What does Asymmetric Encryption use ??

(A) Public and private keys

(B) Proof of stake

(C) Public keys only

(D) Only private keys

Leave a Reply