by an encryption function of a homomorphic cryptographic scheme, of the concatenation of the index components of each personal reference data having a rank between And , that is, the ranks And included.
- the reference personal database may not have been established in advance.
- the method may begin with a step (step E102) of obtaining the reference cryptograms , during which for all ranging from 1 to and for everything ranging from 1 to , the reference cryptogram of rank is obtained by applying the encryption function to the concatenation of the components of index j of each personal reference data having a rank between And .
- the reference cryptogram of rank is calculated as follows: with ENC the encryption function of the homomorphic cryptographic scheme.
- the reference cryptogram of rank is obtained by applying the encryption function to the concatenation: - index components of each personal reference data having a rank between And , And - any data having the same format as a personal data component for each of the other ranks between And .
- the reference cryptogram of rank is calculated as follows: with ENC the encryption function of the homomorphic cryptographic scheme, any first data having the same format as a personal data component and any second data having the same format as a personal data component.
- This step is typically implemented by the enrollment module 20.
- this step may further comprise the transmission to the data storage module 12 from the enrollment module 20, reference cryptograms obtained.
- the data storage module 12 stores the reference cryptograms .
- the reference cryptograms constitute the homomorphically encrypted representation of personal reference data
- the step (step E102) of obtaining the reference cryptograms may also include obtaining the personal reference data.
- each personal reference data item can be obtained from data recorded in an identity document of a reference individual, typically by the document reader 26, from an image of the face appearing on an identity document (for example a passport), or from an image of the face or at least one iris or at least one fingerprint of the individual recorded in a radiofrequency chip contained in the identity document.
- each personal reference data can be obtained by another biometric acquisition means 24, directly from a biometric trait of a reference individual.
- each personal reference data can simply be entered on the other user interface 23 or for example obtained by optical reading from an image.
- the method itself begins with a step (step E104) of obtaining candidate cryptograms. , during which for all ranging from 1 to , a candidate cryptogram of rank is obtained by applying the encryption function to the concatenation of components each having the value of the index component of the candidate's personal data .
- the candidate cryptogram of rank is the image by the encryption function, of the concatenation of components each having the value of the index component of the candidate's personal data : .
- the candidate cryptogram of rank is calculated as follows: with ENC the encryption function of the homomorphic cryptographic scheme.
- This step allows the obtaining of candidate cryptograms.
- This step (step E104) of obtaining candidate cryptograms may further include obtaining the candidate personal data.
- the candidate personal data can be obtained by a biometric acquisition means 14, directly from a biometric trait of a candidate individual.
- the candidate personal data can simply be entered on the user interface 13 or for example obtained by optical reading from an image.
- step E106 of determining in the encrypted domain the distances between the candidate personal data and each personal reference data in the database.
- This step is typically implemented by the data processing module 11.
- processing T106_i determines in the encrypted domain the distances between the candidate personal data and each personal reference data having a rank between And .
- Said index treatment includes: a) for all ranging from 1 to , obtaining an intermediate cryptogram of rank in the form of a vector of components, by applying a Hadamard product between the reference cryptogram of rank and a candidate cryptogram of rank ; b) obtaining a final cryptogram of rank in the form of a vector of components, by applying a vector addition between the intermediate cryptograms obtained.
- the calculation of a component of an intermediate cryptogram results from the application of the second operation between a component of a reference cryptogram and a component of a candidate cryptogram.
- the calculation of a component of a final cryptogram results from the application of the first operation between components of intermediate cryptograms.
- step E106 of determining in the encrypted domain the distances between the candidate personal data and each personal reference data in the database therefore allows you to obtain final cryptograms.
- the distance between the candidate personal data and a personal reference data of rank is the antecedent by the encryption function of the index component , of the final rank cryptogram : .
- T106_i treatment ranging from 1 to thus determine in the encrypted domain the distances between the candidate personal data and each personal reference data in the database.
- the method makes it possible to limit the calculation times and the memory space consumed by system 1.
- the process only requires application of vector addition between two intermediate cryptograms, that is to say that the application of first operation between components of different vectors, and does not require any application of a rotation to the components of a vector.
- the method also does not require the application of the first operation between components of the same vector.
- the distance between the candidate personal data and a reference personal data of a given rank corresponds to a single and unique final cryptogram component.
