Research Article Open Access

An Effective Contributory Re-Keying Approach to Compute Conference Key

D. Thilagavathy and M. Rajaram


Problem statement: With the explosive growth of and internet and web applications many emerging group-oriented distributed applications such as tele/video-conferencing, multiplayer games are based on group communication model that need security services such as privacy and data integrity Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. There is a need for security services to provide group-oriented communication privacy and data integrity. It is important that members of the group can establish a common secret key for encrypting group communication. A key tree approach has been proposed by many authors to distribute group key in such a way that the rekeying cost scales with the logarithm of the group size for a join or leave request. The efficiency of this key tree approach critically depends on whether the key tree remains balanced over time as members join or leaves Approach: Instead of performing individual re-keying operations, an interval-based approach of re keying is adopted in the proposed scheme. Results: In the proposed scheme Queue-merge algorithm is used for rekeying which substantially reduces the computation cost and communication cost. The comparison shows that queue merge algorithm performs better than Batch algorithm in terms of minimizing the key tree and presumes better node density thereby reducing the computation cost. Conclusion: Performance comparison also shows reduced number of renewed nodes for various rekeying interval which reduces the communication cost.

Journal of Computer Science
Volume 7 No. 8, 2011, 1212-1217


Submitted On: 11 February 2011 Published On: 15 July 2011

How to Cite: Thilagavathy, D. & Rajaram, M. (2011). An Effective Contributory Re-Keying Approach to Compute Conference Key. Journal of Computer Science, 7(8), 1212-1217.

  • 0 Citations



  • Authentication
  • dynamic peer groups
  • group key agreement
  • secure group communication
  • re-keying approach
  • exchange protocol
  • ad-hoc network
  • re-keying efficiency
  • queue-batch algorithm