PKE Operations
B makes its public key widely available (say through the Internet)
message recipient
message sender
1
2
3
No security hole is created by distributing the public key, since B’s private key has never been distributed.
Previous slide
Next slide
Back to first slide
View graphic version