Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country, but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. Which one of the following keys would Bob not possess in this scenario?
A. Alice’s public key
B. Alice’s private key
C. Bob’s public key
D. Bob’s private key