In an asymetric encryption scheme, I was wondering if it's possible to achieve the following:
- Bob sends to Alice his public key
- Alice alters Bob's public key and encrypt some document with it
- Alice sends the encrypted document to Bob
- Bob retrieve the document but can't decrypt it with his private key
- Later, Alice sends some additional information (probably related to the method she used to alter Bob's public key) to Bob
- Bob uses this additional information to modify his private key and successfully decrypt the document
Anyone?
I am assuming RSA for the keys generation, encryption and decryption but if it's easier to do with another scheme feel free to comment.