IDNLearn.com makes it easy to find answers and share knowledge with others. Ask anything and receive prompt, well-informed answers from our community of experienced experts.

Bob would like to send a confidential, encrypted message to Alice using asymmetric cryptography. What key should Bob use to create the message?
A. Bob's private key
B. A shared secret key
C. Alice's public key
D. Bob's public key