Title :
Enabling Re-encryption of Hierarchical Verifiable Permutation Scheme for Bittorrent Chunk Exchanges
Author :
Wang, Jian ; Xu, Xiaolin ; Wu, Xiumei ; Yang, Yinchun
Author_Institution :
Dept. of Network Eng., Shanghai Second Polytech. Univ., Shanghai, China
Abstract :
Peer-to-peer networks such as BitTorrent swarms have gained popularity on Internet. One of the fundamental underlying mechanisms is to foster and enforce peer cooperativeness. As for fairly exchanging Bit Torrent chunks, peers may resort to encrypted chunk exchanges yet at the cost of delayed availability of plain chunks. In response, this paper presents a chunk encryption scheme for exchanging chunks between Bit Torrent peers. This scheme uses only permutation-based operations. Further, two layers of permutation are conducted in order to hide more chunk information. As counts of zero and one bits are unchanged, the verifiable characteristic can be achieved. Finally, re-encryption capability is introduced for mitigating delayed availability problems that occur under encrypted chunk exchanges.
Keywords :
cryptography; peer-to-peer computing; BitTorrent swarms; Internet; chunk encryption scheme; chunk exchanges; hierarchical verifiable permutation scheme; peer cooperativeness; peer-to-peer networks; permutation-based operations; re-encryption; Algorithm design and analysis; Bandwidth; Encryption; Media; Peer to peer computing; BitTorrent; Cipher Scheme; Hierarchy; Re-encryption; Verification;
Conference_Titel :
Computer Science & Service System (CSSS), 2012 International Conference on
Conference_Location :
Nanjing
Print_ISBN :
978-1-4673-0721-5
DOI :
10.1109/CSSS.2012.235