Offline Peer-to-Peer Broadcast with Anonymity

  • Shinsaku Kiyomoto
  • Kazuhide Fukushima
  • Keith M. Martin
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 130)


Content broadcasting is an effective method of delivering content to a large number of users. Several products are now available to support live broadcasting in IP-based networks. However, live broadcasting in a peer-to-peer (P2P) network involves a heavy concentrated communication load and incurs network delays that result in users not necessarily viewing a live transmission simultaneously. In this paper we consider an alternative type of P2P broadcasting scheme, offline broadcasting, which provides a decentralized broadcasting service with anonymity. This scheme provides a practical alternative to existing techniques for broadcasting content that can be created in advance. We present security analysis of the scheme from the following aspects: security of our timed release encryption scheme, timed release capability, content plagiarism, masquerading, denial of service, and content protection.


Time Server Multimedia Content Content Item Bilinear Pairing Broadcasting Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Blake, I.F., Chan, A.C.-F.: Scalable, server-passive, user-anonymous timed release cryptography. In: Proc. of IEEE International conference on Distributed Computing Systems, pp. 504–513. IEEE, Los Alamitos (2005)Google Scholar
  2. 2.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Naor, M.: Timed commitments and applications. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 213–229. Springer, Heidelberg (2000)Google Scholar
  4. 4.
    Chalkias, K.: Timed-release encryption (TRE). In: short presentation in ECRYPT PhD Summer School, Emerging Topics in Cryptographic Design and Cryptanalysis (2007)Google Scholar
  5. 5.
    Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 46. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Gkantsidis, C., Miller, J., Rodriguez, P.: Anatomy of a P2P content distribution system with network coding. In: Proc. of 5th International Workshop on Peer-to-Peer Systems, IPTPS 2006 (2006)Google Scholar
  7. 7.
    Hankerson, D., Menezes, A., Scott, M.: Software implementation of pairings (2008),
  8. 8.
    Liao, X., Jin, H., Liu, Y., Ni, L.M., Deng, D.: Anysee: peer-to-peer live streaming. In: Proc. of INFOCOM 2006, pp. 1–10 (2006)Google Scholar
  9. 9.
    Luac, M.-T., Nienac, H., Wub, J.-C., Pengac, K.-J., Huangade, P., Yaoac, J.J., Laif, C.-C., Chenacd, H.H.: A scalable peer-to-peer IPTV system. In: Proc. of CCNC 2007, pp. 313–317 (2007)Google Scholar
  10. 10.
    Open Mobile Alliance Ltd. Oma digital rights management v2.1 (2008)Google Scholar
  11. 11. Peercast P2P broadcasting (2002),
  12. 12.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: Proc. of SIGCOMM 2001, pp. 161–172. ACM, New York (2001)Google Scholar
  13. 13.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup services for internet applications. In: Proc. of SIGCOMM 2001, pp. 149–160. ACM, New York (2001)Google Scholar
  14. 14.
    YouTube, LLC. YouTube - broadcast yourself (2005),
  15. 15.
    Zhao, B.Y., Huang, L., Stribling, J., Joseph, A.D., Rhea, S.C.: Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 22(1), 41–53 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Shinsaku Kiyomoto
    • 1
  • Kazuhide Fukushima
    • 1
  • Keith M. Martin
    • 2
  1. 1.KDDI R & D Laboratories Inc.FujiminoJapan
  2. 2.Information Security GroupRoyal Holloway University of LondonEghamU.K.

Personalised recommendations