In common blockchain design, identity and transaction approval is possible through:
A. AES encryption
B. Public key cryptography
C. Secret key cryptography
D. None of the above

Leave a Reply

Your email address will not be published. Required fields are marked *