Method and system for interest encryption in a content centric network
First Claim
1. A computer system for facilitating efficient content exchange, the system comprising:
- a processor; and
a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising;
generating, by a client computing device, an interest with a name that includes a routable prefix and a first hash of one or more original name components of the name, wherein the name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level;
computing a key based on;
(1) a second hash of the original name components of the name, (2) at least one Diffie-Hellman parameter, and (3) a randomly generated first nonce;
encrypting a payload of the interest with the key, wherein the interest indicates the first nonce;
transmitting the interest to a receiving content producing device, wherein the interest allows the receiving content producing device to compute the key and decrypt the payload;
in response to transmitting the interest, receiving a content object with a payload encrypted based on the key, thereby reducing delay in interest encryption in a content centric network.
3 Assignments
0 Petitions
Accused Products
Abstract
One embodiment provides a system that facilitates efficient content exchange in a CCN. During operation, the system receives, generates, by a client computing device, an interest with a name that includes a routable prefix and a first hash of one or more original name components, wherein the name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. The system computes a key based on a second hash of the original name components and a randomly generated first nonce. The system encrypts a payload of the interest with the key, wherein the interest indicates the first nonce. In response to transmitting the interest, wherein the interest allows a receiving content producing device to compute the key and decrypt the payload, the system receives receiving a content object with a payload encrypted based on the key.
-
Citations
20 Claims
-
1. A computer system for facilitating efficient content exchange, the system comprising:
-
a processor; and a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising; generating, by a client computing device, an interest with a name that includes a routable prefix and a first hash of one or more original name components of the name, wherein the name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level; computing a key based on;
(1) a second hash of the original name components of the name, (2) at least one Diffie-Hellman parameter, and (3) a randomly generated first nonce;encrypting a payload of the interest with the key, wherein the interest indicates the first nonce; transmitting the interest to a receiving content producing device, wherein the interest allows the receiving content producing device to compute the key and decrypt the payload; in response to transmitting the interest, receiving a content object with a payload encrypted based on the key, thereby reducing delay in interest encryption in a content centric network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for facilitating efficient content exchange, the system comprising:
-
a processor; and a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising; receiving, by a content producing device, an interest with a name that includes a routable prefix and a first hash of one or more original name components of the name, wherein the name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level, wherein the interest indicates a first nonce, and wherein a payload of the interest is encrypted based on a key; computing the key based on;
(1) a second hash of the original name components of the name, (2) at least one Diffie-Hellman parameter, and (3) the first nonce;decrypting a payload of the interest based on the key; and generating a content object with a payload encrypted based on the key, thereby reducing delay in interest encryption in a content centric network. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for facilitating efficient content exchange, the method comprising:
-
generating, by a client computing device, an interest with a name that includes a routable prefix and a first hash of one or more original name components of the name, wherein the name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level; computing a key based on;
(1) a second hash of the original name components of the name, (2) at least one Diffie-Hellman parameter, and (3) a randomly generated first nonce;encrypting a payload of the interest with the key, wherein the interest indicates the first nonce; transmitting the interest to a receiving content producing device, wherein the interest allows the receiving content producing device to compute the key and decrypt the payload; in response to transmitting the interest, receiving a content object with a payload encrypted based on the key, thereby reducing delay in interest encryption in a content centric network. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification