Figure 11
From: Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

(a) Bob's secret key \({{\varvec{k}}}_{{\varvec{b}}}{^{\prime}}\); (b,c) are \({({{\varvec{K}}}_{{\varvec{B}}}\oplus {\varvec{k}}}_{{\varvec{b}}}{^{\prime}}\otimes {{\varvec{K}}}_{{\varvec{A}}})\), generated in Bob’s decryption.