If a digital signature is used to achieve both data-integrity checking and verification of sender, digital signatures are only used when implementing: