Ted’s public key
Bob’s public key
Alice’s public key
Carol replies to messages using
each recipient’s
public key
Ted
Bob
Alice
Ted’s
private key
Bob’s
private key
Alice’s
private key
Previous slide | Next slide | Back to first slide | View graphic version |