Alice needs to send a confidential document to her coworker, Bryan. Their company has public key infrastructure set up. Therefore, Alice both encrypts the message and digitally signs it. Alice uses _______________ to encrypt the message, and Bryan uses _______________ to confirm the digital signature.
- A.Bryan’s public key; Bryan’s public key
- B.Alice’s public key; Alice’s public key
- C.Bryan’s private key; Alice’s public key
- D.Bryan’s public key; Alice’s public key