Jamie uses a form of encryption technique that requires him to have two keys. He shares one key with the senders of the message, so that they can use it to encrypt the message. He uses his private key to decrypt the received message. Which of the following encryption methods is being exemplified in this scenario?
a) Public Key Infrastructure (PKI)
b) Symmetric Encryption
c) Asymmetric Encryption
d) Digital Signature