Which statement describes how the sender of the message is verified when asymmetric encryption is used?