Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the user of encrypted data. b. the provider of encrypted data. c. both the user and the provider of encrypted data. d. either the user or the provider of encrypted data.
c. both the user and the provider of encrypted data.
In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.