The security services that public keycryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
3
The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding privatekey can decrypt the data.