Abstract

Requests and responses to obtain public keys may be sent and received via email. Before sending an email to be encrypted, a requestor may send a request email to the recipient requesting the recipient’s public key. The recipient may send a response email to the requestor, with the response email including the public key. The requester may then encrypt subsequent emails according to the received public key and send encrypted emails to the recipient. The recipient may automatically respond to the request for the public key, without need for a user to approve the request.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS