Current location - Quotes Website - Signature design - Suppose Alice wants to send a signature message to Bob with RSA scheme, and choose Alice's public key and Bob's public key. Please ask Alice to sign the email.
Suppose Alice wants to send a signature message to Bob with RSA scheme, and choose Alice's public key and Bob's public key. Please ask Alice to sign the email.
Alice's signature on the message should be to encrypt the message with Alice's private key, so Bob can ensure that the message is decrypted by Alice with Alice's public key and sent to achieve the effect of signature.

Alice encrypts the message with Bob's public key. After receiving the message, Bob decrypts it with his own private key, because Bob's private key is only owned by himself, and others can't see the content of the message, thus achieving the effect of confidentiality.

The whole process is that Alice encrypts the message with her private key, then encrypts the message with Bob's public key, and then sends the message. After receiving the message, Bob decrypts the message with his own private key to achieve confidentiality, and then decrypts the message with Alice's public key to verify the signature.