In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.