Encrypted access control method under CCN

A content-centric network and access control technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as access control failure, and achieve the effect of satisfying integrity

Inactive Publication Date: 2018-11-16
GUANGDONG UNIV OF TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to deny unauthorized users access to content, in the study of access control, literature (JACOBSON V, SMETTERS D, THOMTON J, et al.Networking named content[C] / / Proceedings of2009ACM 5th International Conference on Emerging Networking Experiments and Technologies.Rome, Italy: ACM, 2009: 1-12) proposes to use encryption to realize access control and protection content. This scheme uses symmetric encryption to encrypt data packets. The encrypted content can be cached in the router, and any requester can read from The encrypted content is obtained in the cache, but only authorized requesters can obtain the symmetric key to decrypt the data. Therefore, all authorized requesters can obtain the cached content. If the key of one of them is leaked, all encrypted content in the cache will be lost will be decrypted and access control will be invalidated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted access control method under CCN
  • Encrypted access control method under CCN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with specific embodiment:

[0022]An encrypted access control method under a content-centric network described in this embodiment involves multi-receiver broadcast encryption:

[0023] Let G 1 and G 2 are respectively the additive cyclic group and the multiplicative cyclic group of order prime q, and there is the following computable map e:G 1 ×G 1 →G 2 , for any P,Q,R∈G 1 with There is: e(aP,βQ)=e(P,Q) aβ ;

[0024] Define a bilinear mapping system S=(p,G 1 ,G 2 , e(·,·)), e:G 1 ×G 1 →G 2 , choose G∈G randomly 1 ,H∈G 2 ,

[0025] Let the encryption public key PK=(H, W, V), V=e(g 1 , g 2 ), W=γG, γ is The random number of the system master key MK=(a,b,γ,G), which is not disclosed to the public; each receiver defines the decryption private key as d i =(x i ,A i ,B i ),in,

[0026] To generate a common key that can be decrypted by multiple recipients, the publisher simply cho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encrypted access control method under CCN (Content Centric Networking). Broadcast encryption is adopted for encrypting data packets, so that a condition that different requesters can decrypt the same authorized content can be ensured. Data encryption effectively protects privacy of a content publisher. At the same time, the encrypted data sent by the content publisher is firstly stored in a router. A requester acquires a content mark number after authorization verification by the content publisher and then the requester performs Hash operation on a requested contentname and the content mark number. Only when an obtained Hash value is identical to that sent by the content publisher in the router, the router sends the encrypted data to the requester. The authorized requester can obtain the data packets after acquiring the request content mark number and performing Hash value calculation and after the router confirms the matching success. A requester authorized to access a part of the content cannot acquire content buffering other unknown content mark numbers.

Description

technical field [0001] The present invention relates to the technical field of content-centric network research, in particular to an encrypted access control method under the content-centric network. Background technique [0002] The rapid development of the Internet so far is mainly due to the continuous progress and development of Internet information technology, the current TCP / IP network model for data packet transmission between terminals can no longer meet the requester's demand for a large number of data services, in order to solve the problems exposed by the current Internet Such as: insufficient IP address, network attack (Dos attack, Trojan virus, etc.), poor mobility. As a result, Information Centric Networking (ICN, Information Centric Networking) was proposed. The ICN network is an information-centric network concept, abandoning the end-to-end transmission mode of the traditional IP network, and making the transmission of information the main body of the network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3236H04L9/3247H04L63/0442H04L63/08H04L63/10
Inventor 柳毅白雪峰凌捷
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products