This involves using different keys for encryption and decryption. Examples include RSA, DSA, and ECC.