Author: Adi Shamir.
user Awants to send a message to
own identifier(e.g: name and network address) to the result.
Breceives the message, he decrypts it using his secret key.
user Acould compute the secret key that corresponds to the
public key "A", he could also compute the secret keys that correspond to the
public keys "B",