Table 1 The relationship between involved constants and pre-defined sets.
From: Security verification framework for NDN access control
Set | Constants |
|---|---|
Entity | R,R’(reader), W,W’(writer), M(ACM) |
Name | NKN(node key pair name), DKN(data key name), DN(data name) |
Key | K(public key), \(\hbox {K}^{{-1}}\)(private key), DK(data key), NK_e(NK\(_{encryption}\)), NK_d(NK\(_{decryption}\)), NK_e_f(fake NK\(_{encryption}\)), NK_d_f(fake NK\(_{decryption}\)), K\({_I}\)(public key of intruder), K\({_M}\)(public key of ACM), K\(_{I}^{-1}\)(private key of intruder), K\(_{M}^{-1}\)(private key of ACM), K\({_A}\)(public key of CA), K\(_{A}^{-1}\)(private key of CA) |
NKey | NK_e(NK\(_{encryption}\)), NK_d(NK\(_{decryption}\)), NK_e_f(fake NK\(_{encryption}\)), NK_d_f(fake NK\(_{decryption}\)) |
Content | DATA(data) |
Ack | YES(positive feedback), NO(negative feedback), Reject(reject feedback) |