Cryptographic key distribution and authentication protocols for secure group communication

Authentication protocols have until now focussed on two or three party interaction and neglected n party interactions as in the case of more general group communication. In this discourse, the semantics of group authentication are addressed and a separation into complete and selective group authentication techniques is proposed.