Data encryption where the coding key (the public key) and the corresponding decryption key (private key) are different. It is mathematically impossible to derive the private key from the public key.
Alice shares her public key. Bob uses Alice’s public key to encrypt a message to her. Only Alice’s corresponding private key (that she keeps secret) can decrypt the message.