Skip to main content
. 2015 Oct 30;5:15914. doi: 10.1038/srep15914

Figure 2. Bob’s encoding and encrypting methods.

Figure 2

All Inline graphics, Inline graphics and Inline graphics are private, while all Inline graphics are public. Alice can only decrypt Inline graphic to further get Inline graphic with the key Inline graphic. Finally, Bob can rightly get Inline graphic by computing Inline graphic.