Answer:
See explaination
Step-by-step explanation:
The foremost thing to do is to produce a public key and a private key pair H+ and H-and encrypts H+ along with hash of the password ( paswrd) such as H(paswrd)(H+)
When the boss maks use the password hash to gain H+, this will produce a symmetric key P and encrypts it with H+ in the public key cryptosystem and result could be further encrypted with password hash.
If Bob employs the password hash and H- to obtain H from H(paswrd)(AEK+(H)); then he can employ H to send messages to Boss. Furthermore a signature algorithm can be employed to encrypt for signing messages.