{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:47:11Z","timestamp":1773233231445,"version":"3.50.1"},"reference-count":48,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"SEANET Technology Standardization Research System Development","award":["XDC02070100"],"award-info":[{"award-number":["XDC02070100"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>How to achieve secure content distribution and accountability in information-centric networking (ICN) is a crucial problem. Subscribers need to verify whether the data came from a reliable source, rather than from a spoofing adversary. Public key cryptography was introduced to achieve a method of authentication that binds the data packet to its owner. In existing prototypes, PKIs, identity-based signatures (IBSs) and recommendation networks are the common schemes used to ensure the authenticity and availability of public keys. However, CA-based PKIs and KGC-based IBSs have been proven to be weak when it comes to resisting security attacks, with recommendation networks being too complex to deploy. In this respect, we designed a novel distributed authentication model as a secure scheme to support public key cryptography. Our model establishes a decentralized public key infrastructure by combining the smart contracts of blockchain and optimized zero-knowledge proof-verifiable presentations by utilizing the DID project, which realizes the management of public key certificates through blockchain and ensures the authenticity and availability of public keys in decentralized infrastructure. Our scheme fundamentally solves the issues of security and feasibility in existing schemes and provides a more scalable solution with respect to authenticating data sources. An experiment demonstrated that our proposal is 20% faster than the original zero knowledge proof scheme in registration.<\/jats:p>","DOI":"10.3390\/info13050264","type":"journal-article","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T22:57:22Z","timestamp":1653346642000},"page":"264","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Blockchain-Based Decentralized Public Key Infrastructure for Information-Centric Networks"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9694-8821","authenticated-orcid":false,"given":"Jia","family":"Shi","sequence":"first","affiliation":[{"name":"National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21, North Fourth Ring Road, Haidian District, Beijing 100190, China"},{"name":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, No. 19(A), Yuquan Road, Shijingshan District, Beijing 100049, China"}]},{"given":"Xuewen","family":"Zeng","sequence":"additional","affiliation":[{"name":"National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21, North Fourth Ring Road, Haidian District, Beijing 100190, China"},{"name":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, No. 19(A), Yuquan Road, Shijingshan District, Beijing 100049, China"}]},{"given":"Rui","family":"Han","sequence":"additional","affiliation":[{"name":"National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21, North Fourth Ring Road, Haidian District, Beijing 100190, China"},{"name":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, No. 19(A), Yuquan Road, Shijingshan District, Beijing 100049, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,23]]},"reference":[{"key":"ref_1","unstructured":"(2020, May 20). Proof-of-Concept for Data Service Using Information Centric Networking in IMT-2020. Available online: https:\/\/www.itu.int\/itu-t\/recommendations\/rec.aspx?rec=13655."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/SURV.2013.070813.00063","article-title":"A survey of information-centric networking research","volume":"16","author":"Xylomenos","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., and Stoica, I. (2007, January 27\u201331). A data-oriented (and beyond) network architecture. Proceedings of the ACM SIGCOMM 2007 Conference, Kyoto, Japan.","DOI":"10.1145\/1282380.1282402"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., and Braynard, R.L. (2009, January 1\u20134). Networking Named Content. Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, Rome, Italy.","DOI":"10.1145\/1658939.1658941"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/2656877.2656887","article-title":"Named data networking","volume":"44","author":"Zhang","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.comcom.2013.01.009","article-title":"Network of Information (NetInf)\u2014An information-centric networking architecture","volume":"36","author":"Ohlman","year":"2013","journal-title":"Comput. Commun."},{"key":"ref_7","first-page":"1","article-title":"SEANet: Architecture and Technologies of an On-site, Elastic, Autonomous Network","volume":"9","author":"Wang","year":"2020","journal-title":"J. Netw. New Media Technol."},{"key":"ref_8","first-page":"10","article-title":"Research on intrinsic security in future internet architecture","volume":"1","author":"Chen","year":"2016","journal-title":"J. Cyber Secur."