[PDF][PDF] Blockchain-based decentralized public key management for named data networking

K Yang, JJ Sunny, L Wang - web0.cs.memphis.edu
Named Data Networking (NDN) uses public-key based identities and trust models to
achieve data-centric security. Each NDN data packet is signed by its producer, and any data …

[PDF][PDF] Blockchain-based Decentralized Public Key Management for Named Data Networking

K Yang, JJ Sunny, L Wang - cs.memphis.edu
Named Data Networking (NDN) uses public-key based identities and trust models to
achieve data-centric security. Each NDN data packet is signed by its producer, and any data …

[PDF][PDF] Blockchain-based Decentralized Public Key Management for Named Data Networking

K Yang - pdfs.semanticscholar.org
• Publish every public key record in a tamper-proof blockchain• Majority rule→ As long as
the attacker cannot compromise half or more of the validators, an invalid public key record …