Method for replying to naming attack and time analysis attack under content center network
A technology of content-centric network and time analysis, which is applied to countermeasures against encryption mechanisms, digital transmission systems, electrical components, etc., can solve problems such as inability to infer adjacent requester request records, requester privacy threats, etc., to reduce response Time, the effect of improving network performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention will be further described below in conjunction with specific embodiment:
[0025] A method for responding to naming attacks and time analysis attacks under a content-centric network described in this embodiment includes the following steps:
[0026] S1. The key management center (Key Manager Center, KMC) is initialized to generate the key required by the requester, the content publisher and each router; the details are as follows:
[0027] Run Init(K), K is a security parameter, and then generate public parameters (G, g, q, f), where G is a cyclic group, and there is an element g that can be used by g i to represent that g is a generator of G. The key management center selects two large prime numbers p and q, so that p-1 has a large prime factor q. In this case, there is a subgroup of order q, by satisfies X (p-1) / q ≡ elemental composition of 1 mod p. F is a pseudo-random function, and the key management center selects two random numbers as ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


