||With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IP’s architecture has limitations such as flow overloading and data uncertainty. In response to this, a new architecture has been proposed, known as the Named Data Network.|
The Named Data Network (NDN) is an alternative architecture based on the data each user accesses. Users gain access to the data by using an adjacent router (node) that verifies the correctness of the data. In NDN, the router has the ability to store and search for the data. Therefore, this architecture improves the disadvantages in TCP/IP’s architecture. NDN is a new proposal and relatively under-researched. Thus far, an adequate file-transfer protocol is unavailable for NDN. In some cases, files are broken or the source fails to authenticate, resulting in the need to discover the owner of the file. Moreover, we believe that NDN should contain an authentication mechanism in the secure-transfer protocol.
In view of this, we propose an authenticated re-encryption scheme for NDN, offering sender authentication, data confidentiality, and support for potential receivers. Furthermore, we propose a security model for sender authentication to prove that the scheme we propose is secure.