Assume that Alice chooses private value dA and computes public value PA and Bob chooses private value dB and computes public value PB. How does Alice compute the shared secret using ECDH?