In asymmetric key cryptography, the public key is available with ________.
A. sender
B. receiver
C. sender and receiver
D. everyone in the network
Correct answer: everyone in the network