Which of the following can you reveal without compromising the security of the encrypted data
Encrypted data itself
Asymmetric private key
Symmetric key
Asymmetric public key