Suppose that each of Alice and Bob holds a pair of public key and secret key, and Alice
wants to send a huge data to Bob securely over the internet, without letting any third
party learn the content of the data or modify the data. Your task is to design for them a
protocol for securely transmitting data, which is as efficient as possible. Please describe
the main framework of the protocol, using the cryptographic tools