Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the user of encrypted data. b.the provider of encrypted data. c. both the user and the provider of encrypted data. d. either the user or the provider of encrypted data.