. . . . "For example, three entities A, B, and C can communicate securely as a group by privately selecting random integers a, b, c and publishing public keys aP, bP, cP. One of them, such as A, could encrypt a message using the message key ???(bP, cP)r and transmit it with rP. Then B could decrypt the message by calculating ???(cP, rp)b and C could decrypt it by calculating ???(bP, rP)c." .