- index treatments (T106_i treatment), ranging from 1 to can be executed sequentially by system 1.
- index treatments can be executed in parallel by the system 1, for example by means of a processor comprising several cores, each core being configured to execute at least one processing of the plurality, and/or by means of several processors, each processor being configured to execute at least one processing of the plurality.
- the method may further comprise a step (step E108) of decrypting the final cryptograms.
- the decryption of each final cryptogram is by applying a decryption function of the homomorphic cryptographic scheme, to the final cryptogram concerned or to the components of said final cryptogram concerned.
- the method thus makes it possible to obtain, for each personal reference data item in the database, a clear distance between the candidate personal data item and said personal reference data item, while limiting the calculation times and the memory space consumed.
- the distance between the candidate personal data item and a personal reference data item corresponds to only one single final cryptogram component. The method therefore does not decrypt redundant components and/or does not require a selection of the final cryptogram components to be decrypted.
- the method may further continue with a step (step E110) of determining a control result, during which the system 1 determines whether a distance between the candidate personal data and a reference personal data item in the database does not exceed a predetermined threshold.
- the system 1, typically the data processing module 11, can command in an access control step (step E112), an opening of the gate P, in order to allow the candidate individual to access a secure area.
- This step (step E110) of determining a control result is typically implemented by the data processing module 11.
- control result can be a boolean.
- System 1 can determine the control result from clear distances obtained during the step (step E108) of decrypting the final cryptograms.
- the system 1 may determine the check result directly from components of final cryptograms, by operating in the group of the homomorphic cryptographic scheme, i.e. in the encrypted domain.
- the step (step E108) of decrypting the final cryptograms may be omitted.
- any homomorphic cryptographic scheme exhibiting the required properties can be used, for example the Brakerski-Fan-Vercauteren (BFV) scheme or the Cheon-Kim-Kim-Song (CKKS) scheme.
- BFV Brakerski-Fan-Vercauteren
- CKKS Cheon-Kim-Kim-Song
- the homomorphic cryptographic scheme is the Brakerski-Fan-Vercauteren scheme; - if the homomorphic cryptographic scheme is the Cheon-Kim-Kim-Song scheme, i.e. the lower integer part of .
- each component of each reference cryptogram being the image by the encryption function of a component of a personal reference data.
- the personal data is biometric data, in particular data representing faces.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
Abstract
Description
a) obtention d’un cryptogramme intermédiaire sous la forme d’un vecteur de
b) obtention d’un cryptogramme final sous la forme d’un vecteur de
- ledit procédé comprenant la détermination dans le domaine chiffré, pour chaque donnée personnelle de référence de la base, d’une distance entre une même donnée personnelle candidate et ladite donnée personnelle de référence, et
- où la première opération est une addition et la deuxième opération est une multiplication,
- pour tout
- pour tout
- la donnée personnelle candidate est un vecteur de
- avec
ledit procédé étant caractérisé en ce que :
- pour tout
- pour tout
a) pour tout
b) l’obtention d’un cryptogramme final de rang
- la distance entre la donnée personnelle candidate et une donnée personnelle de référence de rang
- le procédé comprend en outre une étape d’obtention des
- le module de stockage de données stocke les
- les
- le procédé comprend en outre une étape d’obtention des cryptogrammes candidats, pendant laquelle pour tout
- la donnée personnelle candidate est acquise à l’aide d’une interface d’acquisition ;
- le procédé comprend en outre une étape de déchiffrement des cryptogrammes finaux ;
- le déchiffrement de chaque cryptogramme final est par application d’une fonction de déchiffrement du schéma cryptographique homomorphe, au cryptogramme final concerné ou aux composantes dudit cryptogramme final ;
- les données personnelles sont des données biométriques, en particulier des données représentatives de visages ;
-
- le schéma cryptographique homomorphe est le schéma Brakerski-Fan-Vercauteren ou le schéma Cheon-Kim-Kim-Song ;
- quand le système est doté de capacité de parallélisme, par exemple selon une architecture SIMD, permettant à une même opération d’être réalisée sur
- un module de stockage de données stockant une base de
