IDNLearn.com provides a collaborative environment for finding and sharing answers. Discover the information you need from our experienced professionals who provide accurate and reliable answers to all your questions.

Bob would like to send a confidential, encrypted message to Alice using asymmetric cryptography. What key should Bob use to create the message?
A. Bob's private key
B. A shared secret key
C. Alice's public key
D. Bob's public key