Secure distribution of a confidential message can be performed by:
Encrypting the message with the receiver's public key
Encrypting a hash of the message
Having the message authenticated by a certificate authority
Using a password-protected file format