In contrast to the cooperative preparations required for setting up private key encryption, such as secret-sharing and close coordination between sender and receiver ...