1 | Here A chooses a challenge -- a random number r and can verify that B is at other end using solely public information! |
2 | A Sends x |
3 | Decrypt x with dB and send back challenge |
4 | A Encrypts r using eB to give x |
5 | Send r |
6 | Only B could have sent back r |
7 | Alice is A |
8 | Bob is B |
9 | eB is public key of B |
10 | dB is B's private key |