Honest question, myself being pretty new to cryptography.
In practice, you'd generally accept that the first one you receive is valid, and then watch for deviations from there.
This is the way SSH works, for instance.
Honest question, myself being pretty new to cryptography.