Abstract
Information-centric networking is the developing model envisioned by an increasing body of the data communication research community, which shifts the current network paradigm from host centric to data centric, well-known to information-centric networking (ICN). Further, the ICN adopts different types of architectures to extend the growth of the Internet infrastructure, e.g., name-based routing and in-network caching. As a result, the data can be easily routed and accessed within the network. However, when the producer generates contents for authentic consumers, then it is necessary for him/her to have a technique for content confidentiality, privacy, and access control. To provide the previously mentioned services, this paper presents a certificateless proxy reencryption scheme (CPRES) based on the hyperelliptic curve for access control in the content-centric network (CCN). Using certificateless PRE, the power of the key generation center (KGC) is limited to only the generation of partial keys to secure the access to the content. With the help of these partial keys, the producer further calculates keys for encryption and reencryption process. The simulation results show that the proposed scheme provides secure access to content during end-to-end communication. Moreover, the proposed CPRES scheme outperforms in terms of low computational energy and efficient utilization of communication bandwidth.
Highlights
Information-centric networking (ICN) is an approach to develop the Internet infrastructure to directly support the unique named data [1]. e ICN attracts much attention in the continuing search for a future communication model of the Internet [2]
Besides from these two schemes, which are specific to the ICN, a number of public key infrastructure (PKI), identity based, and certificateless signature methods are available in the literature for providing applications to different communication systems [13,14,15,16,17]. e computational and communication cost of this crypto system is so much higher because of using the known cryptographic protocol parameters and key sizes, i.e., RSA uses 1024 bits, where bilinear pairing (BP) is almost 13.65 times worse than RSA, 13.93 times than EC, and 14.42 than the hyperelliptic curve [12], respectively
The motivation of our research is to propose a unique CPRES scheme to solve the abovementioned problems in the form of the certificateless proxy reencryption scheme based on the hyperelliptic curve for access control in content-centric networking
Summary
Information-centric networking (ICN) is an approach to develop the Internet infrastructure to directly support the unique named data [1]. e ICN attracts much attention in the continuing search for a future communication model of the Internet [2]. The current trends among the cryptographic researchers are that they believe on practical analysis instead of theoretical, e.g., the random oracle model Besides from these two schemes, which are specific to the ICN, a number of public key infrastructure (PKI), identity based, and certificateless signature methods are available in the literature for providing applications to different communication systems [13,14,15,16,17]. The motivation of our research is to propose a unique CPRES scheme to solve the abovementioned problems in the form of the certificateless proxy reencryption scheme based on the hyperelliptic curve for access control in content-centric networking. (v) We provide our security analysis through a recognized security validation tool known as AVISPA
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.