The public key itself is public and can be known by anyone. The ciphertext encrypted by the public key can only be decrypted by the private key. Even the encrypted party cannot use the public key to decrypt the ciphertext, so no one who gets the public key can decrypt it. If you want to talk about the issue of authentication, that is, C can pretend to be B and write to A, this involves the issue of authentication.
Confusing data encryption with authentication. The public key obtained by C is only used for data encryption. In order for C to be able to successfully send data to B, it must pass B’s identity authentication level. B’s identity authentication for C has nothing to do with B’s public key.
The public key itself is public and can be known by anyone. The ciphertext encrypted by the public key can only be decrypted by the private key. Even the encrypted party cannot use the public key to decrypt the ciphertext, so no one who gets the public key can decrypt it.
If you want to talk about the issue of authentication, that is, C can pretend to be B and write to A, this involves the issue of authentication.
Public key, as the name suggests, is something you are not afraid of showing to others
Confusing data encryption with authentication.
The public key obtained by C is only used for data encryption.
In order for C to be able to successfully send data to B, it must pass B’s identity authentication level.
B’s identity authentication for C has nothing to do with B’s public key.