VigorousCoast5522 VigorousCoast5522 26-05-2023 Computers and Technology contestada Public-key encryption is based on a ____. a.message authentication code (MAC) c.hash value b.certificate d.key