Skip to main content
. 2020 Jan 2;33(3):726–734. doi: 10.1007/s10278-019-00310-3

Fig. 3.

Fig. 3

Public key cryptography. Blockchain relies on public key cryptography which uses key pairs (public keys are publicly available, and private keys are kept secret like passwords). Using Leah’s public key, Charlie can encrypt a message which can only be decrypted by Leah with the use of Leah’s private key. The data are encrypted as the message is unreadable without the private key