Protocol for communicating using public-key cryptography
Alice and Bob agree on a public key- cryptosystem
Bob sends Alice his public key, or else she finds it in database.
Alice encrypts plaintext using Bob’s public key => ciphertext
Alice sends ciphertext to Bob
Bob decrypts ciphertext using his private key.