• DocumentCode
    3210099
  • Title

    Disaster-tolerant authentication system for NDN using Hierarchical ID-Based Encryption

  • Author

    Ogawara, Takeo ; Kawahara, Yuki ; Asami, Takuya

  • Author_Institution
    Grad. Sch. of Inf. Sci. & Technol., Univ. of Tokyo, Tokyo, Japan
  • fYear
    2013
  • fDate
    7-10 Oct. 2013
  • Firstpage
    1
  • Lastpage
    2
  • Abstract
    In this poster, we propose an authentication system, especially registration procedure, that can be used before and after a disaster. Using a two-tier HIDE, distributed authentications are done within each disrupted network segment without changing any user interface. To share the encrypted data among the users of this application at (8) of II-C, other types of encryption schemes are required. Attribute Base Encryption is one of these candidates and can be used as a smooth extension of the procedure described in this poster[7]. An actual implementation must be produced using an appropriate toolkit such as CCNx to evaluate the performance. This will be performed in future research. The work for this paper was performed in the context of the FP7/NICT EU-JAPAN GreenICN project.
  • Keywords
    computer network security; message authentication; public key cryptography; CCNx; FP7-NICT EU-Japan GreenICN project; NDN; attribute base encryption; disaster-tolerant authentication system; disrupted network segment; distributed authentications; hierarchical ID-based encryption; named data networking; public key infrastructure; two-tier HIDE; two-tier hierarchical ID-based encryption; Authentication; Base stations; Encryption; Identity-based encryption; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Protocols (ICNP), 2013 21st IEEE International Conference on
  • Conference_Location
    Goettingen
  • Type

    conf

  • DOI
    10.1109/ICNP.2013.6733631
  • Filename
    6733631