NDN-MPS: supporting multiparty authentication over named data networking
@article{Zhang2021NDNMPSSM, title={NDN-MPS: supporting multiparty authentication over named data networking}, author={Zhiyi Zhang and Siqi Liu and Randy King and Lixia Zhang}, journal={Proceedings of the 8th ACM Conference on Information-Centric Networking}, year={2021} }
Modern digitally controlled systems require multiparty authentication to meet the security requirements. This paper describes the design and development of NDN-MPS, an automated solution to support multiparty signing and verification for NDN-enabled applications. NDN-MPS proposes three basic changes to the existing NDN security solutions. First, it introduces a new type of trust schema that supports the semantics for multiparty singing and verification. Second, it extends the NDN signing…Â
2 Citations
Investigating the Design Space for Name Confidentiality in Named Data Networking
- Computer ScienceMILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)
- 2021
The investigation suggests the feasibility of a systematic design that can enable NDN to provide stronger name confidentiality and user privacy as compared to today's TCP/IP Internet.
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
- Computer ScienceJournal of Network and Systems Management
- 2022
An advanced hierarchical identity-based security mechanism by blockchain (AHISM-B) is to be proposed for the NDN networks to avoid catastrophes due to a single node failure and both of the security proof result and the formal validation result indicate that the proposed AHISM- B is secure.
References
SHOWING 1-10 OF 45 REFERENCES
NDNCERT: universal usable trust management for NDN
- Computer ScienceICN
- 2017
The NDN Trust Management system (NDNCERT) is introduced which is designed to fill the need for simple, secure, and user-friendly management of cryptographic keys and certificates in the Named Data Networking architecture.
Schematizing Trust in Named Data Networking
- Computer ScienceICN
- 2015
The ability of NDN to enable automation through the use of trust schemas is explored, which can provide data consumers an automatic way to discover which keys to use to authenticate individual data packets, and provide data producers an automatic decision process to sign data packets.
An Overview of Security Support in Named Data Networking
- Computer ScienceIEEE Communications Magazine
- 2018
NDN's approaches to security bootstrapping, data authenticity, confidentiality, and availability are introduced.
Aggregated path authentication for efficient BGP security
- Computer ScienceCCS '05
- 2005
This paper proposes six constructions for aggregated path authentication that substantially improve efficiency of S-BGP's path authentication on both speed and space criteria and shows that the new schemes achieve such an efficiency that they may overcome the space obstacles and provide a real-world practical solution for BGP security.
Lessons Learned Building a Secure Network Measurement Framework using Basic NDN
- Computer ScienceICN
- 2019
The goals are both to present the network measurement framework and to motivate developers to evolve NDN by creating frameworks, libraries, and includible headers rather than bloating NDN's waist.
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
- Computer Science, MathematicsCCS
- 2018
This work is the first protocol that supports multiparty signatures for any $t łeq n$ with an efficient dealerless key generation and proves its scheme secure against malicious adversaries with a dishonest majority.
Simple Schnorr multi-signatures with applications to Bitcoin
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2018
To the best of the knowledge, this is the first multi-signature scheme provably secure under the Discrete Logarithm assumption in the plain public-key model which allows key aggregation.
Compact Multi-Signatures for Smaller Blockchains
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2018
The paper gives new constructions that are derived from Schnorr signatures and from BLS signatures that provide new functionality and are designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings where multi-signatures are needed.
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Computer Science, MathematicsPublic Key Cryptography
- 2003
It turns out that most of the constructions are simpler, more efficient and have more useful properties than similar existing constructions.
Towards Scalable Threshold Cryptosystems
- Computer Science2020 IEEE Symposium on Security and Privacy (SP)
- 2020
Techniques are presented that help scale threshold signature schemes, verifiable secret sharing and distributed key generation protocols to hundreds of thousands of participants and beyond and generalize to any Lagrange-based threshold scheme, not just threshold signatures.