1. Securing content-centric networks with content-based encryption
- Author
-
You Zhang, Chun Yang, Haomiao Yang, Xin Cong, and Xiaofen Wang
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Strong key ,020206 networking & telecommunications ,02 engineering and technology ,Computer security model ,Encryption ,Computer security ,computer.software_genre ,Computer Science Applications ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Semantic security ,business ,Replay attack ,computer ,Secure channel ,Standard model (cryptography) - Abstract
As content is transmitted in content-driven manner in the content-centric network (CCN), it does not require any host address; therefore, it is infeasible to establish a traditional secure channel between hosts. Securing the content transmission in the CCN is a challenging problem. We solve this problem with the content-based encryption, where the encryption key is associated with the content itself, and the private decryption keys are distributed to the authorized consumers. To deal with the security requirements for content-based encryption, we define a security model that captures the key existential unforgeability and semantic security. We then propose a content-based encryption scheme with short ciphertexts, which is proven to be strong key existentially unforgeable and semantically secure in the standard model. We apply the scheme to construct a secure content transmission protocol in the CCN, which captures the security properties of content confidentiality, integrity, resistance to replay attacks and resistance to key forgery attacks. The performance analysis shows that our protocol is efficient for large content transmission.
- Published
- 2019