Table 1 The relationship between involved constants and pre-defined sets.

From: Security verification framework for NDN access control

Set

Constants

Entity

R,R’(reader), W,W’(writer), M(ACM)

Name

NKN(node key pair name), DKN(data key name), DN(data name)

Key

K(public key), \(\hbox {K}^{{-1}}\)(private key), DK(data key),

NK_e(NK\(_{encryption}\)), NK_d(NK\(_{decryption}\)),

NK_e_f(fake NK\(_{encryption}\)), NK_d_f(fake NK\(_{decryption}\)),

K\({_I}\)(public key of intruder), K\({_M}\)(public key of ACM),

K\(_{I}^{-1}\)(private key of intruder), K\(_{M}^{-1}\)(private key of ACM),

K\({_A}\)(public key of CA), K\(_{A}^{-1}\)(private key of CA)

NKey

NK_e(NK\(_{encryption}\)), NK_d(NK\(_{decryption}\)),

NK_e_f(fake NK\(_{encryption}\)), NK_d_f(fake NK\(_{decryption}\))

Content

DATA(data)

Ack

YES(positive feedback), NO(negative feedback),

Reject(reject feedback)