- un module de traitement de données configuré pour déterminer dans le domaine chiffré, pour chaque donnée personnelle de référence de la base, une distance entre une même donnée personnelle candidate et ladite donnée personnelle de référence,
où :
- la première opération est une addition et la deuxième opération est une multiplication,
-pour tout
- pour tout
- la donnée personnelle candidate est un vecteur de
- avec
le système étant caractérisé en ce que :
- pour tout
- pour tout
a) pour tout
b) l’obtention d’un cryptogramme final de rang
- la distance entre la donnée personnelle candidate et une donnée personnelle de référence de rang
- des composantes d’indice
- d’une donnée quelconque ayant le même format qu’une composante de donnée personnelle pour chacun des autres rangs compris entre
a) pour tout
b) l’obtention d’un cryptogramme final
- pour tout
- pour tout
-
-
Claims (12)
- Procédé de traitement de données personnelles mis en œuvre par un système (1) stockant une base de
données personnelles de référence chiffrées de manière homomorphe sous la forme de cryptogrammes de référence dans un groupe muni d’une première opération et d’une deuxième opération,
- ledit procédé comprenant la détermination (E106) dans le domaine chiffré, pour chaque donnée personnelle de référence de la base, d’une distance entre une même donnée personnelle candidate et ladite donnée personnelle de référence, et
- où la première opération est une addition et la deuxième opération est une multiplication,
- pour tout allant de 1 à , la donnée personnelle de référence de rang est un vecteur de composantes ayant des indices respectifs allant de 1 à ,
- pour tout allant de 1 à , le cryptogramme de référence de rang est un vecteur de composantes ayant des indices respectifs allant de 1 à , et
- la donnée personnelle candidate est un vecteur de composantes ayant des indices respectifs allant de 1 à ,
- avec , et des entiers naturels strictement supérieurs à 1,
ledit procédé étant caractérisé en ce que :
- pour tout allant de 1 à et pour tout allant de 1 à , le cryptogramme de référence de rang , est l’image, par une fonction de chiffrement d’un schéma cryptographique homomorphe, de la concaténation des composantes d’indice de chaque donnée personnelle de référence ayant un rang compris entre et ,
- pour tout allant de 1 à , la détermination dans le domaine chiffré des distances entre la donnée personnelle candidate et chaque donnée personnelle de référence ayant un rang compris entre et , comprend:
a) pour tout allant de 1 à , l’obtention d’un cryptogramme intermédiaire de rang sous la forme d’un vecteur de composantes, en appliquant un produit de Hadamard entre le cryptogramme de référence de rang et un cryptogramme candidat de rang , le cryptogramme candidat de rang étant l’image par la fonction de chiffrement, de la concaténation de composantes ayant chacune la valeur de la composante d’indice de la donnée personnelle candidate,
b) l’obtention d’un cryptogramme final de rang sous la forme d’un vecteur de composantes, en appliquant une addition vectorielle entre les cryptogrammes intermédiaires obtenus,
- la distance entre la donnée personnelle candidate et une donnée personnelle de référence de rang étant l’antécédent par la fonction de chiffrement de la composante d’indice , du cryptogramme final de rang . - Procédé de traitement de données personnelles selon la revendication précédente, le procédé comprenant en outre une étape (E102) d’obtention des
cryptogrammes de référence, pendant laquelle pour tout allant de 1 à et pour tout allant de 1 à , le cryptogramme de référence de rang est obtenu par application de la fonction de chiffrement, à la concaténation des composantes d’indice j de chaque donnée personnelle de référence ayant un rang compris entre et . - Procédé de traitement de données personnelles selon l’une quelconque des revendications précédentes, le procédé comprenant en outre une étape (E104) d’obtention des cryptogrammes candidats, pendant laquelle pour tout
allant de 1 à , le cryptogramme candidat de rang est obtenu par application de la fonction de chiffrement à la concaténation de composantes ayant chacune la valeur de la composante d’indice de la donnée personnelle candidate. - Procédé de traitement de données personnelles selon l’une quelconque des revendications précédentes, dans lequel la donnée personnelle candidate est acquise à l’aide d’une interface d’acquisition (13,14).
- Procédé de traitement de données personnelles selon l’une quelconque des revendications précédentes, le procédé comprenant en outre une étape (E108) de déchiffrement des cryptogrammes finaux.
- Procédé de traitement de données personnelles selon l’une quelconque des revendications précédentes dans lequel les données personnelles sont des données biométriques, en particulier des données représentatives de visages.
