Main Article Content

Sudipta Majumder
Ratnadeep Nath
Aminullah Laskar
Bishal Saha


Bittorrent Protocol was introduced as a means of transferring large files efficiently. But, with progressing time, security issues are consuming the Bittorrent traffic like parasites. In this paper, we propose a secured key issuing scheme for Bittorrent to remove these security threats. We will combine both Identity Based Cryptography (IBC) and SKIP to generate secured keys for the peer in order to isolate the malicious ones and hence, secure the network.


Download data is not yet available.

Article Details



Anantha D. N., Bhimashankar, Girisha A. V., Mahalakshmi M. C., Asha G. R., Key Issuing Scheme for Communication in Peer to Peer Networks in International Journal for Research in Applied Science & Engineering Technology (IJRASET). April 2015.

A. Shamir, Identity-based cryptosystems and signature schemes in CRYPTO, 1984.

D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing in CRYPTO, 2001.

B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo, Secure key issuing in id-based cryptography in ACSW Frontiers, 2004.

R. Gangishetti, M. C. Gorantla, M. L. Das, A. Saxena, and V. P. Gulati, An efficient secure key issuing protocol in id-based cryptosystems in ITCC (1), 2005.

A. Saxena, Threshold ski protocol for id-based cryptosystems in IAS, 2007.

Z.-L. Lu, G.-H.; Zhang, Wheel of trust: A secure framework for overlay-based services ICC.

I. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications in SIGCOMM, 2001.

E. K. Lua, Securing peer-to-peer overlay networks from sybil attack in ISCIT’07, Sydney, Australia, 2007.

S. Ryu, K. R. B. Butler, P. Traynor, and P. D. McDaniel, Leveraging identity-based cryptography for node id assignment in structured p2p systems in AINA Workshops (1), 2007.

L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella, Tempering kademlia with a robust identity based system in Peer-to-Peer Computing, 2008.