WEKO3
アイテム
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking
https://ipsj.ixsq.nii.ac.jp/records/146636
https://ipsj.ixsq.nii.ac.jp/records/1466362740f365-c4b7-4592-a8d0-f35a33f34bc2
| 名前 / ファイル | ライセンス | アクション |
|---|---|---|
|
|
Copyright (c) 2015 by the Information Processing Society of Japan
|
|
| オープンアクセス | ||
| Item type | Journal(1) | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 公開日 | 2015-12-15 | |||||||||||||
| タイトル | ||||||||||||||
| タイトル | Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking | |||||||||||||
| タイトル | ||||||||||||||
| 言語 | en | |||||||||||||
| タイトル | Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking | |||||||||||||
| 言語 | ||||||||||||||
| 言語 | eng | |||||||||||||
| キーワード | ||||||||||||||
| 主題Scheme | Other | |||||||||||||
| 主題 | [特集:ヒューマンファクタを考慮したセキュリティとプライバシ] content-centric networking, secure communications, identity-based encryption, key escrow, semantic security | |||||||||||||
| 資源タイプ | ||||||||||||||
| 資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||
| 資源タイプ | journal article | |||||||||||||
| 著者所属 | ||||||||||||||
| Nagoya Institute of Technology | ||||||||||||||
| 著者所属 | ||||||||||||||
| Gifu University | ||||||||||||||
| 著者所属 | ||||||||||||||
| Institute of Information Security | ||||||||||||||
| 著者所属 | ||||||||||||||
| Kobe University | ||||||||||||||
| 著者所属(英) | ||||||||||||||
| en | ||||||||||||||
| Nagoya Institute of Technology | ||||||||||||||
| 著者所属(英) | ||||||||||||||
| en | ||||||||||||||
| Gifu University | ||||||||||||||
| 著者所属(英) | ||||||||||||||
| en | ||||||||||||||
| Institute of Information Security | ||||||||||||||
| 著者所属(英) | ||||||||||||||
| en | ||||||||||||||
| Kobe University | ||||||||||||||
| 著者名 |
Makoto, Sato
× Makoto, Sato
× Masami, Mohri
× Hiroshi, Doi
× Yoshiaki, Shiraishi
|
|||||||||||||
| 著者名(英) |
Makoto, Sato
× Makoto, Sato
× Masami, Mohri
× Hiroshi, Doi
× Yoshiaki, Shiraishi
|
|||||||||||||
| 論文抄録 | ||||||||||||||
| 内容記述タイプ | Other | |||||||||||||
| 内容記述 | Information Centric Networking (ICN) is a promising paradigm for the future architecture of the Internet. Content Centric Networking (CCN) is an instantiation of the ICN paradigm. The challenging areas of CCN include congestion control, availability, security, etc. We focus on security, especially secure communications. Some schemes applying identity-based encryption (IBE) for content encryption over CCN have been proposed. However, such schemes generally have the key escrow problem that the private key generator which issues decryption keys to receivers can decrypt any ciphertext passively. We propose an IBE scheme approach to the problem by combining partial-double encryption, interest trace back, cut-through fragment forwarding and multi-path routing. Our scheme is IND-ID-CPA secure in the random oracle model. \n------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.24(2016) No.1 (online) ------------------------------ |
|||||||||||||
| 論文抄録(英) | ||||||||||||||
| 内容記述タイプ | Other | |||||||||||||
| 内容記述 | Information Centric Networking (ICN) is a promising paradigm for the future architecture of the Internet. Content Centric Networking (CCN) is an instantiation of the ICN paradigm. The challenging areas of CCN include congestion control, availability, security, etc. We focus on security, especially secure communications. Some schemes applying identity-based encryption (IBE) for content encryption over CCN have been proposed. However, such schemes generally have the key escrow problem that the private key generator which issues decryption keys to receivers can decrypt any ciphertext passively. We propose an IBE scheme approach to the problem by combining partial-double encryption, interest trace back, cut-through fragment forwarding and multi-path routing. Our scheme is IND-ID-CPA secure in the random oracle model. \n------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.24(2016) No.1 (online) ------------------------------ |
|||||||||||||
| 書誌レコードID | ||||||||||||||
| 収録物識別子タイプ | NCID | |||||||||||||
| 収録物識別子 | AN00116647 | |||||||||||||
| 書誌情報 |
情報処理学会論文誌 巻 56, 号 12, 発行日 2015-12-15 |
|||||||||||||
| ISSN | ||||||||||||||
| 収録物識別子タイプ | ISSN | |||||||||||||
| 収録物識別子 | 1882-7764 | |||||||||||||