Here are some graphics to go along with the above discussion.

Symmetric Key Encyrption:
svg

Asymmetric Key Encryption:
svg

As you can see, with Asymmetric Key Encryption, Alice still needs to give Bob her public key.

–Konrad, WA4OSH