A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient need to decrypt the message?
A. Recipient's private key
B. Recipient's public key
C. Sender's private key
D. Sender's public key
Answer: A. Recipient's private key