Final answer:
To satisfy the given conditions, a scheme using asymmetric encryption and digital signatures can be used. Bob generates a key pair and shares the public key with the whitelist. Sender encrypts the message using Bob's public key and digitally signs it. Bob decrypts the message using his private key and verifies the signature.
Step-by-step explanation:
To design a scheme using asymmetric encryption that satisfies the given conditions, we can use a combination of public key cryptography and digital signatures:
Bob will generate a key pair consisting of a public key and a private key. The public key will be shared with everyone on the whitelist L.
When someone on the whitelist wants to send a message to Bob, they will encrypt the message using Bob's public key and send it to Bob.
Bob can decrypt the message using his private key, ensuring that only he can read the original message.
To ensure that the message is sent by someone on the whitelist, the sender can digitally sign the message using their private key. Bob can verify the digital signature using the sender's public key. If the signature is valid, it means the message was sent by someone on the whitelist.