The mining principle is an identity verification mechanism.
SSL uses digital signatures to verify the identity of the communication peer.
Asymmetric key algorithms can be used to implement digital signatures.
Since the data encrypted by the private key can only be decrypted using the corresponding public key, the identity of the sender can be determined based on whether the decryption is successful, as if the sender "signed" the data.
SSL uses the mechanism provided by PKI to ensure the authenticity of the public key.