Presentation | 2015-03-04 Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto SATO, Masami MOHRI, Hiroshi DOI, Yoshiaki SHIRAISHI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Networking (CCN) is an instantiation of the ICN paradigm. Challenging area of CCN includes congestion control, availability, security, etc. We focus on security, especially secure communications. Some schemes applying identity-based encryption (IBE) for content encryption over CCN have been proposed. However, such schemes generally have the key escrow problem that the private key generator which issues decryption keys to receivers can decrypt any ciphertext passively. We propose an IBE scheme approaching the problem by combining partial-double encryption, interest trace back, cut-through fragment forwarding and multi-path routing. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Content Centric Networking / Secure Communications / Identity-based Encryption / Key Escrow / Semantic Security |
Paper # | ICSS2014-91 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2015/2/24(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking |
Sub Title (in English) | |
Keyword(1) | Content Centric Networking |
Keyword(2) | Secure Communications |
Keyword(3) | Identity-based Encryption |
Keyword(4) | Key Escrow |
Keyword(5) | Semantic Security |
1st Author's Name | Makoto SATO |
1st Author's Affiliation | Nagoya Institute of Technology() |
2nd Author's Name | Masami MOHRI |
2nd Author's Affiliation | Gifu University |
3rd Author's Name | Hiroshi DOI |
3rd Author's Affiliation | Institute of Information Security |
4th Author's Name | Yoshiaki SHIRAISHI |
4th Author's Affiliation | Kobe University |
Date | 2015-03-04 |
Paper # | ICSS2014-91 |
Volume (vol) | vol.114 |
Number (no) | 489 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |