jchang6916 jchang6916 25-04-2024 Computers and Technology Answered Assume that Alice chooses private value dA and computes public value PA and Bob chooses private value dB and computes public value PB. How does Alice compute the shared secret using ECDH?