If Alicia asks for something to move it, Alicia sends her her public key and Bob encrypts the message using Alicia's password.
Bob uses his private key and hash function to make a signature.
After finishing this procedure, Bob sends an encrypted message with signature.
Finally, Alice decrypts the message and puts it into a hash function and compares the output with the decryption signature.
This is what I understood about the transaction.
But when the transaction is waiting in memory, if someone changes the content of the signature using Bob's public key, how is it possible that Miner knows that the signature is incorrect?
To compare the message with the signature, the miner needs Alice's private key. But the miner does not have.
Is there another way to compare the signature with the encrypted message?