To provide origin authentication, the sender encrypts the message using an asymmetric encryption algorithm.
In this case, the receiver of the message must use what to decrypt the message?
A . sender’s digital signature
B . sender’s shared key
C . sender’s private key
D . sender’s public key
Answer: D