[Download postscript version]
next up previous contents
Next: Security analysis Up: Architecture 3 Previous: Architecture

Protocol

At the beginning of the protocol, we assume the following:

To send a message to the group, the following steps are performed:

  1. Alice sends an encrypted unicast message to Trent using her private key K.Alice

    Alice -> Trent: {M}K.Alice

  2. Trent decrypts the message, verifies that Alice is one of the authorized senders, encrypts the message with the group key, signs the encrypted message with his private key, and broadcasts to the group:

    Trent -> Group: [ {M}K.Group, { H({M}K.Group) }K.Trent.priv ]

  3. Bob, one of the members in the group, verifies that Trent's signature is correct, and decrypts the message using the group key.

next up previous contents
Next: Security analysis Up: Architecture 3 Previous: Architecture

Adrian Perrig
Mon Sep 20 17:00:26 PDT 1999