The University of Sydney Page 4124.
–(e)–(a) In public key cryptography only the pubic key of the receiver will be shared with thesender –(b) Bob should receive the public key of Alice to encrypt the message but not theprivate key. –Once Alice receives the encrypted message (cyphertext) using Alice’s privatekey, she can decrypt the message. –Therefore all the answers are incorrect.