Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Alice receives the message, she decrypts it using a private key.What kind of encryption process is this

Q&A Education