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Housely, R. (2004). Public key infrastructure (PKI). The Internet Encyclopedia, John Wiley & Sons.","DOI":"10.1002\/047148296X.tie149"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.2019.1800778","article-title":"Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet","volume":"57","author":"Wu","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/2534169.2486023","article-title":"Less Pain, Most of the Gain: Incrementally Deployable ICN","volume":"43","author":"Fayazbakhsh","year":"2013","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_12","unstructured":"Burke, J., Horn, A., and Marianantoni, A. (2012). Authenticated Lighting Control Using Named Data Network, UCLA. NDN Technical Report NDN-0011."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ahlgren, B., D\u2019Ambrosio, M., Marchisio, M., Marsh, I., Dannewitz, C., Ohlman, B., Pentikousis, K., Strandberg, O., Rembarz, R., and Vercellone, V. (2008, January 9). Design considerations for a network of information. Proceedings of the 2008 ACM CoNEXT Conference, Madrid, Spain.","DOI":"10.1145\/1544012.1544078"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Abidi, A., Gammar, B., and Kamoun, W. (2015, January 28\u201330). Memory Management Optimization for Content Routers in DONA. Proceedings of the 2015 IEEE 14th International Symposium on Network Computing and Applications, Cambridge, MA, USA.","DOI":"10.1109\/NCA.2015.48"},{"key":"ref_15","unstructured":"Sporny, M., Noble, G., Longley, D., and Zundel, B. (2021, November 09). Verifiable Credentials Data Model 1.1. W3C Rec. Available online: https:\/\/www.w3.org\/TR\/vc-data-model\/#presentations."},{"key":"ref_16","unstructured":"Yu, Y. (2015). Public Key Management in Named Data Networking, UCLA. Technical Report."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2016.10.018","article-title":"Up-to-date key retrieval for information centric networking","volume":"112","author":"Mauri","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.dcan.2017.06.001","article-title":"A distributed authentication and authorization scheme for in-network big data sharing","volume":"3","author":"Li","year":"2017","journal-title":"Digit. Commun. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hamdane, B., Serhrouchni, A., Fadlallah, A., and Fatmi, S.G.E. (2012, January 21\u201323). Named-Data security scheme for Named Data Networking. Proceedings of the 2012 Third International Conference on The Network of the Future (NOF), Tunis, Tunisia.","DOI":"10.1109\/NOF.2012.6464002"},{"key":"ref_20","unstructured":"Yu, Y., Afanasyev, A., and Zhu, Z. (2014). An Endorsement-Based Key Management System for Decentralized NDN Chat Application, UCLA. Available online: https:\/\/named-data.net\/publications\/techreports\/ndn-tr-23-chronochat-security\/."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Lou, J., Zhang, Q., and Qi, Z. (2018, January 15\u201317). A Blockchain-based key Management Scheme for Named Data Networking. Proceedings of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China.","DOI":"10.1109\/HOTICN.2018.8605993"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ejrad.2005.10.006","article-title":"The public-key-infrastructure of the radiological society of Germany","volume":"57","author":"Schutze","year":"2006","journal-title":"Eur. J. Radiol."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Papageorgiou, A., Loupos, K., Mygiakis, A., and Krousarlis, T. (2020, January 3\u20135). DPKI: A Blockchain-Based Decentralized Public Key Infrastructure System. Proceedings of the 2020 Global Internet of Things Summit (GIOTS), Dublin, Ireland.","DOI":"10.1109\/GIOTS49054.2020.9119673"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Chu, Y., Kim, J.M., Lee, Y., Shim, S., and Huh, J. (2020, January 4\u20136). SS-DPKI: Self-Signed Certificate Based Decentralized Public Key Infrastructure for Secure Communication. Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE46568.2020.9043086"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MS.2020.2992783","article-title":"Design pattern as a service for blockchain-based self-sovereign identity","volume":"37","author":"Liu","year":"2020","journal-title":"IEEE Softw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"103059","DOI":"10.1109\/ACCESS.2019.2931173","article-title":"In search of selfsovereign identity leveraging blockchain technology","volume":"7","author":"Ferdous","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","unstructured":"Reed, D., Sporny, M., Longley, D., Sabadello, M., Steele, O., and Allen, C. (2021, August 25). Decentralized Identifiers (DIDs) v1.0. W3C Working Draft. Available online: https:\/\/www.w3.org\/TR\/did\u2013core\/."},{"key":"ref_28","unstructured":"Sporny, M., and Longley, D. (2017, May 01). Verifiable Claims Data Model and Representations 1.0. Available online: https:\/\/www.w3.org\/2017\/05\/vc-data-model\/CGFR\/2017-05-01\/."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Maram, D., Malvai, H., Zhang, F., Jean-Louis, N., Frolov, A., Kell, T., Lobban, T., Moy, C., Juels, A., and Miller, A. (2021, January 24\u201327). CanDID: Can\u2013Do Decentralized Identity with Legacy Compatibility, Sybil\u2013Resistance, and Accountability. Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP40001.2021.00038"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Yoon, D., Moon, S., Park, K., and Noh, S. (2021, January 20\u201322). Blockchain\u2013based Personal Data Trading System using Decentralized Identifiers and Verifiable Credentials. Proceedings of the 2021 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea.","DOI":"10.1109\/ICTC52510.2021.9621153"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Wang, X., Qiu, W., Zeng, L., Wang, H., Yao, Y., and He, D. (2021, January 24\u201326). A credible transfer method of cross\u2013chain assets based on DID and VC. Proceedings of the 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China.","DOI":"10.1109\/ICISCAE52414.2021.9590718"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"137198","DOI":"10.1109\/ACCESS.2020.3011656","article-title":"An information-centric networking based registry for decentralized identifiers and verifiable credentials","volume":"8","author":"Alzahrani","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s11235-021-00874-y","article-title":"Self\u2013protected content for information\u2013centric networking architectures using verifiable credentials","volume":"79","author":"Alzahrani","year":"2022","journal-title":"Telecommun. Syst."},{"key":"ref_34","unstructured":"Otto, N., Lee, S., Sletten, B., Burnett, D., Sporny, M., and Ebert, K. (2019, September 19). Verifiable Credentials Use Cases. W3C Working Group Note. Available online: https:\/\/www.w3.org\/TR\/vcuse\u2013cases\/."},{"key":"ref_35","unstructured":"Chadwick, D., Longley, D., Sporny, M., Terbu, O., Zagidulin, D., and Zundel, B. (2019, September 19). Verifiable Credentials Implementation Guidelines 1.0. W3C Working Group Note. Available online: https:\/\/www.w3.org\/TR\/vc\u2013imp\u2013guide\/."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Brunner, C., Gallersd\u00f6rfer, U., Knirsch, F., Engel, D., and Matthes, F. (2020, January 14\u201316). DID and VC: Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust. Proceedings of the 2020 the 3rd International Conference on Blockchain Technology and Applications, Xi\u2019an, China.","DOI":"10.1145\/3446983.3446992"},{"key":"ref_37","unstructured":"Sporny, M., Longley, D., and Chadwick, D. (2021, November 09). Verifiable Credentials Data Model 1.1. W3C Rec. Available online: https:\/\/www.w3.org\/TR\/vc\u2013data\u2013model\/."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Blum, M., Feldman, P., and Micali, S. (1988, January 2\u20134). Non\u2013interactive zeroknowledge and its applications. Proceedings of the 20th Annual ACM symposium on Theory of computing (STOC \u201988), Chicago, IL, USA.","DOI":"10.1145\/62212.62222"},{"key":"ref_39","unstructured":"Sporny, M., Longley, D., and Chadwick, D. (2021, November 09). Verifiable Credentials Data Model 1.1. W3C Rec. Available online: https:\/\/www.w3.org\/TR\/vc\u2013data\u2013model\/#zero\u2013knowledge\u2013proofs."},{"key":"ref_40","unstructured":"Camenisch, J., and Lysyanskaya, A. (2022, March 19). A Signature Scheme with Efficient Protocols. IBM Research. Peer Reviewed Paper. Available online: https:\/\/www.researchgate.net\/publication\/220922101_A_Signature_Scheme_with_Efficient_Protocols."},{"key":"ref_41","unstructured":"W3C Credentials Community Group (2022, March 19). BBS+ Signatures 2020. Available online: https:\/\/w3c\u2013ccg.github.io\/ldp\u2013bbs2020\/."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Brassard, G. (1990). Efficient identification and signatures for smart cards. Advances in Cryptology\u2014Crypto \u201889, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/0-387-34805-0"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","article-title":"Efficient signature generation by smart cards","volume":"4","author":"Schnorr","year":"1991","journal-title":"J. Cryptol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"8322","DOI":"10.17148\/IJARCCE.2014.31055","article-title":"A survey on naming, name resolution and data routing in information centric networking (ICN)","volume":"3","author":"Barakabitze","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.comcom.2014.09.005","article-title":"FERN: A unifying framework for name resolution across heterogeneous architectures","volume":"56","author":"Sevilla","year":"2015","journal-title":"Comput. Commun."},{"key":"ref_46","first-page":"1865","article-title":"A deterministic latency name resolution framework using network partitioning for 5G\u2013ICN integration","volume":"15","author":"Liao","year":"2019","journal-title":"Int. J. Innov. Comput. Inf. Control."},{"key":"ref_47","unstructured":"(2022, March 19). FISCO BCOS, A Consortium Blockchain Platform. Available online: https:\/\/fisco\u2013bcosdocumentation.readthedocs.io\/en\/latest\/."},{"key":"ref_48","unstructured":"(2022, March 19). FISCO BCOS Whitepaper. Available online: https:\/\/github.com\/FISCO\u2013BCOS\/whitepaper\/blob\/master\/README(EN).md."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/5\/264\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:17:11Z","timestamp":1760138231000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/5\/264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":48,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["info13050264"],"URL":"https:\/\/doi.org\/10.3390\/info13050264","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,23]]}}}