- Procédé de traitement de données personnelles selon l’une quelconque des revendications précédentes dans lequel
est un multiple de . - Procédé de traitement de données personnelles selon l’une quelconque des revendications précédentes dans lequel le schéma cryptographique homomorphe est le schéma Brakerski-Fan-Vercauteren ou le schéma Cheon-Kim-Kim-Song.
- Programme d’ordinateur comprenant des instructions exécutables par un processeur et adaptées à mettre en œuvre un procédé de traitement de données personnelles selon l’une quelconque des revendications précédentes, lorsque ces instructions sont exécutées par le processeur.
- Support non transitoire lisible par un ordinateur et stockant des instructions exécutables par un processeur pour l’exécution d’un procédé de traitement de données personnelles selon l’une quelconque des revendications 7 à 8.
- Système (1) de traitement de données personnelles comprenant :
- un module de stockage de données (12) stockant une base de données personnelles de référence chiffrées de manière homomorphe sous la forme de cryptogrammes de référence dans un groupe muni d’une première opération et d’une deuxième opération, et
- un module de traitement de données (11) configuré pour déterminer dans le domaine chiffré, pour chaque donnée personnelle de référence de la base, une distance entre une même donnée personnelle candidate et ladite donnée personnelle de référence,
où :
- la première opération est une addition et la deuxième opération est une multiplication,
-pour tout allant de 1 à , la donnée personnelle de référence de rang est un vecteur de composantes ayant des indices respectifs allant de 1 à ,
- pour tout allant de 1 à , le cryptogramme de référence de rang est un vecteur de composantes ayant des indices respectifs allant de 1 à , et
- la donnée personnelle candidate est un vecteur de composantes ayant des indices respectifs allant de 1 à ,
- avec , et des entiers naturels strictement supérieurs à 1,
le système étant caractérisé en ce que :
- pour tout allant de 1 à et pour tout allant de 1 à , le cryptogramme de référence de rang , est l’image, par une fonction de chiffrement d’un schéma cryptographique homomorphe, de la concaténation des composantes d’indice de chaque donnée personnelle de référence ayant un rang compris entre et ,
- pour tout allant de 1 à , la détermination dans le domaine chiffré, par le module de traitement de données (11), des distances entre la donnée personnelle candidate et chaque donnée personnelle de référence ayant un rang compris entre et , comprend:
a) pour tout allant de 1 à , l’obtention d’un cryptogramme intermédiaire de rang sous la forme d’un vecteur de composantes, en appliquant un produit de Hadamard entre le cryptogramme de référence de rang et un cryptogramme candidat de rang , le cryptogramme candidat de rang étant l’image par la fonction de chiffrement, de la concaténation de composantes ayant chacune la valeur de la composante d’indice de la donnée personnelle candidate,
b) l’obtention d’un cryptogramme final de rang sous la forme d’un vecteur de composantes, en appliquant une addition vectorielle entre les cryptogrammes intermédiaires obtenus,
- la distance entre la donnée personnelle candidate et une donnée personnelle de référence de rang étant l’antécédent par la fonction de chiffrement de la composante d’indice , du cryptogramme final de rang . - Système (1) de traitement de données personnelles selon la revendication précédente comprenant en outre une interface d’acquisition (13,14) configurée pour acquérir la donnée personnelle candidate.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP24731996.5A EP4728688A1 (fr) | 2023-06-13 | 2024-06-12 | Procédé de traitement de données personnelles, système et programme d'ordinateur associés |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR2306007A FR3150008B1 (fr) | 2023-06-13 | 2023-06-13 | Procédé de traitement de données personnelles, système et programme d’ordinateur associés |
| FRFR2306007 | 2023-06-13 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024256424A1 true WO2024256424A1 (fr) | 2024-12-19 |
Family
ID=88504693
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2024/066152 Ceased WO2024256424A1 (fr) | 2023-06-13 | 2024-06-12 | Procédé de traitement de données personnelles, système et programme d'ordinateur associés |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP4728688A1 (fr) |
