Authentication with public key Cryptography
Here A chooses a challenge -- a random number r and can verify that B is at other end using solely public information!
Decrypt x with dB and send back challenge
A Encrypts r using eB to give x
Only B could have sent back r