This is a dedicated watch page for a single video.
Public Key Infrastructure (PKI) uses asymmetric key encryption between parties. The originator encrypts information using the intended recipient's public key in order to get confidentiality of the data being sent. The recipients use their own private key to decrypt the information. The Infrastructure of this methodology ensures that?