Title page for etd-0715114-175841


[Back to Results | New Search]

URN etd-0715114-175841
Author Yan-Fu Cho
Author's Email Address No Public.
Statistics This thesis had been viewed 5350 times. Download 3 times.
Department Computer Science and Engineering
Year 2013
Semester 2
Degree Master
Type of Document
Language English
Title Authenticated Re-Encryption Scheme for Named Data Network
Date of Defense 2014-07-17
Page Count 75
Keyword
  • Authentication
  • Secure Transfer Protocol
  • Named Data Network
  • Proxy Re-Encryption
  • Abstract With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IP’s architecture has limitations such as flow overloading and data uncertainty. In response to this, a new architecture has been proposed, known as the Named Data Network.
    The Named Data Network (NDN) is an alternative architecture based on the data each user accesses. Users gain access to the data by using an adjacent router (node) that verifies the correctness of the data. In NDN, the router has the ability to store and search for the data. Therefore, this architecture improves the disadvantages in TCP/IP’s architecture. NDN is a new proposal and relatively under-researched. Thus far, an adequate file-transfer protocol is unavailable for NDN. In some cases, files are broken or the source fails to authenticate, resulting in the need to discover the owner of the file. Moreover, we believe that NDN should contain an authentication mechanism in the secure-transfer protocol.
    In view of this, we propose an authenticated re-encryption scheme for NDN, offering sender authentication, data confidentiality, and support for potential receivers. Furthermore, we propose a security model for sender authentication to prove that the scheme we propose is secure.
    Advisory Committee
  • Chung-Huang Yang - chair
  • Chih-Hung Wang - co-chair
  • Wen-Sheng Juang - co-chair
  • Chun-I Fan - advisor
  • Files
  • etd-0715114-175841.pdf
  • Indicate in-campus at 5 year and off-campus access at 5 year.
    Date of Submission 2014-08-15

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have more questions or technical problems, please contact eThesys