keys

First, create a key pair to identify yourself:

gpg --full-generate-key

This will ask for a user name and e-mail address, and the keys will be coupled to that e-mail address.

Now, export the public key so you can publish it.

gpg --armor --export EMAIL-ADDRESS > public-key.gpg

Anyone who wants to encrypt something for you needs to import your public key:

gpg --import public-key.gpg

encryption

Now people with your key can encrypt data for you:

gpg -r EMAIL-ADDRESS -e FILE-TO-ENCRYPT

This will create an encrypted file FILE-TO-ENCRYPT.gpg that they can send you.

decryption

The data can be decrypted by whoever owns your private key (hopefully only yourself; just in case, make sure to use a non-empty passphrase when you create your keys):

gpg FILE-TO-DECRYPT.gpg