題組內容

4. Protection and Security: ]

(4) In asymmetric encryption, how do you realize key distribution?