{"title":"用于命名数据网络的基于属性的加密","authors":"A. Lenin, Peeter Laud","doi":"10.1145/3460417.3483371","DOIUrl":null,"url":null,"abstract":"We compare and discuss the applicability and trade-offs of different attribute-based encryption (ABE) schemes to the possible use-cases of content-centric networking requiring end-to-end encryption of data with fine-grained access control, where the nature of content producers and consumers may vary, as well as the required expressivity of policies. We also report on the choice and implementation of an ABE scheme, as well as the overheads associated with its use.","PeriodicalId":151013,"journal":{"name":"Proceedings of the 8th ACM Conference on Information-Centric Networking","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Attribute-based encryption for named data networking\",\"authors\":\"A. Lenin, Peeter Laud\",\"doi\":\"10.1145/3460417.3483371\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We compare and discuss the applicability and trade-offs of different attribute-based encryption (ABE) schemes to the possible use-cases of content-centric networking requiring end-to-end encryption of data with fine-grained access control, where the nature of content producers and consumers may vary, as well as the required expressivity of policies. We also report on the choice and implementation of an ABE scheme, as well as the overheads associated with its use.\",\"PeriodicalId\":151013,\"journal\":{\"name\":\"Proceedings of the 8th ACM Conference on Information-Centric Networking\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th ACM Conference on Information-Centric Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3460417.3483371\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th ACM Conference on Information-Centric Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3460417.3483371","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Attribute-based encryption for named data networking
We compare and discuss the applicability and trade-offs of different attribute-based encryption (ABE) schemes to the possible use-cases of content-centric networking requiring end-to-end encryption of data with fine-grained access control, where the nature of content producers and consumers may vary, as well as the required expressivity of policies. We also report on the choice and implementation of an ABE scheme, as well as the overheads associated with its use.