1: Given a node A and an incoming signed certificate C from node B.

2: A attempts to verify the certificate using known Certificate Authorities’ public keys.

3: If the certificate is valid, A adds C to its private group key, and sends its public key to Node B.

4: If the certificate cannot be verified, A ignores the request, and warns its group that it could not verify C.