. . . "FIG. 7A is a flow chart of the embodiment in which public key encryption is used." .