Table 2 The relationship between involved variables and pre-defined sets.

From: Security verification framework for NDN access control

Set

Variables

Entity

r(reader), w(writer), m(ACM), e(entity)

Name

nkn(node key pair name), dkn(data key name), dn(data name)

Key

k,k’,k1(public key), k\(^{\scriptscriptstyle {-1}}\),k’\(^{\scriptscriptstyle {-1}}\),k1\(^{\scriptscriptstyle {-1}}\)(private key), dk,dk’(data key),

nk_e,nk_e’(true/fake NK\(_{encryption}\)), nk_d(true/fake NK\(_{decryption}\)),

k\({_m}\),k\({_{m'}}\),k\({_{m1}}\)(public key of ACM),

k\(_{m}^{-1}\),k\(_{m'}^{-1}\),k\(_{m1}^{-1}\)(private key of ACM),

k\({_a}\),k\({_{a'}}\)(public key of CA), k\(_{a}^{-1}\),k\(_{a'}^{-1}\)(private key of CA)

NKey

nk_e,nk_e’(true/fake NK\(_{encryption}\)), nk_d(true/fake NK\(_{decryption}\))

Content

data(data)

Ack

ack,ack’(positive/negative feedback), reject(reject feedback)