Answer:
asymmetric encryption with the intended user's public key.
Step-by-step explanation:
Only that user will be able to decrypt the information.
3.7m questions
4.8m answers