Open Access Open Access  Restricted Access Subscription or Fee Access

Efficient Hybrid Tree Key Distribution for Secure Multicast Communication

(*) Corresponding author

Authors' affiliations



The evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life. There are different key management algorithms that facilitate efficient distribution and rekeying of the group key. These protocols normally add communication overhead as well as computation overhead at the group key controller and at the group members. This work explores the various algorithms along with the performances and derives an improved method called Hybrid tree based key distribution. The proposed key generation algorithm offers a novel, scalable and efficient technique for establishing hybrid keys for sensor networks with low computational and energy requirements.
Copyright © 2014 Praise Worthy Prize - All rights reserved.


Key Distribution; Group Controller Functionalities; PFMH Tree Structure; Probability Based PFMH Tree; Multicast Rekeying

Full Text:



Yamamoto, Yoshihisa, Eleni Diamanti, Edo Waks, Kyo Inoue, Hiroki Takesue, and Toshimori Honjo. "Differential phase shift keying quantum key distribution." U.S. Patent 8,675,876, issued March 18, 2014.

Tang, Zhiyuan, Zhongfa Liao, Feihu Xu, Bing Qi, Li Qian, and Hoi-Kwong Lo. "Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution." Physical Review Letters 112, no. 19 (2014): 190503.

Azuma, Koji, Kiyoshi Tamaki, and William J. Munro. "Measurement-device-independent quantum key distribution with all-photonic adaptive Bell measurement." arXiv preprint arXiv:1408.2884 (2014).

Burenkov, Viacheslav, Bing Qi, Ben Fortescue, and Hoi-Kwong Lo. "Security of high speed quantum key distribution with finite detector dead time." Quantum Information & Computation 14, no. 3-4 (2014): 217-235.

Fontes, Dalila BMM, and José Fernando Gonçalves. "A multi-population hybrid biased random key genetic algorithm for hop-constrained trees in nonlinear cost flow networks." Optimization Letters 7, no. 6 (2013): 1303-1324.

Srinivasan, Rajavelu, V. Vaidehi, Rajavelu Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, and R. Dharmaraj. "Secure Group Key Management Scheme for Multicast Networks." IJ Network Security 10, no. 3 (2010): 205-209.

Kulkarni, Sandeep S., and Bezawada Bruhadeshwar. "Key-update distribution in secure group communication." Computer Communications 33, no. 6 (2010): 689-705.

Tseng, Yuh-Min, and Tsu-Yang Wu. "Analysis and improvement on a contributory group key exchange protocol based on the Diffie–Hellman technique." Informatica 21, no. 2 (2010): 247-258.

Jouguet, Paul, Sébastien Kunz-Jacques, Anthony Leverrier, Philippe Grangier, and Eleni Diamanti. "Experimental demonstration of long-distance continuous-variable quantum key distribution." Nature Photonics 7, no. 5 (2013): 378-381.

Piao, Yanji, JongUk Kim, Usman Tariq, and Manpyo Hong. "Polynomial-based key management for secure intra-group and inter-group communication."Computers & Mathematics with Applications 65, no. 9 (2013): 1300-1309.

Choi, Donghyun, Hanjae Jeong, Dongho Won, and Seungjoo Kim. "Hybrid key management architecture for robust SCADA systems." Journal of Information Science and Engineering 29, no. 2 (2013): 281-298.

Liu, Jing, Qiong Huang, Bo Yang, and Yang Zhang. "Efficient multicast key distribution using HOWP-based dynamic group access structures." Computers, IEEE Transactions on 62, no. 8 (2013): 1656-1672

Zhang, Xuyun, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, and Jinjun Chen. "A hybrid approach for scalable sub-tree anonymization over big data using mapreduce on cloud." Journal of Computer and System Sciences 80, no. 5 (2014): 1008-1020.

Devi, S. Sasikala, and Dr Antony Selvadoss Danamani. "A Survey on Multicast rekeying for secure group communication." International Journal of Computer Tech Application 2, no. 3 (2011): 385-391.

Shoufan, Abdulhadi, and Tolga Arul. "Multicast Rekeying: Performance Evaluation." In Design Methodologies for Secure Embedded Systems, pp. 85-104. Springer Berlin Heidelberg, 2011.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize