US 12,348,618 B2
Decentralized key generation and management
Kshitij Arun Doshi, Tempe, AZ (US); Francesc Guim Bernat, Barcelona (ES); Srikathyayani Srikanteswara, Portland, OR (US); and Ned M. Smith, Beaverton, OR (US)
Assigned to Intel Corporation, Santa Clara, CA (US)
Filed by Intel Corporation, Santa Clara, CA (US)
Filed on Jun. 25, 2021, as Appl. No. 17/358,474.
Prior Publication US 2021/0328783 A1, Oct. 21, 2021
Int. Cl. H04L 9/08 (2006.01)
CPC H04L 9/0847 (2013.01) [H04L 9/0825 (2013.01); H04L 9/0861 (2013.01)] 21 Claims
OG exemplary drawing
 
1. An apparatus for encrypting communications, the apparatus comprising:
machine readable media including instructions; and
processing circuitry that, when in operation, is configured by the instructions to:
receive, at an information centric network (ICN) node, a first ICN interest packet for public encryption parameters of an identity based encryption (IBE) key generation center (KGC) implemented as a function on a named function network (NFN) node;
update a local pending interest table (PIT) with the first ICN interest packet;
transmit the first ICN interest packet based on an entry in a local forwarding information base (FIB);
receive a first ICN data packet in response to the first ICN interest packet, the first ICN data packet including the public encryption parameters for the KGC;
cache the public encryption parameters;
transmit the first ICN data packet in accordance with an entry in the PIT for the first ICN interest packet;
receive a second ICN interest packet for the public encryption parameters;
respond to the second ICN interest packet with a second ICN data packet that includes the public encryption parameters stored in cache;
receive a third ICN data packet from the KGC in response to a key generation request, the third ICN data packet including an indication that the third ICN data packet is part of a one-time session, wherein the KGC is one of a group of cloned KGCs, and wherein KGCs in the group of cloned KGCs provide the public encryption parameters and a same generated key for a given input; and
transmit the third ICN data packet in accordance with the PIT without caching the third ICN data packet based on the indication that the third ICN data packet is part of the one-time session.