Karen encrypts data with a private key and sends it to Bob. By doing this Karen is proving ____________.