eelsel292 eelsel292 15-05-2023 Computers and Technology contestada In a public key infrastructure setup, which of the following should be used to encrypt the signature of an e-mail?A. Private keyB. Public keyC. Shared keyD. Hash