skip to main content
10.1145/3405656.3420230acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

CertCoalesce: Efficient Certificate Pool for NDN-Based Systems

Published:22 September 2020Publication History

ABSTRACT

Named Data Networking (NDN) relies on public key signing to ensure integrity and authenticity for all data packets fetched in the network. One of the considerations for reliability of such signing is limiting the scope (what the key can sign) and time (how long the key can sign) of the public keys and their certificates, usually referred to as "least privilege principle." Traditionally, the public key certificates are issued for relative long periods of times measured in months or years; which requires considerations for certificate revocation, e.g, when the private key is lost or compromised. However, if the validity periods can be reduced to days or hours, the complex (and sometimes semi-broken) revocation mechanisms can be completely eliminated. This poster proposes such a mechanism---CertCoalesce certificates---to efficiently manage virtually unlimited pools of short-term certificates with limited networking, storage, and computational overheads. Specifically, a single certificate request with a "primary" key can be used to bootstrap the process of creating an unlimited number of short-term certificates for derivative private/public keys. Moreover, such certificates can be issued asynchronously---periodically pre-provisioned or upon request with an Interest---terminating issuance of future certificates when necessary. Moreover, CertCoalesce design owing to the underlying elliptic curve cryptography ensures that a compromised key from the pool of keys will not reveal information about other keys/certificates in the pool.

Skip Supplemental Material Section

Supplemental Material

p158-ramani-presentation.mp4

mp4

18.9 MB

References

  1. [n.d.]. National Institute of Standards and Technology. Recommended elliptic curves for federal government use. https://csrc.nist.gov/projects/cryptographic-standards-and-guidelinesGoogle ScholarGoogle Scholar
  2. [n.d.]. Security Credential Management System Proof-of-Concept. https://wiki.campllc.org/display/SCP/SCP1%3A+Butterfly+KeysGoogle ScholarGoogle Scholar
  3. Alex Afanasyev, Jeff Burke, Tamer Refaei, Lan Wang, Beichuan Zhang, and Lixia Zhang. 2018. A brief introduction to Named Data Networking. In Proc. of MILCOM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Steven D Galbraith and Pierrick Gaudry. 2016. Recent progress on the elliptic curve discrete logarithm problem. Designs, Codes and Cryptography 78, 1 (2016), 51--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. NDN Team. 2020. NDN Certificate Format Version 2.0. Online: http://named-data.net/doc/ndn-cxx/current/specs/certificate-format.html.Google ScholarGoogle Scholar
  6. Sanjeev Kaushik Ramani, Reza Tourani, George Torres, Satyajayant Misra, and Alexander Afanasyev. 2019. NDN-ABS: Attribute-Based Signature Scheme for Named Data Networking. In Proceedings of the 6th ACM Conference on Information-Centric Networking. 123--133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, Patrick Crowley, Christos Papadopoulos, Lan Wang, Beichuan Zhang, et al. 2014. Named data networking. ACM SIGCOMM Computer Communication Review 44, 3 (2014), 66--73.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Zhiyi Zhang, Yingdi Yu, Alex Afanasyev, and Lixia Zhang. 2017. NDN Certificate Management Protocol (NDNCERT). Technical Report NDN-0050. NDN.Google ScholarGoogle Scholar

Index Terms

  1. CertCoalesce: Efficient Certificate Pool for NDN-Based Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICN '20: Proceedings of the 7th ACM Conference on Information-Centric Networking
          September 2020
          181 pages
          ISBN:9781450380409
          DOI:10.1145/3405656

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 September 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          ICN '20 Paper Acceptance Rate15of39submissions,38%Overall Acceptance Rate133of482submissions,28%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader