| New Example | Restart |
| Eve knows: | |||
| Alice knows | Bob: Key Generation | Bob chooses p | Bob knows |
|---|---|---|---|
| Bob chooses g | |||
| Bob chooses b | |||
|
Bob computes B=gb⊗ |
|||
| Bob publishes his public key (p,g,B) | |||
| Public key directory. . | |||
| Alice wants to send Bob the secret message m | |||
|
Alice gets (p,g,B) from public key directory |
Alice: Encryption | ||
| Alice chooses a | |||
|
Alice computes A=ga⊗ |
|||
|
Alice computes s=Ba⊗ |
|||
|
Alice encrypts m as X=m⊗s |
|||
| Alice sends (A,X) | Bob receives (A,X) | ||
| Bob: Decryption |
Bob computes s=Ab⊗ |
||
|
Bob finds s-1⊗ with s⊗s-1⊗=1 |
|||
|
Bob decrypts X to m=X⊗s-1⊗ |
|||