Asymmetric cryptography

1. Encryption system that uses a public and private key pair for cryptographic operation. The private key is generally stored in a user’s digital certificate and used typically to encrypt or digitally sign data. The public key is used typically to decrypt the data or verify its digital signatures. The keys could be used interchangeably as needed, that is, a public key can be used to encrypt data and the private key can be used to decrypt the data.

Source: Election Terminology Glossary - Draft, National Institute of Standards and Technology (NIST), https://pages.nist.gov/ElectionGlossary/

2. See Public Key Cryptography. Public Key Cryptography – Encryption system that uses a public-private key pair for encryption and/or digital signature. (CNSSI-4009) (NISTIR)

Source: The Cyber Glossary, National Security Archive, George Washington University, https://nsarchive.gwu.edu/news/cyber-vault/2018-09-19/cyber-glossary