Next:
Up:
Previous:
Protocol for Sending Encrypted Message M
Bob looks up Alice's public key
P
A
.
Bob computes ciphertext message C =
P
A
(M) for his original message M.
Bob sends C to Alice (eavesdroppers do not have
S
A
).
Alice computes
S
A
(C) =
S
A
(
P
A
(M)) = M.
Next:
Up:
Previous: