Proxy Re-Encryption in Access Control Framework of Information-Centric Networks.

Qiang Wang,Wenchao Li,Zhiguang Qin
DOI: https://doi.org/10.1109/ACCESS.2019.2908009
IF: 3.9
2019-01-01
IEEE Access
Abstract:As a novel network architecture, information-centric networking (ICN) has a good performance in facilitating content sharing among users. Although in-network cache used in ICN can effectively solve the problem of network congestion. Meanwhile, it also brings a lot of challenges such as security and privacy issues during data transformation. Some of the current solutions are based on the traditional encryption technology, but these solutions introduce significant overhead in the client side and have a high requirement to the memory and computing power of end user. In this paper, we use an efficient proxy re-encryption (PRE) scheme in ICN framework to help reduce the overhead on the user-side while guaranteeing flexible data sharing between subscribers and even their cooperator. Our proposal has the additional benefits of a non-interactivity and collusion resistance. We also prove that our scheme is secure against adaptive replayable adaptive chosen ciphertext attack (RCCA) in re-encryption and chosen ciphertext attack (CCA) secure in complete ICN encryption. Our analysis of this program also shows that the scheme has a relatively good performance in computation cost and communication complexity aspects.
What problem does this paper attempt to address?