Conclusion
Hardening security protocols to make them robust to asynchronous network events is difficult, but possible.
Strong, contributory, peer group security is possible at a reasonable cost.
Integrating security into the group communication daemon should be considered to amortize the cost of expensive cryptographic operations.