DocumentCode :
2718605
Title :
Enabling Re-encryption of Hierarchical Verifiable Permutation Scheme for Bittorrent Chunk Exchanges
Author :
Wang, Jian ; Xu, Xiaolin ; Wu, Xiumei ; Yang, Yinchun
Author_Institution :
Dept. of Network Eng., Shanghai Second Polytech. Univ., Shanghai, China
fYear :
2012
fDate :
11-13 Aug. 2012
Firstpage :
926
Lastpage :
929
Abstract :
Peer-to-peer networks such as BitTorrent swarms have gained popularity on Internet. One of the fundamental underlying mechanisms is to foster and enforce peer cooperativeness. As for fairly exchanging Bit Torrent chunks, peers may resort to encrypted chunk exchanges yet at the cost of delayed availability of plain chunks. In response, this paper presents a chunk encryption scheme for exchanging chunks between Bit Torrent peers. This scheme uses only permutation-based operations. Further, two layers of permutation are conducted in order to hide more chunk information. As counts of zero and one bits are unchanged, the verifiable characteristic can be achieved. Finally, re-encryption capability is introduced for mitigating delayed availability problems that occur under encrypted chunk exchanges.
Keywords :
cryptography; peer-to-peer computing; BitTorrent swarms; Internet; chunk encryption scheme; chunk exchanges; hierarchical verifiable permutation scheme; peer cooperativeness; peer-to-peer networks; permutation-based operations; re-encryption; Algorithm design and analysis; Bandwidth; Encryption; Media; Peer to peer computing; BitTorrent; Cipher Scheme; Hierarchy; Re-encryption; Verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science & Service System (CSSS), 2012 International Conference on
Conference_Location :
Nanjing
Print_ISBN :
978-1-4673-0721-5
Type :
conf
DOI :
10.1109/CSSS.2012.235
Filename :
6394473
Link To Document :
بازگشت