Digital Signatures + Encryptionproof of authorship + privacy
Alice signs with her private key then encrypts with Bob’s public key
A B
C = E B( S A(M)) C
----------->
Bob decrypts with his private key, then verifies with Alice’s public key.
S A(M) = D B(C)
M = V A(C)
Previous slide
Next slide
Back to first slide
View graphic version