For authentication using public-key cryptography, encryption is carried out using a. Receiver’s public key b. Receiver’s private key c. Sender’s public key d. Sender’s private key
Answers
Answered by
0
Answer:
a) Receivers public key
Similar questions