to-peer system in a way that no attacker can circum-
vent. Hence, secure implementation of both the con-
tent management and decryption function is very im-
portant.
5.2 Efficiency Analysis
In existing peer-to-peer live broadcasting schemes,
nodes receive and transfer streamed content in real
time, thus experiencing time delays as the content is
relayed. However, when using the B-BCTRE scheme,
all users can simultaneously access content when the
time server releases the relevant time datum, which is
content-indpenendent. Further, all communication ef-
fort takes place before the start time. Hence, a broad-
band network is not mandatory and the communica-
tion load is spread over time. In addition, the scheme
provides secure content distribution, unlike many of
the existing peer-to-peer broadcast schemes which re-
quire content security to be bolted on at additional
cost.
In comparison to live broadcast, users do have to
store content ahead of time. At the designated start
time, the only cost is that user nodes must decrypt the
content. The decryption of the content key consists
of two pairing computations, one multiplication, one
hash operation, and one exclusive-or operation. The
pairing computation on a 1.66 GHz Core2 perform
is expected top take around 14.5 msec (Hankerson
et al., 2008) and the transaction time of other oper-
ations is negligible. The bulk content decryption uses
efficientstandard symmetric techniques, which makes
the scheme applicable for PC-based nodes.
6 CONCLUSIONS
In this paper, we have described the design of an of-
fline broadcasting scheme for peer-to-peer networks
that can provide anonymity for the broadcaster. In
this scheme, personal users can broadcast multime-
dia content by delivering it to peers ahead of its start
time. Peers can then view the content without ac-
cessing the network, thus distributing the burden of
service to peer nodes. We have demonstrated that
this scheme provides a practical alternative to exist-
ing techniques for broadcasting content that can be
created in advance.
REFERENCES
Blackshaw, P. and Nazzaro, M. (2004). Consumer-
generated media (CGM). In Intelliseek White Paper.
Blake, I. F. and Chan, A. C.-F. (2005). Scalable, server-
passive, user-anonymous timed release cryptography.
In Proc. of IEEE International conference on Dis-
tributed Computing Systems, pages 504–513. IEEE.
Boneh, D. and Franklin, M. (2001). Identity-based encryp-
tion from the weil pairing. In Proc. of CRYPTO 2001,
LNCS, volume 2139, pages 213–229. Springer.
Boneh, D. and Naor, M. (2000). Timed commitments and
applications. In Proc. of CRYPTO 2000, LNCS, vol-
ume 1880, pages 213–229. Springer.
Chalkias, K. (2007). Timed-release encryption (TRE). In
short presentation in ECRYPT PhD Summer School,
Emerging Topics in Cryptographic Design and Crypt-
analysis.
Clarke, I., Sandberg, O., Wiley, B., and Hong, T. (2000).
Freenet: A distributed anonymous information strage
and retrieval system. In Proc. of ICSI Workshop on
Design Issues in Anonymity and Unobservability.
Garay, J. and Jakobsson, M. (2003). Timed release of stan-
dard digital signatures. In Proc. of FC 2002, LNCS,
volume 2357, pages 168–182. Springer.
Gkantsidis, C., Miller, J., and Rodriguez, P. (2006).
Anatomy of a P2P content distribution system with
network coding. In Proc. of 5th International Work-
shop on Peer-to-Peer Systems (IPTPS 2006).
Hankerson, D., Menezes, A., and Scott, M. (2008).
Software implementation of pairings. In
http://www.math.uwaterloo.ca/˜ajmeneze/publications/
pairings software.pdf.
Liao, X., Jin, H., Liu, Y., Ni, L. M., and Deng, D. (2006).
Anysee: peer-to-peer live streaming. In Proc. of IN-
FOCOM 2006, pages 1–10.
Luac, M.-T., Nienac, H., Wub, J.-C., Pengac, K.-J., Huan-
gade, P., Yaoac, J. J., Laif, C.-C., and Chenacd, H. H.
(2007). A scalable peer-to-peer IPTV system. In Proc.
of CCNC 2007, pages 313–317.
Mao, W. (2001). Timed-release cryptography. In Proc.
of SAC 2001, LNCS, volume 2259, pages 342–357.
Springer.
Open Mobile Alliance Ltd (2008). Oma digital rights man-
agement v2.1.
PeerCast.org (2002). Peercast P2P broadcasting. In
http://www.peercast.org/.
Ratnasamy, S., Francis, P., Handley, M., Karp, R., and
Shenker, S. (2001). A scalable content-addressable
network. In Proc. of SIGCOMM’01, pages 161–172.
ACM.
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Bal-
akrishnan, H. (2001). Chord: A scalable peer-to-peer
lookup services for internet applications. In Proc. of
SIGCOMM’01, pages 149–160. ACM.
YouTube, LLC (2005). YouTube - broadcast yourself,
http://www.youtube.com/.
Zhao, B. Y., Huang, L., Stribling, J., and S. C. Rhea, A. D. J.
(2004). Tapestry: A resilient global-scale overlay for
service deployment. In IEEE Journal on Selected Ar-
eas in Communications, volume 22, No.1, pages 41–
53. IEEE.
SECRYPT 2009 - International Conference on Security and Cryptography
82