Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method based on identity and encryption in naming data network

A named data network, access control technology, applied in the usage of multiple keys/algorithms, electrical components, transmission systems, etc., can solve the problem of inability to obtain decryption keys, inability to decrypt, etc., to reduce network communication burden and enhance security. the effect of reducing encryption cost and system delay

Inactive Publication Date: 2016-12-28
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, a user with reasonable access rights can not only obtain the encrypted content by sending interest packets, but also obtain the key to decrypt the content; a user without corresponding access rights will not be able to obtain the decryption key, and thus cannot decrypt out protected content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method based on identity and encryption in naming data network
  • Access control method based on identity and encryption in naming data network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0029] figure 1 is a schematic diagram of named data network access control, figure 2It is a flowchart of an access control method based on identity and encryption. In this embodiment, there are five entities: content publisher A, user B, user C, private key generator PKG, and NDN router. Content publisher A of a video website publishes popular movies to the Internet and forwards them to users through the router of the NDN core network. User B is a movie lover and becomes a member of the video website through registration, and user C is a non-member. Due to copyright issues, the newly released movies can only be accessed by registered members of the video site, and non-member users cannot watch the movies normally even if they download them locally. In order to realize such access control, the access control method based on identity and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control method based on identity and encryption in a naming data network, and belongs to the technical field of future internet architecture. The method concretely comprises the steps that (1) the public key of a content publisher and a user is determined by their identity, and the access authority of the user is directly associated with the identity of the user; (2) the content publisher provides a proxy re-encryption secret key to the user meeting the identity, and the user acts as a proxy server and converts a ciphertext encrypted by the identity public key of the content publisher into the ciphertext encrypted by the identity public key of the user so as to facilitate decryption; and (3) hybrid encryption scheme is adopted so that the content publisher is enabled not to perform multiple times of encryption for each user so that the computational cost of the encryption algorithm can be reduced. The objective of the invention is to provide the method for protecting the content confidentiality for the naming data network so that access control of the encryption content is realized without increasing computational complexity or communication burden and the security of the naming data network can be enhanced.

Description

technical field [0001] The invention belongs to the technical field of future Internet architecture, and relates to an access control method based on identity and encryption in a named data network. Background technique [0002] Named Data Networking (NDN) is an emerging content-centric network architecture. NDN challenges the communication mode of the current IP network, changing from "host-oriented packet delivery" to "data-driven content delivery". The basic principle of NDN is that content is named and addressable. In NDN, users request content by sending interest packets, which carry the name of the content requested by the user. If the NDN router finds the requested content cache in its local content storage, it can immediately return the data packet to the user; otherwise, the router forwards the Interest packet to the content publisher, and the content publisher returns the corresponding data packet. The NDN router forwards the data packets to the user and caches ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/14
CPCH04L63/045H04L9/14H04L63/061H04L63/083H04L63/10
Inventor 雒江涛蒋夷童静文武超
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products