Presentation 2015-03-04
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto SATO, Masami MOHRI, Hiroshi DOI, Yoshiaki SHIRAISHI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Networking (CCN) is an instantiation of the ICN paradigm. Challenging area of CCN includes congestion control, availability, security, etc. We focus on security, especially secure communications. Some schemes applying identity-based encryption (IBE) for content encryption over CCN have been proposed. However, such schemes generally have the key escrow problem that the private key generator which issues decryption keys to receivers can decrypt any ciphertext passively. We propose an IBE scheme approaching the problem by combining partial-double encryption, interest trace back, cut-through fragment forwarding and multi-path routing.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Content Centric Networking / Secure Communications / Identity-based Encryption / Key Escrow / Semantic Security
Paper # ICSS2014-91
Date of Issue

Conference Information
Committee ICSS
Conference Date 2015/2/24(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Sub Title (in English)
Keyword(1) Content Centric Networking
Keyword(2) Secure Communications
Keyword(3) Identity-based Encryption
Keyword(4) Key Escrow
Keyword(5) Semantic Security
1st Author's Name Makoto SATO
1st Author's Affiliation Nagoya Institute of Technology()
2nd Author's Name Masami MOHRI
2nd Author's Affiliation Gifu University
3rd Author's Name Hiroshi DOI
3rd Author's Affiliation Institute of Information Security
4th Author's Name Yoshiaki SHIRAISHI
4th Author's Affiliation Kobe University
Date 2015-03-04
Paper # ICSS2014-91
Volume (vol) vol.114
Number (no) 489
Page pp.pp.-
#Pages 6
Date of Issue