A "no-key" system. All the keys are private; Alice and Bob don't even have to agree on a public key!
Alice and Bob agree on a prime p.
Alice chooses an encryption exponent such that and p-1 don't have any common prime factors. She keeps this private.
Bob chooses an encryption exponent such that and p-1 don't have any common prime factors. Bob also keeps this private.