DavidNeedsHelp4671 DavidNeedsHelp4671 26-03-2024 Computers and Technology contestada In a public key encryption scheme, what two types of keys do users have?