A user decrypt an encrypted signature that was encrypted using asymmetric cryptography. What does this sender need to decrypt the message?
a. Recipient's private key
b. Sender's private key
c. Sender's public key
d. Recipient's public key
Answer: c. Sender's public key