Foundations of Computer Security: Lecture 49: Public Key Encryption II
Foundations of Computer Security: Lecture 49: Public Key Encryption II
{{P}d }e = P = {{P}e }d .
{{P}d }e = P = {{P}e }d .
In other public key systems, you typically need two pairs of keys:
one pair for privacy and the other pair for “signing” (authenticity).