| FR (1) | FR3150008B1 (fr) |
| WO (1) | WO2024256424A1 (fr) |
-
2023
- 2023-06-13 FR FR2306007A patent/FR3150008B1/fr active Active
-
2024
- 2024-06-12 WO PCT/EP2024/066152 patent/WO2024256424A1/fr not_active Ceased
- 2024-06-12 EP EP24731996.5A patent/EP4728688A1/fr active Pending
Non-Patent Citations (3)
| Title |
|---|
| BAUSPIES PIA ET AL: "Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing", 2022 INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF), IEEE, 20 April 2022 (2022-04-20), pages 1 - 6, XP034135369, DOI: 10.1109/IWBF55382.2022.9794523 * |
| IBARRONDO ALBERTO ET AL: "Grote: Group Testing for Privacy-Preserving Face Identification", PROCEEDINGS OF THE 12TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, ACMPUB27, NEW YORK, NY, USA, 24 April 2023 (2023-04-24), pages 117 - 128, XP059003170, ISBN: 979-8-4007-0068-2, DOI: 10.1145/3577923.3583656 * |
| JULIEN BRINGER ET AL: "GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification", PROCEEDINGS OF THE 2ND ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC '14, 11 June 2014 (2014-06-11), New York, New York, USA, pages 187 - 198, XP055291441, ISBN: 978-1-4503-2647-6, DOI: 10.1145/2600918.2600922 * |
Also Published As
| Publication number | Publication date |
|---|---|
| FR3150008A1 (fr) | 2024-12-20 |
| EP4728688A1 (fr) | 2026-04-22 |
| FR3150008B1 (fr) | 2025-09-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9755830B2 (en) | Dynamic seed and key generation from biometric indicia | |
| US20210211290A1 (en) | Method and system for biometric verification | |
| EP3731116B1 (fr) | Procédé d'authentification d'un document d'identité d'un individu et d'authentification dudit individu | |
| EP2171913B1 (fr) | Traitement de donnees biometriques par transformation | |
| EP2356773B1 (fr) | Procede d'identification ou d'autorisation, et systeme et module securise associes | |
| EP4124942B1 (fr) | Procédé et système de traitement de données personnelles utilisant un chiffrement homomorphique | |
| FR3102600A1 (fr) | Procédé de segmentation d’une image d’entrée représentant au moins une empreinte biométrique au moyen d’un réseau de neurones à convolution | |
| FR3043811A1 (fr) | Procede d'identification d'une entite | |
| EP4092954A1 (fr) | Procede et systeme de traitement de donnees biometriques | |
| FR3079333A1 (fr) | Procede d'enrolement de donnees pour controler une identite, et procede de controle d'identite | |
| FR2954549A1 (fr) | Codage biometrique | |
| WO2024256424A1 (fr) | Procédé de traitement de données personnelles, système et programme d'ordinateur associés | |
| CA3205344A1 (fr) | Procede de controle d'individus a authentification simplifiee | |
| US11153646B2 (en) | Applying access control to streamed media content | |
| WO2009083528A1 (fr) | Procédé et système pour générer des données biométriques stables | |
| EP4075728A1 (fr) | Systeme et procede de traitement de donnees personnelles | |
| FR3106678A1 (fr) | Traitement biométrique comprenant une pénalisation d’un score de correspondance | |
| EP3926499A1 (fr) | Procédé d'authentification d'un utilisateur sur un équipement client avec un système d'archivage sécurisé de justificatifs d'identité | |
| EP4456477A1 (fr) | Procédé de traitement de données biométriques, système et programme d'ordinateur associés | |
| Talreja et al. | A framework for secure selfie-based biometric authentication in the cloud | |
| Tambay | Testing fuzzy extractors for face biometrics: generating deep datasets | |
| EP2151785A1 (fr) | Procédé et dispositif d'authentification parcellaire et non réversible | |
| FR3161963A1 (fr) | Procédé de sécurisation d’accès à une source de données | |
| FR3161972A3 (fr) | Procédé de sécurisation d’accès à une source de données | |
| WO2024083849A1 (fr) | Encodage en boite blanche |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24731996 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2024731996 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2024731996 Country of ref document: EP Effective date: 20260113 |
|
| ENP | Entry into the national phase |
Ref document number: 2024731996 Country of ref document: EP Effective date: 20260113 |
|
| ENP | Entry into the national phase |
Ref document number: 2024731996 Country of ref document: EP Effective date: 20260113 |
|
| ENP | Entry into the national phase |
Ref document number: 2024731996 Country of ref document: EP Effective date: 20260113 |