As a brief and informal description and overview of how IES works, a Discrete Logarithm Integrated Encryption Scheme (DLIES) is used, focusing on illuminating the reader's understanding, rather than precise technical details.
Note that the scheme does not provide Bob with any assurance as to who really sent the message: This scheme does nothing to stop anyone from pretending to be Alice.
To send an encrypted message to Bob using ECIES, Alice needs the following information:
To encrypt a message m {\displaystyle m} Alice does the following:
To decrypt the ciphertext R ‖ c ‖ d {\displaystyle R\|c\|d} Bob does the following: