Commutative EncryptionCommutative Encryption involves Alice encrypting with her public key, and then Bob encrypting this with his public key. It is then possible to decrypt with either Alice using her private key first and then Bob private key, or the other way around.
|
Presentations