1. Develop a scenario where an entity that sends a message might use two different public-private key pairs owned by the entity.
2. Bob wants to receive a confidential message from Sandy, who does not have her own public-private key pair. Is it feasible for Sandy to achieve this purpose? How?