1: Given a node A and an incoming signed certificate C from node B. 2: A attempts to verify the certificate using known Certificate Authorities’ public keys. 3: If the certificate is valid, A adds C to its private group key, and sends its public key to Node B. 4: If the certificate cannot be verified, A ignores the request, and warns its group that it could not verify C. |