Table 2 The relationship between involved variables and pre-defined sets.
From: Security verification framework for NDN access control
Set | Variables |
|---|---|
Entity | r(reader), w(writer), m(ACM), e(entity) |
Name | nkn(node key pair name), dkn(data key name), dn(data name) |
Key | k,k’,k1(public key), k\(^{\scriptscriptstyle {-1}}\),k’\(^{\scriptscriptstyle {-1}}\),k1\(^{\scriptscriptstyle {-1}}\)(private key), dk,dk’(data key), nk_e,nk_e’(true/fake NK\(_{encryption}\)), nk_d(true/fake NK\(_{decryption}\)), k\({_m}\),k\({_{m'}}\),k\({_{m1}}\)(public key of ACM), k\(_{m}^{-1}\),k\(_{m'}^{-1}\),k\(_{m1}^{-1}\)(private key of ACM), k\({_a}\),k\({_{a'}}\)(public key of CA), k\(_{a}^{-1}\),k\(_{a'}^{-1}\)(private key of CA) |
NKey | nk_e,nk_e’(true/fake NK\(_{encryption}\)), nk_d(true/fake NK\(_{decryption}\)) |
Content | data(data) |
Ack | ack,ack’(positive/negative feedback), reject(reject feedback) |