Richard received a message from Matthew that was encrypted using an asymmetric cryptosystem. What key should Richard use to decrypt the message?
a. Matthew's public key
b. Matthew's private key
c. Richard's public key
d. Richard's private key
e. Shared secret key
Answer: d. Richard's private key