Introduction - If you have any usage issues, please Google them yourself
Imitate CA certificate model, simulate a certificate and the authentication. And assumed that Alice to Bob send encrypted document after document and signature, Bob verify the correctness of the Alice certificate and the correctness of the final document encryption and decryption document.