In brief, you use elliptic curve cryptography.  

Did this answer your question?