This is standard encryption with private and public key. It is just called authentication when using the private key to encrypt. The main problem is that you can decrypt with the public key and then use the decrypted content which is now without any way to identify the source.
|