An efficient use of public key infrastructure (PKI) should encrypt the: A、entire message. B、private key. C、public key. D、symmetric session key.