In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
A. Private key
B. Public key
C. No key
D. None of the choices are correct.
View Answer
ANSWER: B) Public key
Explanation : No Explantion Given
Explanation : No Explantion Given