A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges

被引:1
|
作者
Wang, Jian [1 ]
Hu, Xiaoming [1 ]
Xu, Xiaolin [1 ]
Yang, Yinchun [1 ]
机构
[1] Shanghai Second Polytech Univ, Dept Network Engn, Shanghai 201209, Peoples R China
关键词
P2P networks; BitTorrent; Hierarchial circular shift cipher; Verification; Free-riding; BITTORRENT;
D O I
10.1007/s12083-013-0225-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
BitTorrent swarms rely on reciprocative chunk exchanges among autonomously participating peers. It has been shown that BitTorrent native tit-for-tat mechanism cannot effectively discourage the peer strategic misbehavior such as free-riding and fake chunk attack. This paper proposes a hierarchical chunk cipher scheme based only on bits circular shifting manipulation. As such, encrypted chunks preserve a fraction of information entropy of original chunks that can be observed by the receiving peers directly, which is used for assuring authenticity of the encrypted chunks. Our hierarchical bits shifting scheme allows more flexibility on the fraction of information entropy exposed directly by the encrypted chunks, when compared to the single layer bits shifting scheme. Further, exact mathematical results between the hierarchical scheme and the single layer scheme are derived and analyzed in detail.
引用
收藏
页码:103 / 110
页数:8
相关论文
共 50 条
  • [1] A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges
    Jian Wang
    Xiaoming Hu
    Xiaolin Xu
    Yinchun Yang
    Peer-to-Peer Networking and Applications, 2015, 8 : 103 - 110
  • [2] Permutation Cipher Scheme for Verifiable P2P Chunk Exchange
    Wang, Jian
    Hu, Xiaoming
    Xu, Xiaolin
    Yang, Yinchun
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 762 - 765
  • [3] Secure and Verifiable P2P Card Games
    Yeh, Chun-Chao
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 344 - 349
  • [4] A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment
    Haoyang Wang
    Kai Fan
    Hui Li
    Yintang Yang
    Peer-to-Peer Networking and Applications, 2020, 13 : 2342 - 2355
  • [5] A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment
    Wang, Haoyang
    Fan, Kai
    Li, Hui
    Yang, Yintang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2342 - 2355
  • [6] Verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks
    Sun, Hua
    Yu, Huiqun
    Yang, Nianhua
    Li, Li
    Journal of Computational Information Systems, 2011, 7 (08): : 2770 - 2778
  • [7] Verifiable Storage Structure for Reputation in P2P Networks
    Sun, Hua
    Yu, Jiong
    Liao, Bin
    Yang, Xing-yao
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4953 - 4958
  • [8] Statistical properties of exchanges in P2P systems
    Guillaume, JL
    Le-Blond, S
    PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 1423 - 1428
  • [9] Clustering in P2P exchanges and consequences on performances
    Le Blond, S
    Guillaume, JL
    Latapy, M
    PEER-TO-PEER SYSTEMS IV, 2005, 3640 : 193 - 204
  • [10] A locality-aware resource management scheme for the hierarchical P2P system
    Hong, Chung-Pyo
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (09) : 5013 - 5027