In order to use asymmetric cryptography, each person receives a key pair; one public key and one private key. Each person's public key is published, while the private key is kept secret. The need for sender and receiver sharing information about the secret is eliminated. The only requirement is that public keys are associated with their users in a trusted (authenticated) manner.
A cryptography technique whereby each user has both a public key and a private key. Asymmetric systems have two primary uses, encryption and digital signatures.
Asymmetric Cryptography is a type of cryptography characterized by the fact that two different (but mathematically related) keys are used to perform the cryptographic operations.